VIFL: vulnerability identification using federated learning in the internet of things systems (original) (raw)
References
Wen H, Chen QA, Lin Z (2020) Plug-n-pwned: Comprehensive vulnerability analysis of obd-ii dongles as a new over-the-air attack surface in automotive iot. In: USENIX Security Symposium
Butun I, Österberg P, Song H (2019) Security of the internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun Surv & Tutorials 22(1):616–644 ArticleMATH Google Scholar
Anand P, Singh Y, Selwal A, Alazab M, Tanwar S, Kumar N (2020) Iot vulnerability assessment for sustainable computing: threats, current solutions, and open challenges. IEEE Access 8:168825–168853 ArticleMATH Google Scholar
Fernández-Caramés TM, Fraga-Lamas P (2020) Teaching and learning IoT cybersecurity and vulnerability assessment with shodan through practical use cases. Sensors 20(11):3048 ArticleMATH Google Scholar
Hafeez I, Antikainen M, Ding AY, Tarkoma S (2020) Iot-keeper: Detecting malicious iot network activity using online traffic analysis at the edge. IEEE Trans Netw Serv Manag 17(1):45–59 Article Google Scholar
Chen J, Diao W, Zhao Q, Zuo C, Lin Z, Wang X, Lau WC, Sun M, Yang R, Zhang K (2018) Iotfuzzer: Discovering memory corruptions in iot through app-based fuzzing. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, pp. 1–15. https://doi.org/10.14722/ndss.2018.23159 . https://www.ndsssymposium.org/ndss2018/
Koroniotis N, Moustafa N, Turnbull B, Schiliro F, Gauravaram P, Janicke H (2021) A deep learning-based penetration testing framework for vulnerability identification in internet of things environments. In: IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 887–894
Mothukuri V, Khare P, Parizi RM, Pouriyeh S, Dehghantanha A, Srivastava G (2021) Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet Things J 9(4):2545–2554 Article Google Scholar
Yazdinejad A, Dehghantanha A, Karimipour H, Srivastava G, Parizi RM (2024) A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Trans Inf Forensics Secur 19:6693–6708. https://doi.org/10.1109/TIFS.2024.3420126 Article Google Scholar
Lycklama H, Burkhalter L, Viand A, Küchler N, Hithnawi A (2023) Rofl: Robustness of secure federated learning. In: 2023 IEEE Symposium on Security and Privacy (SP), pp 453–476. IEEE Computer Society
Gao Z, Duan Y, Yang Y, Rui L, Zhao C (2022) Fedsec: a robust differential private federated learning framework in heterogeneous networks. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pp 1868–1873
Noble M, Bellet A, Dieuleveut A (2022) Differentially private federated learning on heterogeneous data. In: International Conference on Artificial Intelligence and Statistics, pp 10110–10145
Zhou Z, Li Y, Ren X, Yang S (2022) Towards efficient and stable k-asynchronous federated learning with unbounded stale gradients on non-iid data. IEEE Trans Parallel Distrib Syst 33(12):3291–3305 ArticleMATH Google Scholar
Nguyen DC, Ding M, Pathirana PN, Seneviratne A, Li J, Poor HV (2021) Federated learning for internet of things: a comprehensive survey. IEEE Commun Surv & Tutorials 23(3):1622–1658 Article Google Scholar
Karimireddy SP, Kale S, Mohri M, Reddi S, Stich S, Suresh AT (2020) Scaffold: Stochastic controlled averaging for federated learning. In: Proceedings of the International Conference on Machine Learning, pp 5132–5143
Yazdinejad A, Dehghantanha A, Srivastava G, Karimipour H, Parizi RM (2024) Hybrid privacy preserving federated learning against irregular users in next-generation internet of things. J Syst Archit 148:103088 Article Google Scholar
Li T, Sahu AK, Zaheer M, Sanjabi M, Talwalkar A, Smith V (2020) Federated optimization in heterogeneous networks. SysML Conference, Palo Alto, CA, USA 2019 (2): pp 429–450
Wang J, Liu Q, Liang H, Joshi G, Poor HV (2020) Tackling the objective inconsistency problem in heterogeneous federated optimization. Adv Neural Inf process Syst 33:7611–7623 MATH Google Scholar
Karimireddy SP, Kale S, Mohri M, Reddi SJ, Stich SU, Suresh AT (2019) Scaffold: Stochastic controlled averaging for on-device federated learning
Li Q, Diao Y, Chen Q, He B (2022) Federated learning on non-iid data silos: An experimental study. In: Proc. of the 38th IEEE International Conference on Data Engineering (ICDE), pp 965–978
Nguyen TD, Marchal S, Miettinen M, Fereidooni H, Asokan N, Sadeghi A-R (2019) Dïot: A federated self-learning anomaly detection system for iot. In: Proc.of the 39th IEEE International Conference on Distributed Computing Systems (ICDCS), pp 756–767
De S, Goldstein T (2016) Efficient distributed sgd with variance reduction. In: Proc. of the 16th IEEE International Conference on Data Mining (ICDM), pp 111–120
Zhu H, Xu J, Liu S, Jin Y (2021) Federated learning on non-iid data: a survey. Elsevier J Neurocomput 465:371–390 ArticleMATH Google Scholar
Fung C, Yoon CJM, Beschastnikh I (2020) The limitations of federated learning in sybil settings. In: 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), pp 301–316. USENIX Association, San Sebastian. https://www.usenix.org/conference/raid2020/presentation/fung
Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L (2016) Deep learning with differential privacy. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp 308–318
Geyer RC, Klein T, Nabi M (2017) Differentially private federated learning: a client level perspective. arXiv preprint arXiv:1712.07557
Dupuy C, Arava R, Gupta R, Rumshisky A (2022) An efficient dp-sgd mechanism for large scale nlu models. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 4118–4122
Mirsky Y, Doitshman T, Elovici Y, Shabtai A (2018) Kitsune: an ensemble of autoencoders for online network intrusion detection. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, pp 1–15. https://doi.org/10.14722/ndss.2018.23204
Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A (2020) Ton_iot telemetry dataset: a new generation dataset of iot and iiot for data-driven intrusion detection systems. Ieee Access 8:165130–165150 Article Google Scholar
Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Gener Comput Syst 100:779–796 Article Google Scholar
Wang Y, Shi Q, Chang T-H (2023) Why batch normalization damage federated learning on non-iid data? IEEE Transactions on Neural Networks and Learning Systems, 1–15 https://doi.org/10.1109/TNNLS.2023.3323302
Dong Y, Li Q, Wu K, Li R, Zhao D, Tyson G, Peng J, Jiang Y, Xia S, Xu M (2023) \(\{\)HorusEye\(\}\): A realtime \(\{\)IoT\(\}\) malicious traffic detection framework using programmable switches. In: 32nd USENIX Security Symposium (USENIX Security 23), pp 571–588