9
IRUS TotalDownloads
Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection
File | Description | Size | Format | |
---|---|---|---|---|
![]() | Published version | 1.65 MB | Adobe PDF | View/Open |
Title: | Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection |
Authors: | Wang, H Muñoz-González, L Eklund, D Raza, S |
Item Type: | Conference Paper |
Abstract: | The increase of the computational power in edge devices has enabled the penetration of distributed machine learning technologies such as federated learning, which allows to build collaborative models performing the training locally in the edge devices, improving the efficiency and the privacy for training of machine learning models, as the data remains in the edge devices. However, in some IoT networks the connectivity between devices and system components can be limited, which prevents the use of federated learning, as it requires a central node to orchestrate the training of the model. To sidestep this, peer-to-peer learning appears as a promising solution, as it does not require such an orchestrator. On the other side, the security challenges in IoT deployments have fostered the use of machine learning for attack and anomaly detection. In these problems, under supervised learning approaches, the training datasets are typically imbalanced, i.e. the number of anomalies is very small compared to the number of benign data points, which requires the use of re-balancing techniques to improve the algorithms' performance. In this paper, we propose a novel peer-to-peer algorithm,P2PK-SMOTE, to train supervised anomaly detection machine learning models in non-IID scenarios, including mechanisms to locally re-balance the training datasets via synthetic generation of data points from the minority class. To improve the performance in non-IID scenarios, we also include a mechanism for sharing a small fraction of synthetic data from the minority class across devices, aiming to reduce the risk of data de-identification. Our experimental evaluation in real datasets for IoT anomaly detection across a different set of scenarios validates the benefits of our proposed approach. |
Issue Date: | 28-Jun-2021 |
Date of Acceptance: | 1-Jun-2021 |
URI: | http://hdl.handle.net/10044/1/94007 |
DOI: | 10.1145/3448300.3467827 |
Publisher: | ACM |
Start Page: | 153 |
End Page: | 163 |
Journal / Book Title: | Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks |
Copyright Statement: | © 2021 Copyright held by the owner/author(s). This work is licensed under a Creative Commons Attribution-ShareAlike International 4.0 License. |
Conference Name: | WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks |
Publication Status: | Published |
Start Date: | 2021-06-28 |
Finish Date: | 2021-07-02 |
Conference Place: | New York, NY, United States |
Open Access location: | https://dl.acm.org/doi/pdf/10.1145/3448300.3467827 |
Online Publication Date: | 2021-06-28 |
Appears in Collections: | Computing |
This item is licensed under a Creative Commons License