Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems

Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection pipeline for distributed incremental learning. Our pre-processing technique eliminates redundancies and selects unique features by following innovative extraction techniques. We use autoencoders with non-negativity constraints, which help us extract less redundant features. More importantly, the distributed intrusion detection model reduces the burden on the edge classifier and distributes the load among IoT and edge devices. Theoretical analysis and numerical experiments have shown lower space and time costs than state of the art techniques, with comparable classification accuracy. Extensive experiments with standard data sets and real-time streaming IoT traffic give encouraging results.

[1]  K. Nandhakumar,et al.  A Hybrid Feature Extraction Method for Network Intrusion Detection System , 2019 .

[2]  Ethem Alpaydin,et al.  Unsupervised feature extraction with autoencoder trees , 2017, Neurocomputing.

[3]  Massimiliano Pontil,et al.  Multi-Task Feature Learning , 2006, NIPS.

[4]  Jianhua Liu,et al.  Deep Sparse Autoencoder for Feature Extraction and Diagnosis of Locomotive Adhesion Status , 2018, J. Control. Sci. Eng..

[5]  Wouter Joosen,et al.  Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study , 2018, Applied Sciences.

[6]  Jiebo Luo,et al.  Fast Online Incremental Learning on Mixture Streaming Data , 2017, AAAI.

[7]  Fakhroddin Noorbehbahani,et al.  An incremental intrusion detection system using a new semi‐supervised stream classification method , 2017, Int. J. Commun. Syst..

[8]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[9]  Sungzoon Cho,et al.  Variational Autoencoder based Anomaly Detection using Reconstruction Probability , 2015 .

[10]  Vasant Honavar,et al.  Learn++: an incremental learning algorithm for supervised neural networks , 2001, IEEE Trans. Syst. Man Cybern. Part C.

[11]  Christian Diedrich,et al.  Accelerated deep neural networks for enhanced Intrusion Detection System , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).

[12]  Xinbo Gao,et al.  Robust tensor subspace learning for anomaly detection , 2011, Int. J. Mach. Learn. Cybern..

[13]  Mohsen Guizani,et al.  A Survey on Recent Approaches in Intrusion Detection System in IoTs , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).

[14]  Samy Bengio,et al.  An Online Algorithm for Large Scale Image Similarity Learning , 2009, NIPS.

[15]  Xing Chen,et al.  Stacked Denoise Autoencoder Based Feature Extraction and Classification for Hyperspectral Images , 2016, J. Sensors.

[16]  Asmaa Shaker Ashoor Importance of Intrusion Detection System ( IDS ) , 2010 .

[17]  Ming-Hsuan Yang,et al.  Incremental Learning for Robust Visual Tracking , 2008, International Journal of Computer Vision.

[18]  Tao Xiang,et al.  A training-integrity privacy-preserving federated learning scheme with trusted execution environment , 2020, Inf. Sci..

[19]  Dana Kulic,et al.  Incremental Learning, Clustering and Hierarchy Formation of Whole Body Motion Patterns using Adaptive Hidden Markov Chains , 2008, Int. J. Robotics Res..

[20]  Qi Liu,et al.  Incremental semi-supervised learning on streaming data , 2019, Pattern Recognit..

[21]  Wei Xu,et al.  Incremental SVM based on reserved set for network intrusion detection , 2011, Expert Syst. Appl..

[22]  Huseyin Cavusoglu,et al.  The Value of Intrusion Detection Systems in Information Technology Security Architecture , 2005, Inf. Syst. Res..

[23]  Kai Li,et al.  Tool Wear Prediction via Multidimensional Stacked Sparse Autoencoders With Feature Fusion , 2020, IEEE Transactions on Industrial Informatics.

[24]  Cesare Alippi,et al.  The (Not) Far-Away Path to Smart Cyber-Physical Systems: An Information-Centric Framework , 2017, Computer.

[25]  Kibok Lee,et al.  A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks , 2018, NeurIPS.

[26]  Jugal K. Kalita,et al.  Survey on Incremental Approaches for Network Anomaly Detection , 2011, Int. J. Commun. Networks Inf. Secur..

[27]  Kehe Wu,et al.  A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks , 2018, IEEE Access.

[28]  Mats Björkman,et al.  Communication and Security in Health Monitoring Systems -- A Review , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[29]  Sean R Eddy,et al.  What is dynamic programming? , 2004, Nature Biotechnology.

[30]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[31]  Massimo Buscema,et al.  Artificial neural networks in the recognition of the presence of thyroid disease in patients with atrophic body gastritis. , 2008, World journal of gastroenterology.

[32]  Te-Ming Chang,et al.  An incremental cluster-based approach to spam filtering , 2008, Expert Syst. Appl..

[33]  Jason Weston,et al.  Fast Kernel Classifiers with Online and Active Learning , 2005, J. Mach. Learn. Res..

[34]  Kim-Kwang Raymond Choo,et al.  Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices , 2018, IEEE Consumer Electronics Magazine.

[35]  George Karypis,et al.  A Comparison of Document Clustering Techniques , 2000 .

[36]  Honglak Lee,et al.  An Analysis of Single-Layer Networks in Unsupervised Feature Learning , 2011, AISTATS.

[37]  Arputharaj Kannan,et al.  Intelligent feature selection and classification techniques for intrusion detection in networks: a survey , 2013, EURASIP Journal on Wireless Communications and Networking.