SlideShare a Scribd company logo
1 of 22
AN ASYNCHRONOUS DISTRIBUTED
DEEP LEARNING BASED INTRUSION
DETECTION SYSTEM FOR IOT DEVICES
PU TIAN
ADVISOR: DR. WEIXIAN LIAO
DEPARTMENT OF COMPUTER AND INFORMATION SCIENCES
TOWSON UNIVERSITY
5/29/2019
Background
• Internet of Things (IoTs).
• The connection of a wider range of everyday physical
devices, such as smart watch/phone and different
sensors.
• To collect a wider range of real-time data.
• Security issue.
• IoT Intrusion Detection System.
Design Goals
 Effective
• Identification of malicious network flow from complicated
protocols.
 Efficient
• Detection in a timely manner.
Existing IDS Models
 Knowledge Based Method:
• To establish exact rules for intrusion behaviors.
• Pros: Accurate and fast.
• Cons: (1) Vulnerable to new attacks.
(2) Time-consuming to create rules manually.
Existing IDS Models
 Machine Learning(ML) Method:
• Build model with labeled/unlabeled training data.
• Pros: Improved adaptability.
• Cons: (1) Computation resource consuming .
(2) Large data transmission for single-node
training.
General Federated Learning Model
 Synchronous Model
 Distributed nodes collect and train
local data independently.
 The central server fetches and
aggregates parameters after all
agents’ local updates are received.
General Federated Learning Model
• Pros: Reduced data transmission over the network.
• Cons: Performance problem of the slowest client.
Design Target
 Asynchronous Federated Learning Model
 Distributed nodes send their local
parameter update requests to the
server.
 The central server aggregates
immediately and sends updated
parameters back.
Challenges
 Staleness Problem
Challenges
 Existing Solutions for Staleness Problem
• Delayed Gradient Approximation Compensation.
• Update Weight Adjustment.
• Communication Optimization.
Proposed Method
 Neural Network
• Capacity of learning nonlinear complex patterns.
 Autoencoder(AE)
• Description: A NN used to
learn to represent itself as
close as possible.
• Encoder: Map(encode) input to
the latent layer, denoted by 𝓏.
• Decoder: Reconstruct the input
by mapping 𝓏 to the output
layer.
Proposed Method
Proposed Method
 Autoencoder(AE)
• Loss function: To measure the
discrepancy between the input 𝑥 𝑖
and
its reconstruction 𝑥 𝑖
.
• Root Mean Squared Error (RMSE)
RMSE =
∑ 𝑖=1
𝑛
(𝑥 𝑖− 𝑥 𝑖)2
𝑛
 For training: To minimize the RMSE value in order to reconstruct original input.
 For execution(detection): A smaller value indicates a higher possibility of similarity to the training
instances.
Proposed Method
 Intrusion Detection with AE
𝑋 𝑖+1
= {𝑥1, 𝑥1, 𝑥1, … … … , 𝑥 𝑛}
Case 1: 𝑅𝑀𝑆𝐸 < 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 → 𝑋 𝑖+1 is GOOD.
Case 2: 𝑅𝑀𝑆𝐸 > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 → 𝑋 𝑖+1
is BAD.
𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 = 0.45
Proposed Method
 Asynchronous Parameter Update
• The gradient descent delay compensation method based on the approximation for the delayed value. *
• Originally proposed for image classification with ResNet and adopted for AE in IDS scenario.
*Zheng, Shuxin, Qi Meng, Taifeng Wang, Wei Chen, Nenghai Yu, Zhi-Ming Ma, and Tie-Yan Liu. "Asynchronous
stochastic gradient descent with delay compensation." In Proceedings of the 34th International Conference on
Machine Learning-Volume 70, pp. 4120-4129. JMLR. org, 2017.
Experiments
 Dataset
• CICIDS2017 : Normal and common attacks ranging from 9 a.m., Monday, July 3, 2017 to 5 p.m. on
Friday July 7, 2017, for a total of 5 days.
• Training Data: 100,000 normal data instances randomly chosen from Monday dataset.
• Testing Data: 200,000 normal as well as abnormal data(DDoS) instances extracted .
 Experiment Setup
• Server and Clients: One parameter server and four clients.
• Input Data Dimension: 77 features.
• Hidden Layer: 75% of the input layer dimension, 55 in this case.
• Parameter Update Method: 50 iterations for local updates and then a request for a global
parameter aggregation (20 iterations of global updates).
Experiments
 Training Errors over Aggregation Epochs
Experiments
 Metrics
• True Positive (TP): Attack data correctly classified as an attack.
• False Positive (FP): Normal data incorrectly classified as an attack.
• True Negative (TN): Normal data correctly classified as normal.
• False Negative (FN): Attack data incorrectly classified as normal.
• Accuracy =
𝑇𝑃+𝑇𝑁
𝑇𝑃+𝑇𝑁+𝐹𝑃+𝐹𝑁
• Precision =
𝑇𝑃
𝑇𝑃+𝐹𝑃
• Recall =
𝑇𝑃
𝑇𝑃+𝐹𝑁
• F-Score = 2 ×
𝑃𝑟𝑒𝑠𝑖𝑜𝑛 × 𝑅𝑒𝑐𝑎𝑙𝑙
𝑃𝑟𝑒𝑠𝑖𝑜𝑛+ 𝑅𝑒𝑐𝑎𝑙𝑙
Experiments
 Results
Metrics
Parameter
Update Method
Accuracy Precision Recall F-Score
Synchronous 98.495% 99.994% 92.539% 96.097%
Asynchronous 98.489% 99.992% 92.503% 96.068%
Conclusion
 Deep learning network (Autoencoder) for intrusion detection.
 Asynchronous parameter update for efficiency with accuracy guaranteed.
 Test with relatively new dataset.
Future Work
 Optimize asynchronous parameter update mechanism for large
scale distributed IDS network.
 Test more attack types.
 Give a full theoretical analysis for the convergence of
Autoencoder in asynchronous parameter update scenario.
Thank You !

More Related Content

Similar to An Asynchronous Distributed Deep Learning Based Intrusion Detection System for IoT Devices

Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Mahdi Hosseini Moghaddam
 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design TrainingESCOM
 
malware detection ppt for vtu project and other final year project
malware detection ppt for vtu project and other final year projectmalware detection ppt for vtu project and other final year project
malware detection ppt for vtu project and other final year projectNaveenAd4
 
MLSEV Virtual. Searching for Anomalies
MLSEV Virtual. Searching for AnomaliesMLSEV Virtual. Searching for Anomalies
MLSEV Virtual. Searching for AnomaliesBigML, Inc
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Jowin John Chemban
 
End-to-End Object Detection with Transformers
End-to-End Object Detection with TransformersEnd-to-End Object Detection with Transformers
End-to-End Object Detection with TransformersSeunghyun Hwang
 
Noha danms13 talk_final
Noha danms13 talk_finalNoha danms13 talk_final
Noha danms13 talk_finalNoha Elprince
 
powerpoint feb
powerpoint febpowerpoint feb
powerpoint febimu409
 
Computer Vision for Beginners
Computer Vision for BeginnersComputer Vision for Beginners
Computer Vision for BeginnersSanghamitra Deb
 
Combining out - of - band monitoring with AI and big data for datacenter aut...
Combining out - of - band monitoring with AI and big data  for datacenter aut...Combining out - of - band monitoring with AI and big data  for datacenter aut...
Combining out - of - band monitoring with AI and big data for datacenter aut...Ganesan Narayanasamy
 
Approximation Data Structures for Streaming Applications
Approximation Data Structures for Streaming ApplicationsApproximation Data Structures for Streaming Applications
Approximation Data Structures for Streaming ApplicationsDebasish Ghosh
 
Policy Based reinforcement Learning for time series Anomaly detection
Policy Based reinforcement Learning for time series Anomaly detectionPolicy Based reinforcement Learning for time series Anomaly detection
Policy Based reinforcement Learning for time series Anomaly detectionKishor Datta Gupta
 
An Introduction to Deep Learning
An Introduction to Deep LearningAn Introduction to Deep Learning
An Introduction to Deep Learningmilad abbasi
 
Facial Emotion Detection on Children's Emotional Face
Facial Emotion Detection on Children's Emotional FaceFacial Emotion Detection on Children's Emotional Face
Facial Emotion Detection on Children's Emotional FaceTakrim Ul Islam Laskar
 
Bridging the Gap: Machine Learning for Ubiquitous Computing -- Evaluation
Bridging the Gap: Machine Learning for Ubiquitous Computing -- EvaluationBridging the Gap: Machine Learning for Ubiquitous Computing -- Evaluation
Bridging the Gap: Machine Learning for Ubiquitous Computing -- EvaluationThomas Ploetz
 

Similar to An Asynchronous Distributed Deep Learning Based Intrusion Detection System for IoT Devices (20)

Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...
 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design Training
 
malware detection ppt for vtu project and other final year project
malware detection ppt for vtu project and other final year projectmalware detection ppt for vtu project and other final year project
malware detection ppt for vtu project and other final year project
 
MLSEV Virtual. Searching for Anomalies
MLSEV Virtual. Searching for AnomaliesMLSEV Virtual. Searching for Anomalies
MLSEV Virtual. Searching for Anomalies
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
End-to-End Object Detection with Transformers
End-to-End Object Detection with TransformersEnd-to-End Object Detection with Transformers
End-to-End Object Detection with Transformers
 
Noha danms13 talk_final
Noha danms13 talk_finalNoha danms13 talk_final
Noha danms13 talk_final
 
Big Data Challenges and Solutions
Big Data Challenges and SolutionsBig Data Challenges and Solutions
Big Data Challenges and Solutions
 
powerpoint feb
powerpoint febpowerpoint feb
powerpoint feb
 
Ml ppt at
Ml ppt atMl ppt at
Ml ppt at
 
Computer Vision for Beginners
Computer Vision for BeginnersComputer Vision for Beginners
Computer Vision for Beginners
 
Combining out - of - band monitoring with AI and big data for datacenter aut...
Combining out - of - band monitoring with AI and big data  for datacenter aut...Combining out - of - band monitoring with AI and big data  for datacenter aut...
Combining out - of - band monitoring with AI and big data for datacenter aut...
 
Approximation Data Structures for Streaming Applications
Approximation Data Structures for Streaming ApplicationsApproximation Data Structures for Streaming Applications
Approximation Data Structures for Streaming Applications
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Policy Based reinforcement Learning for time series Anomaly detection
Policy Based reinforcement Learning for time series Anomaly detectionPolicy Based reinforcement Learning for time series Anomaly detection
Policy Based reinforcement Learning for time series Anomaly detection
 
An Introduction to Deep Learning
An Introduction to Deep LearningAn Introduction to Deep Learning
An Introduction to Deep Learning
 
Seminar nov2017
Seminar nov2017Seminar nov2017
Seminar nov2017
 
Facial Emotion Detection on Children's Emotional Face
Facial Emotion Detection on Children's Emotional FaceFacial Emotion Detection on Children's Emotional Face
Facial Emotion Detection on Children's Emotional Face
 
Computer Design Concepts for Machine Learning
Computer Design Concepts for Machine LearningComputer Design Concepts for Machine Learning
Computer Design Concepts for Machine Learning
 
Bridging the Gap: Machine Learning for Ubiquitous Computing -- Evaluation
Bridging the Gap: Machine Learning for Ubiquitous Computing -- EvaluationBridging the Gap: Machine Learning for Ubiquitous Computing -- Evaluation
Bridging the Gap: Machine Learning for Ubiquitous Computing -- Evaluation
 

More from Data Works MD

Data Journalism at The Baltimore Banner
Data Journalism at The Baltimore BannerData Journalism at The Baltimore Banner
Data Journalism at The Baltimore BannerData Works MD
 
Jolt’s Picks - Machine Learning and Major League Baseball Hit Streaks
Jolt’s Picks - Machine Learning and Major League Baseball Hit StreaksJolt’s Picks - Machine Learning and Major League Baseball Hit Streaks
Jolt’s Picks - Machine Learning and Major League Baseball Hit StreaksData Works MD
 
Introducing DataWave
Introducing DataWaveIntroducing DataWave
Introducing DataWaveData Works MD
 
Malware Detection, Enabled by Machine Learning
Malware Detection, Enabled by Machine LearningMalware Detection, Enabled by Machine Learning
Malware Detection, Enabled by Machine LearningData Works MD
 
Using AWS, Terraform, and Ansible to Automate Splunk at Scale
Using AWS, Terraform, and Ansible to Automate Splunk at ScaleUsing AWS, Terraform, and Ansible to Automate Splunk at Scale
Using AWS, Terraform, and Ansible to Automate Splunk at ScaleData Works MD
 
A Day in the Life of a Data Journalist
A Day in the Life of a Data JournalistA Day in the Life of a Data Journalist
A Day in the Life of a Data JournalistData Works MD
 
Robotics and Machine Learning: Working with NVIDIA Jetson Kits
Robotics and Machine Learning: Working with NVIDIA Jetson KitsRobotics and Machine Learning: Working with NVIDIA Jetson Kits
Robotics and Machine Learning: Working with NVIDIA Jetson KitsData Works MD
 
Connect Data and Devices with Apache NiFi
Connect Data and Devices with Apache NiFiConnect Data and Devices with Apache NiFi
Connect Data and Devices with Apache NiFiData Works MD
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningData Works MD
 
Data in the City: Analytics and Civic Data in Baltimore
Data in the City: Analytics and Civic Data in BaltimoreData in the City: Analytics and Civic Data in Baltimore
Data in the City: Analytics and Civic Data in BaltimoreData Works MD
 
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...Data Works MD
 
Automated Software Requirements Labeling
Automated Software Requirements LabelingAutomated Software Requirements Labeling
Automated Software Requirements LabelingData Works MD
 
Introduction to Elasticsearch for Business Intelligence and Application Insights
Introduction to Elasticsearch for Business Intelligence and Application InsightsIntroduction to Elasticsearch for Business Intelligence and Application Insights
Introduction to Elasticsearch for Business Intelligence and Application InsightsData Works MD
 
RAPIDS – Open GPU-accelerated Data Science
RAPIDS – Open GPU-accelerated Data ScienceRAPIDS – Open GPU-accelerated Data Science
RAPIDS – Open GPU-accelerated Data ScienceData Works MD
 
Two Algorithms for Weakly Supervised Denoising of EEG Data
Two Algorithms for Weakly Supervised Denoising of EEG DataTwo Algorithms for Weakly Supervised Denoising of EEG Data
Two Algorithms for Weakly Supervised Denoising of EEG DataData Works MD
 
Detecting Lateral Movement with a Compute-Intense Graph Kernel
Detecting Lateral Movement with a Compute-Intense Graph KernelDetecting Lateral Movement with a Compute-Intense Graph Kernel
Detecting Lateral Movement with a Compute-Intense Graph KernelData Works MD
 
Predictive Analytics and Neighborhood Health
Predictive Analytics and Neighborhood HealthPredictive Analytics and Neighborhood Health
Predictive Analytics and Neighborhood HealthData Works MD
 
Social Network Analysis Workshop
Social Network Analysis WorkshopSocial Network Analysis Workshop
Social Network Analysis WorkshopData Works MD
 

More from Data Works MD (18)

Data Journalism at The Baltimore Banner
Data Journalism at The Baltimore BannerData Journalism at The Baltimore Banner
Data Journalism at The Baltimore Banner
 
Jolt’s Picks - Machine Learning and Major League Baseball Hit Streaks
Jolt’s Picks - Machine Learning and Major League Baseball Hit StreaksJolt’s Picks - Machine Learning and Major League Baseball Hit Streaks
Jolt’s Picks - Machine Learning and Major League Baseball Hit Streaks
 
Introducing DataWave
Introducing DataWaveIntroducing DataWave
Introducing DataWave
 
Malware Detection, Enabled by Machine Learning
Malware Detection, Enabled by Machine LearningMalware Detection, Enabled by Machine Learning
Malware Detection, Enabled by Machine Learning
 
Using AWS, Terraform, and Ansible to Automate Splunk at Scale
Using AWS, Terraform, and Ansible to Automate Splunk at ScaleUsing AWS, Terraform, and Ansible to Automate Splunk at Scale
Using AWS, Terraform, and Ansible to Automate Splunk at Scale
 
A Day in the Life of a Data Journalist
A Day in the Life of a Data JournalistA Day in the Life of a Data Journalist
A Day in the Life of a Data Journalist
 
Robotics and Machine Learning: Working with NVIDIA Jetson Kits
Robotics and Machine Learning: Working with NVIDIA Jetson KitsRobotics and Machine Learning: Working with NVIDIA Jetson Kits
Robotics and Machine Learning: Working with NVIDIA Jetson Kits
 
Connect Data and Devices with Apache NiFi
Connect Data and Devices with Apache NiFiConnect Data and Devices with Apache NiFi
Connect Data and Devices with Apache NiFi
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Data in the City: Analytics and Civic Data in Baltimore
Data in the City: Analytics and Civic Data in BaltimoreData in the City: Analytics and Civic Data in Baltimore
Data in the City: Analytics and Civic Data in Baltimore
 
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
 
Automated Software Requirements Labeling
Automated Software Requirements LabelingAutomated Software Requirements Labeling
Automated Software Requirements Labeling
 
Introduction to Elasticsearch for Business Intelligence and Application Insights
Introduction to Elasticsearch for Business Intelligence and Application InsightsIntroduction to Elasticsearch for Business Intelligence and Application Insights
Introduction to Elasticsearch for Business Intelligence and Application Insights
 
RAPIDS – Open GPU-accelerated Data Science
RAPIDS – Open GPU-accelerated Data ScienceRAPIDS – Open GPU-accelerated Data Science
RAPIDS – Open GPU-accelerated Data Science
 
Two Algorithms for Weakly Supervised Denoising of EEG Data
Two Algorithms for Weakly Supervised Denoising of EEG DataTwo Algorithms for Weakly Supervised Denoising of EEG Data
Two Algorithms for Weakly Supervised Denoising of EEG Data
 
Detecting Lateral Movement with a Compute-Intense Graph Kernel
Detecting Lateral Movement with a Compute-Intense Graph KernelDetecting Lateral Movement with a Compute-Intense Graph Kernel
Detecting Lateral Movement with a Compute-Intense Graph Kernel
 
Predictive Analytics and Neighborhood Health
Predictive Analytics and Neighborhood HealthPredictive Analytics and Neighborhood Health
Predictive Analytics and Neighborhood Health
 
Social Network Analysis Workshop
Social Network Analysis WorkshopSocial Network Analysis Workshop
Social Network Analysis Workshop
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

An Asynchronous Distributed Deep Learning Based Intrusion Detection System for IoT Devices

  • 1. AN ASYNCHRONOUS DISTRIBUTED DEEP LEARNING BASED INTRUSION DETECTION SYSTEM FOR IOT DEVICES PU TIAN ADVISOR: DR. WEIXIAN LIAO DEPARTMENT OF COMPUTER AND INFORMATION SCIENCES TOWSON UNIVERSITY 5/29/2019
  • 2. Background • Internet of Things (IoTs). • The connection of a wider range of everyday physical devices, such as smart watch/phone and different sensors. • To collect a wider range of real-time data. • Security issue. • IoT Intrusion Detection System.
  • 3. Design Goals  Effective • Identification of malicious network flow from complicated protocols.  Efficient • Detection in a timely manner.
  • 4. Existing IDS Models  Knowledge Based Method: • To establish exact rules for intrusion behaviors. • Pros: Accurate and fast. • Cons: (1) Vulnerable to new attacks. (2) Time-consuming to create rules manually.
  • 5. Existing IDS Models  Machine Learning(ML) Method: • Build model with labeled/unlabeled training data. • Pros: Improved adaptability. • Cons: (1) Computation resource consuming . (2) Large data transmission for single-node training.
  • 6. General Federated Learning Model  Synchronous Model  Distributed nodes collect and train local data independently.  The central server fetches and aggregates parameters after all agents’ local updates are received.
  • 7. General Federated Learning Model • Pros: Reduced data transmission over the network. • Cons: Performance problem of the slowest client.
  • 8. Design Target  Asynchronous Federated Learning Model  Distributed nodes send their local parameter update requests to the server.  The central server aggregates immediately and sends updated parameters back.
  • 10. Challenges  Existing Solutions for Staleness Problem • Delayed Gradient Approximation Compensation. • Update Weight Adjustment. • Communication Optimization.
  • 11. Proposed Method  Neural Network • Capacity of learning nonlinear complex patterns.
  • 12.  Autoencoder(AE) • Description: A NN used to learn to represent itself as close as possible. • Encoder: Map(encode) input to the latent layer, denoted by 𝓏. • Decoder: Reconstruct the input by mapping 𝓏 to the output layer. Proposed Method
  • 13. Proposed Method  Autoencoder(AE) • Loss function: To measure the discrepancy between the input 𝑥 𝑖 and its reconstruction 𝑥 𝑖 . • Root Mean Squared Error (RMSE) RMSE = ∑ 𝑖=1 𝑛 (𝑥 𝑖− 𝑥 𝑖)2 𝑛  For training: To minimize the RMSE value in order to reconstruct original input.  For execution(detection): A smaller value indicates a higher possibility of similarity to the training instances.
  • 14. Proposed Method  Intrusion Detection with AE 𝑋 𝑖+1 = {𝑥1, 𝑥1, 𝑥1, … … … , 𝑥 𝑛} Case 1: 𝑅𝑀𝑆𝐸 < 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 → 𝑋 𝑖+1 is GOOD. Case 2: 𝑅𝑀𝑆𝐸 > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 → 𝑋 𝑖+1 is BAD. 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 = 0.45
  • 15. Proposed Method  Asynchronous Parameter Update • The gradient descent delay compensation method based on the approximation for the delayed value. * • Originally proposed for image classification with ResNet and adopted for AE in IDS scenario. *Zheng, Shuxin, Qi Meng, Taifeng Wang, Wei Chen, Nenghai Yu, Zhi-Ming Ma, and Tie-Yan Liu. "Asynchronous stochastic gradient descent with delay compensation." In Proceedings of the 34th International Conference on Machine Learning-Volume 70, pp. 4120-4129. JMLR. org, 2017.
  • 16. Experiments  Dataset • CICIDS2017 : Normal and common attacks ranging from 9 a.m., Monday, July 3, 2017 to 5 p.m. on Friday July 7, 2017, for a total of 5 days. • Training Data: 100,000 normal data instances randomly chosen from Monday dataset. • Testing Data: 200,000 normal as well as abnormal data(DDoS) instances extracted .  Experiment Setup • Server and Clients: One parameter server and four clients. • Input Data Dimension: 77 features. • Hidden Layer: 75% of the input layer dimension, 55 in this case. • Parameter Update Method: 50 iterations for local updates and then a request for a global parameter aggregation (20 iterations of global updates).
  • 17. Experiments  Training Errors over Aggregation Epochs
  • 18. Experiments  Metrics • True Positive (TP): Attack data correctly classified as an attack. • False Positive (FP): Normal data incorrectly classified as an attack. • True Negative (TN): Normal data correctly classified as normal. • False Negative (FN): Attack data incorrectly classified as normal. • Accuracy = 𝑇𝑃+𝑇𝑁 𝑇𝑃+𝑇𝑁+𝐹𝑃+𝐹𝑁 • Precision = 𝑇𝑃 𝑇𝑃+𝐹𝑃 • Recall = 𝑇𝑃 𝑇𝑃+𝐹𝑁 • F-Score = 2 × 𝑃𝑟𝑒𝑠𝑖𝑜𝑛 × 𝑅𝑒𝑐𝑎𝑙𝑙 𝑃𝑟𝑒𝑠𝑖𝑜𝑛+ 𝑅𝑒𝑐𝑎𝑙𝑙
  • 19. Experiments  Results Metrics Parameter Update Method Accuracy Precision Recall F-Score Synchronous 98.495% 99.994% 92.539% 96.097% Asynchronous 98.489% 99.992% 92.503% 96.068%
  • 20. Conclusion  Deep learning network (Autoencoder) for intrusion detection.  Asynchronous parameter update for efficiency with accuracy guaranteed.  Test with relatively new dataset.
  • 21. Future Work  Optimize asynchronous parameter update mechanism for large scale distributed IDS network.  Test more attack types.  Give a full theoretical analysis for the convergence of Autoencoder in asynchronous parameter update scenario.