Lambert Kofi Gyan Danquah , Stanley Yaw Appiah , Victoria Adzovi Mantey , Iddrisu Danlard , Emmanuel Kofi Akowuah
{"title":"Computationally Efficient Deep Federated Learning with Optimized Feature Selection for IoT Botnet Attack Detection","authors":"Lambert Kofi Gyan Danquah , Stanley Yaw Appiah , Victoria Adzovi Mantey , Iddrisu Danlard , Emmanuel Kofi Akowuah","doi":"10.1016/j.iswa.2024.200462","DOIUrl":null,"url":null,"abstract":"<div><div>Internet of Things (IoT) is a technology that has revolutionized various fields, offering numerous benefits, such as remote patient monitoring, enhanced energy efficiency, and automation of routine tasks in homes. However, unsecured IoT devices are susceptible to botnet-based attacks such as distributed denial of Service (DDoS). Conventional machine learning models used for detecting these attacks compromise data privacy, prompting the adoption of federated learning (FL) to improve privacy. Yet, most FL-based cyberattack detection models proposed for IoT environments do not address computational complexity to suit their deployment on resource-constrained IoT edge devices. This paper introduces an FL model with low computational complexity, designed for detecting IoT botnet attacks. The study employs feature selection and dimensionality reduction to minimize computational complexity while maintaining high accuracy. First, an extreme gradient boosting model, trained with repeated stratified k-fold cross-validation, is used to select the optimal features of the botnet dataset based on feature importance. Principal component analysis is then used to reduce the dimensionality of these features. Finally, a differentially private multi-layer perceptron is trained locally by four FL clients and aggregated through federated averaging (FedAvg) to form a global Mirai botnet attack detection model. The model achieved an accuracy, precision, recall, and F1-score of 99.93 %, an area under the curve of 1.0, and 8,612 floating-point operations, contributing to 87.34 % reduction in computational complexity compared to the previous work. The proposed model is well-suited for detecting botnet attacks in smart homes, smart grids, and environments where resource-constrained IoT edge devices are deployed.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"25 ","pages":"Article 200462"},"PeriodicalIF":0.0000,"publicationDate":"2024-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Intelligent Systems with Applications","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2667305324001364","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Internet of Things (IoT) is a technology that has revolutionized various fields, offering numerous benefits, such as remote patient monitoring, enhanced energy efficiency, and automation of routine tasks in homes. However, unsecured IoT devices are susceptible to botnet-based attacks such as distributed denial of Service (DDoS). Conventional machine learning models used for detecting these attacks compromise data privacy, prompting the adoption of federated learning (FL) to improve privacy. Yet, most FL-based cyberattack detection models proposed for IoT environments do not address computational complexity to suit their deployment on resource-constrained IoT edge devices. This paper introduces an FL model with low computational complexity, designed for detecting IoT botnet attacks. The study employs feature selection and dimensionality reduction to minimize computational complexity while maintaining high accuracy. First, an extreme gradient boosting model, trained with repeated stratified k-fold cross-validation, is used to select the optimal features of the botnet dataset based on feature importance. Principal component analysis is then used to reduce the dimensionality of these features. Finally, a differentially private multi-layer perceptron is trained locally by four FL clients and aggregated through federated averaging (FedAvg) to form a global Mirai botnet attack detection model. The model achieved an accuracy, precision, recall, and F1-score of 99.93 %, an area under the curve of 1.0, and 8,612 floating-point operations, contributing to 87.34 % reduction in computational complexity compared to the previous work. The proposed model is well-suited for detecting botnet attacks in smart homes, smart grids, and environments where resource-constrained IoT edge devices are deployed.