Journal on Communications ›› 2023, Vol. 44 ›› Issue (12): 230-244.doi: 10.11959/j.issn.1000-436x.2023216
• Correspondences • Previous Articles
Junwei LIANG1, Geng YANG1, Maode MA2, Sadiq Muhammad1
Revised:
2023-12-11
Online:
2023-12-01
Published:
2023-12-01
Supported by:
CLC Number:
Junwei LIANG, Geng YANG, Maode MA, Sadiq Muhammad. Secure federated distillation GAN for CIDS in industrial CPS[J]. Journal on Communications, 2023, 44(12): 230-244.
"
IDS模型 | Precision | Recall | F1值 | FAR | FLOPS/(flop·s-1) | Latency/ms | |
不使用LDP技术 | CNN | 95.62% | 94.56% | 94.92% | 5.41% | 89 216 | 4.29 |
EC-GAN | 96.55% | 95.89% | 96.11% | 3.93% | 89 216 | 4.20 | |
Dev EC-GAN | 97.13% | 96.76% | 96.81% | 2.20% | 89 216 | 4.26 | |
Fix PFD-GAN | 98.65% | 98.62% | 98.60% | 1.14% | 89 216 | 4.31 | |
PFD-GAN | 99.00% | 98.99% | 98.97% | 0.79% | 74 470 | 3.58 | |
使用LDP技术 | CNN | 93.76% | 92.77% | 93.00% | 7.85% | 89 216 | 4.36 |
EC-GAN | 95.63% | 94.14% | 94.68% | 4.57% | 89 216 | 4.34 | |
Dev EC-GAN | 96.41% | 95.60% | 95.82% | 3.03% | 89 216 | 4.38 | |
Fix PFD-GAN | 97.94% | 97.75% | 97.77% | 1.54% | 89 216 | 4.29 | |
PFD-GAN | 98.16% | 97.97% | 97.99% | 1.47% | 74 470 | 3.49 |
"
IDS模型 | Jnormal | Jflooding | Jimpersonation | Jinjection | FLOPS/(flop·s-1) | Latency/ms |
DL-GAN | 96.80% | 54.28% | 96.39% | 95.65% | 5.22×10 5 | 25.12 |
MD-BiGAN | 98.11% | 74.35% | 82.97% | 96.62% | 5.14×10 5 | 24.73 |
Fed-ANIDS | 98.33% | 71.55% | 80.58% | 96.84% | 2.51×10 6 | 120.97 |
SSFL | 98.70% | 83.33% | 91.21% | 96.69% | 2.48×10 6 | 119.40 |
PFD-GAN | 99.30% | 87.94% | 97.11% | 97.02% | 4.77×10 5 | 22.93 |
"
IDS解决方案 | Precision | Recall | F1值 | FAR | Latency/ms | |
无任何辅助机制的IDS | GHSOM | 96.17% | 96.11% | 95.99% | 5.48% | 3.40 |
Hypothesis Testing | 94.28% | 94.00% | 93.96% | 7.15% | 0.43 | |
Dolphine + SVM | 95.99% | 95.97% | 95.87% | 5.59% | 1.44 | |
Markov Model | 91.33% | 93.17% | 92.00% | 10.40% | 1.56 | |
带辅助机制的IDS | GHSOM + MOEA | 97.43% | 97.03% | 97.01% | 2.70% | 2.03 |
t-test + Bayesian | 96.46% | 96.18% | 96.08% | 5.42% | 0.57 | |
PFD-GAN w/o LDP | 98.65% | 98.62% | 98.60% | 1.14% | 3.52 | |
差分隐私保护的联邦IDS | FedAvg | 93.20% | 92.95% | 92.82% | 7.96% | 5.74 |
Fed+ | 93.49% | 93.05% | 93.09% | 7.68% | 5.89 | |
SecFedNIDS | 95.89% | 94.82% | 95.06% | 3.65% | 4.28 | |
PFD-GAN w LDP | 97.94% | 97.75% | 97.77% | 1.54% | 3.65 |
[1] | PIVOTO D G , ALMEIDA L F , RIGHI R ,et al. Cyber-physical systems architectures for industrial Internet of things applications in industry 4.0:a literature review[J]. Journal of Manufacturing Systems, 2021,58: 176-192. |
[2] | SALAU B A , RAWAL A , RAWAT D B . Recent advances in artificial intelligence for wireless Internet of things and cyber–physical systems:a comprehensive survey[J]. IEEE Internet of Things Journal, 2022,9(15): 12916-12930. |
[3] | 吕思才, 张格, 张耀方 ,等. 一种面向工控系统的PU学习入侵检测方法[J]. 信息安全学报, 2021,6(4): 72-89. |
LV S C , ZHANG G , ZHANG Y F ,et al. A PU learning intrusion detection method for industrial control system[J]. Journal of Cyber Security, 2021,6(4): 72-89. | |
[4] | NESPOLI P , DíAZ-LóPEZ D , MáRMOL F G . Cyberprotection in IoT environments:a dynamic rule-based solution to defend smart devices[J]. Journal of Information Security and Applications, 2021,60:102878. |
[5] | RAJASOUNDARAN S , PRABU A V , SUBRAHMANYAM J B V ,et al. WITHDRAWN:secure watchdog selection using intelligent key management in wireless sensor networks[J]. Materials Today:Proceedings, 2021:doi.org/10.1016/j.matpr.2020.12.1027. |
[6] | NAQASH T , TANVEER M H , SHAH S H ,et al. Statistical analysis-based intrusion detection for software defined network[C]// Smart Trends in Computing and Communications. Singapore:Springer, 2022: 279-289. |
[7] | IERACITANO C , ADEEL A , MORABITO F C ,et al. A novel statistical analysis and autoencoder driven intelligent intrusion detection approach[J]. Neurocomputing, 2020,387: 51-62. |
[8] | ALDRIBI A , TRAORé I , MOA B ,et al. Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking[J]. Computers & Security, 2020,88:101646. |
[9] | YAO R Z , WANG N , LIU Z H ,et al. Intrusion detection system in the advanced metering infrastructure:a cross-layer feature-fusion CNN-LSTM-based approach[J]. Sensors, 2021,21(2): 626. |
[10] | CHADZA T , KYRIAKOPOULOS K G , LAMBOTHARAN S . Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks[J]. Future Generation Computer Systems, 2020,108: 636-649. |
[11] | LI W , MENG W . Collaborative intrusion detection in the era of IoT:recent advances and challenges[J]. Security and Privacy in the Internet of Things:Architectures,Techniques,and Applications, 2021: 123-149. |
[12] | SHU J G , ZHOU L , ZHANG W Z ,et al. Collaborative intrusion detection for VANETs:a deep learning-based distributed SDN approach[J]. IEEE Transactions on Intelligent Transportation Systems, 2021,22(7): 4519-4530. |
[13] | RUZAFA-ALCáZAR P , FERNáNDEZ-SAURA P , MáRMOL-CAMPOS E ,et al. Intrusion detection based on privacy-preserving federated learning for the industrial IoT[J]. IEEE Transactions on Industrial Informatics, 2021,19(2): 1145-1154. |
[14] | YU P Q , WYNTER L , LIM S H . Fed+:a family of fusion algorithms for federated learning[J]. arXiv Preprint,arXiv:2009.06303, 2020. |
[15] | ZHANG Z , ZHANG Y , GUO D ,et al. SecFedNIDS:robust defense for poisoning attack against federated learning-based network intrusion detection system[J]. Future Generation Computer Systems, 2022,134: 154-169. |
[16] | ABDEL-BASSET M , MOUSTAFA N , HAWASH H ,et al. Federated intrusion detection in blockchain-based smart transportation systems[J]. IEEE Transactions on Intelligent Transportation Systems, 2022,23(3): 2523-2537. |
[17] | SHENDE O , PATERIYA R K , VERMA P ,et al. CEBM:collaborative ensemble blockchain model for intrusion detection in IoT environment[J]. Europe PMC, 2021:doi.org/10.21203/rs.3.rs-702181/v1. |
[18] | AGRAWAL S , SARKAR S , AOUEDI O ,et al. Federated Learning for intrusion detection system:concepts,challenges and future directions[J]. Computer Communications, 2022,195: 346-361. |
[19] | MORRIS T , GAO W . Industrial control system traffic data sets for intrusion detection research[C]// International Conference on Critical Infrastructure Protection. Berlin:Springer, 2014: 65-78. |
[20] | CHATZOGLOU E , KAMBOURAKIS G , KOLIAS C . Empirical evaluation of attacks against IEEE 802.11 enterprise networks:the AWID3 dataset[J]. IEEE Access, 2021,9: 34188-34205. |
[21] | XU C G , REN J , ZHANG D Y ,et al. GANobfuscator:mitigating information leakage under GAN via differential privacy[J]. IEEE Transactions on Information Forensics and Security, 2019,14(9): 2358-2371. |
[22] | ZHAO R J , WANG Y J , XUE Z ,et al. Semisupervised federated-learning-based intrusion detection method for Internet of things[J]. IEEE Internet of Things Journal, 2023,10(10): 8645-8657. |
[23] | IDRISSI M J , ALAMI H , MAHDAOUY A E ,et al. Fed-ANIDS:federated learning for anomaly-based network intrusion detection systems[J]. Expert Systems With Applications, 2023,234:121000. |
[24] | PHAN N , WU X T , HU H ,et al. Adaptive laplace mechanism:differential privacy preservation in deep learning[C]// Proceedings of 2017 IEEE International Conference on Data Mining (ICDM). Piscataway:IEEE Press, 2017: 385-394. |
[1] | Jiale ZHANG, Chengcheng ZHU, Xiaobing SUN, Bing CHEN. Membership inference attack and defense method in federated learning based on GAN [J]. Journal on Communications, 2023, 44(5): 193-205. |
[2] | Xin SUN, Guifu ZHANG, Hongyan XING, Wang Zenghui. Research on intrusion detection for maritime meteorological sensor network based on balancing generative adversarial network [J]. Journal on Communications, 2023, 44(4): 124-136. |
[3] | Jihong YU, Ziyan LIN, Neng YE, Kai YANG, Jianping AN. Covert communication method based on tripartite generative adversarial network [J]. Journal on Communications, 2023, 44(11): 225-236. |
[4] | Lingtao TANG, Di WANG, Shengyun LIU. Data augmentation scheme for federated learning with non-IID data [J]. Journal on Communications, 2023, 44(1): 164-176. |
[5] | Yanwen WANG, Weimin LEI, Wei ZHANG, Huan MENG, Xinyi CHEN, Wenhui YE, Qingyang JING. Survey on video image reconstruction method based on generative model [J]. Journal on Communications, 2022, 43(9): 194-208. |
[6] | Yanhua LIU, Jiaqi LI, Zhengui OU, Xiaoling GAO, Ximeng LIU, Weizhi MENG, Baoxu LIU. Adversarial training driven malicious code detection enhancement method [J]. Journal on Communications, 2022, 43(9): 169-180. |
[7] | Hanyi WANG, Xiaoguang LI, Wenqing BI, Yahong CHEN, Fenghua LI, Ben NIU. Multi-level local differential privacy algorithm recommendation framework [J]. Journal on Communications, 2022, 43(8): 52-64. |
[8] | Xiayu XIANG, Jiahui WANG, Zirui WANG, Shaoming DUAN, Hezhong PAN, Rongfei ZHUANG, Peiyi HAN, Chuanyi LIU. Generate medical synthetic data based on generative adversarial network [J]. Journal on Communications, 2022, 43(3): 211-224. |
[9] | Xueyuan DUAN, Yu FU, Kun WANG. Multi-dimensional time series anomaly detection method based on VAE-WGAN [J]. Journal on Communications, 2022, 43(3): 1-13. |
[10] | Wei LIU, Cheng CHEN, Rui JIANG, Tao LU. Four-path unsupervised learning-based image defogging network [J]. Journal on Communications, 2022, 43(10): 210-222. |
[11] | Yanhui LU, Han LIU, Hang LI, Guangxu ZHU. Time series generation model based on multi-discriminator generative adversarial network [J]. Journal on Communications, 2022, 43(10): 167-176. |
[12] | Zhili ZHOU, Meimin WANG, Gaobo YANG, Jianyu ZHU, Xingming SUN. Generative steganography method based on auto-generation of contours [J]. Journal on Communications, 2021, 42(9): 144-154. |
[13] | Hongyan WANG, Xiao YANG, Yanchao JIANG, Zumin WANG. Image denoising algorithm based on multi-channel GAN [J]. Journal on Communications, 2021, 42(3): 229-237. |
[14] | Zunwen HE, Shuai HOU, Wancheng ZHANG, Yan ZHANG. Multi-feature fusion classification method for communication specific emitter identification [J]. Journal on Communications, 2021, 42(2): 103-112. |
[15] | Yang LIU, Jun LI, Wenyun CHEN, Mugen PENG. Research on endogenous security data sharing mechanism of F-RAN for 6G [J]. Journal on Communications, 2021, 42(1): 67-78. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|