期刊文献+

基于高效联邦学习算法的网络入侵检测模型 被引量:2

Network intrusion detection model based on efficient federated learning algorithm
下载PDF
导出
摘要 为解决在入侵检测场景中引入联邦学习技术后,由于节点间存在流量数据非独立同分布(non-iid)现象而导致模型难以聚合并得到高识别率的问题,构造了一种高效联邦学习算法(H-E-Fed),并基于该算法构建了对应的入侵检测模型。首先,协调方设计针对流量数据的全局模型,并下发至入侵检测节点间进行模型训练;然后,协调方收集本地模型,并对节点间本地模型的协方差矩阵评估偏度,以衡量节点间模型的相关性,从而重新分配模型聚合参数,并生成新的全局模型;最后,协调方与节点多轮交互,直至全局模型收敛。实验结果表明,与基于联邦平均(FedAvg)算法和FedProx算法的模型相比,基于高效联邦学习算法的入侵检测模型在节点间产生数据non-iid现象时的通信消耗更低;且在KDDCup99数据集和CICIDS2017数据集上,与基线模型相比,准确率分别提升了10.39%、8.14%与4.40%、5.98%。 After the introduction of federated learning technology in intrusion detection scenarios,there is a problem that the traffic data between nodes is non-independent and identically distributed(non-iid),which makes it difficult for models to aggregate and obtain a high recognition rate.To solve this problem,an efficient federated learning algorithm named H‑E‑Fed was constructed,and a network intrusion detection model based on this algorithm was proposed.Firstly,a global model for traffic data was designed by the coordinator and was sent to the intrusion detection nodes for model training.Then,by the coordinator,the local models were collected and the skewness of the covariance matrix of the local models between nodes was evaluated,so as to measure the correlation of models between nodes,thereby reassigning model aggregation parameters and generating a new global model.Finally,multiple rounds of interactions between the coordinator and the nodes were carried out until the global model converged.Experimental results show that compared with the models based on FedAvg(Federated Averaging)algorithm and FedProx algorithm,under data non-iid phenomenon between nodes,the proposed model has the communication consumption relatively low.And on KDDCup99 dataset and CICIDS2017 dataset,compared with baseline models,the proposed model has the accuracy improved by 10.39%,8.14%and 4.40%,5.98%respectively.
作者 郝劭辰 卫孜钻 马垚 于丹 陈永乐 HAO Shaochen;WEI Zizuan;MA Yao;YU Dan;CHEN Yongle(College of Information and Computer,Taiyuan University of Technology,Jinzhong Shanxi 030600,China)
出处 《计算机应用》 CSCD 北大核心 2023年第4期1169-1175,共7页 journal of Computer Applications
基金 山西省基础研究计划项目(20210302123131,20210302124395)。
关键词 联邦学习 入侵检测 机器学习 模型聚合 信息安全 federated learning intrusion detection machine learning model aggregation information security
  • 相关文献

参考文献4

二级参考文献60

  • 1Wei Zhong,Ning Yu,Chunyu Ai.Applying Big Data Based Deep Learning System to Intrusion Detection[J].Big Data Mining and Analytics,2020,3(3):181-195. 被引量:13
  • 2王双成,苑森淼.具有丢失数据的贝叶斯网络结构学习研究[J].软件学报,2004,15(7):1042-1048. 被引量:62
  • 3FAYYAD U, PIATETSKY-SHAPIRO G, SMYTH P. Knowledge dis- covery and data mining: towards a unifying framework [ C ]//Proc of the 2nd lntenlational Conference on Knowledge Discovery & Data Mining. 1996:82-88.
  • 4PEARL J. Fusion, propagation, and structuring in belief networks [ J ]. Artificial intelligence, 1986,29 ( 3 ) :241 - 288.
  • 5LAURITZEN S L, SPIEGELHALTER D J. Local computations with probabilities on graphical struetures and their application to expert systems [ J ]. Journal of the Royal Statistical Society Series B, 1988,50( 1570 ) : 157-224.
  • 6BROOM B M, DO K A, SUBRAMANIAN D. Model averaging strate- gies for structure learning in Bayesian networks with limited data[ J ]. BMC Bioinformatics,2012,13( S13 ) :10.
  • 7HUANG Shuai, LI Jing, YE Jie-ping, et al. A sparse structure learn- ing algorithm for Ganssian Bayesian network identification from high- dimensional data[ J]. IEEE Trans on Pattern Analysis and Ma- chine Intelligence,2013,35 (6) : 1328-1342.
  • 8CHICKERING D M, GEIGER D, HECKERMAN D. Learning Baye- sian networks is NP-hard, Technical Report MSR-TR- 94- 17 [ R ]. 1994.
  • 9ROBINSON R W. Counting unlabeled acyclic digraphs[ C]//Combi- natorial Mathematics V. Berlin:Springer, 1977:28-43.
  • 10SPIRTES P, GLYMOUR C, SCHEINES R. Causality from probabili- ty[ R]. 1989.

共引文献124

同被引文献9

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部