{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T04:28:36Z","timestamp":1746764916082,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031226762"},{"type":"electronic","value":"9783031226779"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-22677-9_17","type":"book-chapter","created":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T09:04:32Z","timestamp":1673341472000},"page":"313-329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Federated Learning-Based Intrusion Detection on\u00a0Non-IID Data"],"prefix":"10.1007","author":[{"given":"Yongfei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Guangjun","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7287-6883","authenticated-orcid":false,"given":"Wenyuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,11]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Ayed, M.A., Talhi, C.: Federated learning for anomaly-based intrusion detection. In: 2021 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1\u20138. IEEE (2021)","DOI":"10.1109\/ISNCC52172.2021.9615816"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Campos, E.M., et al.: Evaluating federated learning for intrusion detection in internet of things: review and challenges. Comput. Netw. 108661 (2021)","DOI":"10.1016\/j.comnet.2021.108661"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"17_CR4","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/978-3-030-95388-1_37","volume-title":"ICA3PP 2021","author":"G Chen","year":"2021","unstructured":"Chen, G., Zheng, J., Yang, S., Zhou, J., Wu, W.: Fsafa-stacking2: an effective ensemble learning model for intrusion detection with firefly algorithm based feature selection. In: Lai, Y., Wang, T., Jiang, M., Xu, G., Liang, W., Castiglione, A. (eds.) ICA3PP 2021. LNCS, vol. 13156, pp. 555\u2013570. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-95388-1_37"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"217463","DOI":"10.1109\/ACCESS.2020.3041793","volume":"8","author":"Z Chen","year":"2020","unstructured":"Chen, Z., Lv, N., Liu, P., Fang, Y., Chen, K., Pan, W.: Intrusion detection for wireless edge networks based on federated learning. IEEE Access 8, 217463\u2013217472 (2020)","journal-title":"IEEE Access"},{"key":"17_CR6","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-030-95384-3_13","volume-title":"ICA3PP 2021","author":"J Ding","year":"2021","unstructured":"Ding, J., Lin, F., Lv, S.: Temporal convolution network based on attention for intelligent anomaly detection of wind turbine blades. In: Lai, Y., Wang, T., Jiang, M., Xu, G., Liang, W., Castiglione, A. (eds.) ICA3PP 2021. LNCS, vol. 13155, pp. 193\u2013209. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-95384-3_13"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Duan, M., et al.: Astraea: self-balancing federated learning for improving classification accuracy of mobile deep learning applications. In: 2019 IEEE 37th International Conference on Computer Design (ICCD), pp. 246\u2013254. IEEE (2019)","DOI":"10.1109\/ICCD46524.2019.00038"},{"key":"17_CR8","unstructured":"Hsu, T.M.H., Qi, H., Brown, M.: Measuring the effects of non-identical data distribution for federated visual classification. arXiv preprint arXiv:1909.06335 (2019)"},{"issue":"9","key":"17_CR9","volume":"3","author":"A Javaid","year":"2016","unstructured":"Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. EAI Endorsed Trans. Secur. Saf. 3(9), e2 (2016)","journal-title":"EAI Endorsed Trans. Secur. Saf."},{"key":"17_CR10","unstructured":"Kairouz, P., et al.: Advances and open problems in federated learning. Found. Trends\u00ae Mach. Learn. 14(1\u20132), 1\u2013210 (2021)"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Kim, S., Cai, H., Hua, C., Gu, P., Xu, W., Park, J.: Collaborative anomaly detection for internet of things based on federated learning. In: 2020 IEEE\/CIC International Conference on Communications in China (ICCC), pp. 623\u2013628. IEEE (2020)","DOI":"10.1109\/ICCC49849.2020.9238913"},{"issue":"8","key":"17_CR12","doi-asserted-by":"publisher","first-page":"6348","DOI":"10.1109\/JIOT.2020.3011726","volume":"8","author":"Y Liu","year":"2020","unstructured":"Liu, Y., et al.: Deep anomaly detection for time-series data in industrial IoT: a communication-efficient on-device federated learning approach. IEEE Internet Things J. 8(8), 6348\u20136358 (2020)","journal-title":"IEEE Internet Things J."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Y., Kumar, N., Xiong, Z., Lim, W.Y.B., Kang, J., Niyato, D.: Communication-efficient federated learning for anomaly detection in industrial internet of things. In: GLOBECOM 2020\u20132020 IEEE Global Communications Conference, pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/GLOBECOM42002.2020.9348249"},{"key":"17_CR14","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-030-95391-1_4","volume-title":"ICA3PP 2021","author":"P Lv","year":"2021","unstructured":"Lv, P., Xie, L., Xu, J., Li, T.: Misbehavior detection in VANET based on federated learning and blockchain. In: Lai, Y., Wang, T., Jiang, M., Xu, G., Liang, W., Castiglione, A. (eds.) ICA3PP 2021. LNCS, vol. 13157, pp. 52\u201364. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-95391-1_4"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Man, D., Zeng, F., Yang, W., Yu, M., Lv, J., Wang, Y.: Intelligent intrusion detection based on federated learning for edge-assisted internet of things. Secur. Commun. Netw. 2021 (2021)","DOI":"10.1155\/2021\/9361348"},{"key":"17_CR16","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, pp. 1273\u20131282. PMLR (2017)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Mothukuri, V., Khare, P., Parizi, R.M., Pouriyeh, S., Dehghantanha, A., Srivastava, G.: Federated learning-based anomaly detection for IoT security attacks. IEEE Internet Things J. (2021)","DOI":"10.1109\/JIOT.2021.3077803"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"17_CR19","unstructured":"Odena, A., Olah, C., Shlens, J.: Conditional image synthesis with auxiliary classifier GANs. In: International Conference on Machine Learning, pp. 2642\u20132651. PMLR (2017)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Popoola, S.I., Ande, R., Adebisi, B., Gui, G., Hammoudeh, M., Jogunola, O.: Federated deep learning for zero-day botnet attack detection in IoT edge devices. IEEE Internet Things J. (2021)","DOI":"10.3390\/electronics10091104"},{"issue":"6","key":"17_CR21","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/MNET.011.2000286","volume":"34","author":"SA Rahman","year":"2020","unstructured":"Rahman, S.A., Tout, H., Talhi, C., Mourad, A.: Internet of things intrusion detection: centralized, on-device, or federated learning? IEEE Netw. 34(6), 310\u2013317 (2020)","journal-title":"IEEE Netw."},{"key":"17_CR22","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/978-3-030-95384-3_37","volume-title":"ICA3PP 2021","author":"G Ren","year":"2021","unstructured":"Ren, G., Zhang, Y., Zhang, S., Long, H.: Edge DDoS attack detection method based on software defined networks. In: Lai, Y., Wang, T., Jiang, M., Xu, G., Liang, W., Castiglione, A. (eds.) ICA3PP 2021. LNCS, vol. 13155, pp. 597\u2013611. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-95384-3_37"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Wang, H., Mu\u00f1oz-Gonz\u00e1lez, L., Eklund, D., Raza, S.: Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection. In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 153\u2013163 (2021)","DOI":"10.1145\/3448300.3467827"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Weinger, B., Kim, J., Sim, A., Nakashima, M., Moustafa, N., Wu, K.J.: Enhancing IoT anomaly detection performance for federated learning. Digit. Commun. Netw. (2022)","DOI":"10.1016\/j.dcan.2022.02.007"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Yadav, K., Gupta, B., Hsu, C.H., Chui, K.T.: Unsupervised federated learning based IoT intrusion detection. In: 2021 IEEE 10th Global Conference on Consumer Electronics (GCCE), pp. 298\u2013301. IEEE (2021)","DOI":"10.1109\/GCCE53005.2021.9621784"},{"key":"17_CR26","unstructured":"Yurochkin, M., Agarwal, M., Ghosh, S., Greenewald, K., Hoang, N., Khazaeni, Y.: Bayesian nonparametric federated learning of neural networks. In: International Conference on Machine Learning, pp. 7252\u20137261. PMLR (2019)"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Chen, J., Wu, D., Teng, J., Yu, S.: Multi-task network anomaly detection using federated learning. In: Proceedings of the Tenth International Symposium on Information and Communication Technology, pp. 273\u2013279 (2019)","DOI":"10.1145\/3368926.3369705"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22677-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T09:08:28Z","timestamp":1673341708000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22677-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031226762","9783031226779"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22677-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"11 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"91","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}