Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

5G Internet of Things intrusion detection method and system based on federated transfer learning

A transfer learning and IoT technology, applied in the field of 5G IoT intrusion detection methods and systems based on federated transfer learning, can solve solutions that are difficult to reflect real-world conditions, do not consider the needs of personalized IoT models, and fail to detect new It can achieve the effect of effective unknown attack, detection of unknown attack, and strong generalization ability.

Active Publication Date: 2021-01-08
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, such a solution hardly reflects the real world situation
[0009] [T.D. Nguyen, S. Marchal, M. Miettinen, H. Fereidooni, N. Asokan, and A.-R. Sadeghi," A federated self-learning anomaly detection system for IoT,"in 2019IEEE 39th International Conference on Distributed Computing Systems(ICDCS).IEEE,pp.756-76.] Federated learning is used for the first time, but there are still some limitations: 1) Security Both the cloud and the security gateway use a unified model architecture regardless of individual IoT model requirements; 2) lack of support for public datasets (the model is random at the beginning), so it can barely detect new or unknown attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 5G Internet of Things intrusion detection method and system based on federated transfer learning
  • 5G Internet of Things intrusion detection method and system based on federated transfer learning
  • 5G Internet of Things intrusion detection method and system based on federated transfer learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be described in further detail below through specific embodiments and accompanying drawings.

[0049] Such as figure 1 As shown, the federated migration framework proposed by the present invention is based on the federated migration learning algorithm, and the trained model can be used for intrusion detection in the Internet of Things. It mainly includes three modules: data preprocessing, detection model training, and attack detection.

[0050] 1. Data preprocessing

[0051] After obtaining the original data packet, preprocess it to extract basic information such as IP address, data packet size, and arrival time, and then perform feature extraction and feature dimensionality reduction on it.

[0052] 2. Detection model training

[0053] The intrusion detection system architecture designed by this method has three layers. The top layer is a secure cloud platform operated by 5G operators, with a large amount of data and computing resources. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a 5G Internet of Things intrusion detection method and system based on federated transfer learning. The 5G Internet of Things intrusion detection method comprises the steps of:collecting a to-be-detected traffic in the Internet of Things, and acquiring a feature vector of an original data packet; and inputting the feature vector into a corresponding client model fm, k, andjudging whether the to-be-detected traffic is legal or not. According to the 5G Internet of Things intrusion detection, the federation transfer learning method in the 5G Internet of Things IDS is proposed for the first time, data from different Internet of Things can be safely aggregated, a good intrusion detection model for each Internet of Things is realized through knowledge transfer and sharing, the 5G Internet of Things intrusion detection method can be conveniently and safely applied to various different Internet of Things, and the method has very strong generalization ability and is suitable for popularization and application. Compared with an existing method, abnormal traffic can be detected more accurately, and unknown attacks can be detected more effectively.

Description

technical field [0001] The invention belongs to the field of the Internet of Things, and in particular relates to a 5G Internet of Things intrusion detection method and system based on federated transfer learning. Background technique [0002] The field of IoT intrusion detection has been extensively studied. In IPv6-connected Internet of Things, [S.Raza, L.Wallgren, and T.Voigt, "SVELTE: Real-time intrusion detection in the Internet of Things," Ad hoc networks, vol.11, no.8, pp. 2661-2674, 2013] for the first time proposed a lightweight IDS to detect spoofing and vulnerability attacks. [H.Bostani, and M.Sheikhan, "Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach," Computer Communications, vol.98, pp.52-71, 2017] proposed a A hybrid-mode IoT intrusion detection system that supports the detection of trapping and selective forwarding attacks in 6LowPAN networks. Both approaches can be extended to d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/121H04W12/122H04L9/00H04W12/02G06N20/00H04N7/18
CPCH04L9/008H04W12/02G06N20/00H04N7/181
Inventor 范雨琳李杨詹梦奇崔华俊张琰
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products