{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T19:21:50Z","timestamp":1774293710954,"version":"3.50.1"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031757631","type":"print"},{"value":"9783031757648","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-75764-8_15","type":"book-chapter","created":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T11:03:12Z","timestamp":1729594992000},"page":"286-306","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["FedMADE: Robust Federated Learning for\u00a0Intrusion Detection in\u00a0IoT Networks Using a\u00a0Dynamic Aggregation Method"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0365-1390","authenticated-orcid":false,"given":"Shihua","family":"Sun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3256-6427","authenticated-orcid":false,"given":"Pragya","family":"Sharma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7208-909X","authenticated-orcid":false,"given":"Kenechukwu","family":"Nwodo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9888-0592","authenticated-orcid":false,"given":"Angelos","family":"Stavrou","sequence":"additional","affiliation":[]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,17]]},"reference":[{"key":"15_CR1","unstructured":"Dpkt library. https:\/\/dpkt.readthedocs.io\/en\/latest\/. Accessed 25 Apr 2024"},{"issue":"5","key":"15_CR2","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","volume":"6","author":"E Anthi","year":"2019","unstructured":"Anthi, E., Williams, L., S\u0142owi\u0144ska, M., Theodorakopoulos, G., Burnap, P.: A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J. 6(5), 9042\u20139053 (2019)","journal-title":"IEEE Internet Things J."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Dina Ayesha, S., Siddique, A.B., Manivannan, D.: FS3: few-shot and self-supervised framework for efficient intrusion detection in Internet of Things networks. In: Proceedings of the 39th Annual Computer Security Applications Conference (ACSAC), pp. 138\u2013149. Association for Computing Machinery (2023)","DOI":"10.1145\/3627106.3627193"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Belarbi, O., Spyridopoulos, T., Anthi, E., Mavromatis, I., Carnelli, P., Khan, A.: Federated deep learning for intrusion detection in IoT networks. In: IEEE Global Communications Conference (GLOBECOM), pp. 237\u2013242 (2023)","DOI":"10.1109\/GLOBECOM54140.2023.10437860"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"15_CR6","unstructured":"Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD), pp. 226\u2013231. AAAI Press (1996)"},{"key":"15_CR7","unstructured":"Fraboni, Y., Vidal, R., Kameni, L., Lorenzi, M.: Clustered sampling: low-variance and improved representativity for clients selection in federated learning. In: International Conference on Machine Learning (ICML), pp. 3407\u20133416 (2021)"},{"key":"15_CR8","unstructured":"Huang, Y., Gupta, S., Song, Z., Li, K., Arora, S.: Evaluating gradient inversion attacks and defenses in federated learning. In: Advances in Neural Information Processing Systems (NIPS), vol.\u00a034, pp. 7232\u20137241 (2021)"},{"key":"15_CR9","unstructured":"Karimireddy, S.P., Kale, S., Mohri, M., Reddi, S., Stich, S., Suresh, A.T.: SCAFFOLD: stochastic controlled averaging for federated learning. In: International Conference on Machine Learning (ICML), pp. 5132\u20135143 (2020)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Khoa, T.V., et al.: Collaborative learning model for cyberattack detection systems in IoT industry 4.0. In: IEEE Wireless Communications and Networking Conference (WCNC), pp.\u00a01\u20136 (2020)","DOI":"10.1109\/WCNC45663.2020.9120761"},{"issue":"1","key":"15_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 1\u201322 (2019)","journal-title":"Cybersecurity"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 100, 779\u2013796 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Li, Q., He, B., Song, D.: Model-contrastive federated learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 10713\u201310722 (2021)","DOI":"10.1109\/CVPR46437.2021.01057"},{"key":"15_CR14","unstructured":"Li, T., Sahu, A.K., Zaheer, M., Sanjabi, M., Talwalkar, A., Smith, V.: Federated optimization in heterogeneous networks. In: Proceedings of Machine Learning and Systems (MLSys), vol. 2, pp. 429\u2013450 (2020)"},{"issue":"8","key":"15_CR15","doi-asserted-by":"publisher","first-page":"6348","DOI":"10.1109\/JIOT.2020.3011726","volume":"8","author":"Y Liu","year":"2021","unstructured":"Liu, Y., et al.: Deep anomaly detection for time-series data in industrial IoT: a communication-efficient on-device federated learning approach. IEEE Internet Things J. 8(8), 6348\u20136358 (2021)","journal-title":"IEEE Internet Things J."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Luo, J., Wu, S.: FedSLD: federated learning with shared label distribution for medical image classification. In: 2022 IEEE 19th International Symposium on Biomedical Imaging (ISBI), pp.\u00a01\u20135 (2022)","DOI":"10.1109\/ISBI52829.2022.9761404"},{"key":"15_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116822","volume":"198","author":"J Maldonado","year":"2022","unstructured":"Maldonado, J., Riff, M.C., Neveu, B.: A review of recent approaches on wrapper feature selection for intrusion detection. Expert Syst. Appl. 198, 116822 (2022)","journal-title":"Expert Syst. Appl."},{"key":"15_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106301","volume":"92","author":"M Masdari","year":"2020","unstructured":"Masdari, M., Khezri, H.: A survey and taxonomy of the fuzzy signature-based intrusion detection systems. Appl. Soft Comput. 92, 106301 (2020)","journal-title":"Appl. Soft Comput."},{"key":"15_CR19","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y\u00a0Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics (AISTATS), pp. 1273\u20131282. PMLR (2017)"},{"issue":"3","key":"15_CR20","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., et al.: N-BaIoT\u2014network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"issue":"4","key":"15_CR21","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/JIOT.2021.3077803","volume":"9","author":"V Mothukuri","year":"2022","unstructured":"Mothukuri, V., Khare, P., Parizi, R.M., Pouriyeh, S., Dehghantanha, A., Srivastava, G.: Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet Things J. 9(4), 2545\u20132554 (2022)","journal-title":"IEEE Internet Things J."},{"key":"15_CR22","volume":"72","author":"N Moustafa","year":"2021","unstructured":"Moustafa, N.: A new distributed architecture for evaluating AI-based security systems at the edge: network TON_IoT datasets. Sustain. Urban Areas 72, 102994 (2021)","journal-title":"Sustain. Urban Areas"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems. In: 2015 Military Communications and Information Systems Conference (MilCIS), pp.\u00a01\u20136 (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"13","key":"15_CR24","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto, E.C.P., Dadkhah, S., Ferreira, R., Zohourian, A., Lu, R., Ghorbani, A.A.: CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors 23(13), 5941 (2023)","journal-title":"Sensors"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Marchal, S., Miettinen, M., Fereidooni, H., Asokan, N., Sadeghi, A.R.: D\u00efot: a federated self-learning anomaly detection system for IoT. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 756\u2013767. IEEE (2019)","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Rieger, P., Miettinen, M., Sadeghi, A.R.: Poisoning attacks on federated learning-based IoT intrusion detection system. In: Proceedings of Workshop Decentralized IoT Systems and Security (DISS), vol.\u00a079 (2020)","DOI":"10.14722\/diss.2020.23003"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Nguyen, T.A., He, J., Le, L.T., Bao, W., Tran, N.H.: Federated PCA on grassmann manifold for anomaly detection in IoT networks. In: IEEE Conference on Computer Communications (INFOCOM), pp. 1\u201310 (2023)","DOI":"10.1109\/INFOCOM53939.2023.10229026"},{"key":"15_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2020.122877","volume":"274","author":"S Ni\u017eeti\u0107","year":"2020","unstructured":"Ni\u017eeti\u0107, S., \u0160oli\u0107, P., Gonzalez-De, D.L.I., Patrono, L., et al.: Internet of Things (IoT): opportunities, issues and challenges towards a smart and sustainable future. J. Clean. Prod. 274, 122877 (2020)","journal-title":"J. Clean. Prod."},{"issue":"02","key":"15_CR29","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","volume":"7","author":"H Pajouh","year":"2019","unstructured":"Pajouh, H., Javidan, R., Khayami, R., Dehghantanha, A., Choo, K.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. 7(02), 314\u2013323 (2019)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"5","key":"15_CR30","doi-asserted-by":"publisher","first-page":"3930","DOI":"10.1109\/JIOT.2021.3100755","volume":"9","author":"SI Popoola","year":"2022","unstructured":"Popoola, S.I., Ande, R., Adebisi, B., Gui, G., Hammoudeh, M., Jogunola, O.: Federated deep learning for zero-day botnet attack detection in IoT-edge devices. IEEE Internet Things J. 9(5), 3930\u20133944 (2022)","journal-title":"IEEE Internet Things J."},{"key":"15_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108693","volume":"204","author":"V Rey","year":"2022","unstructured":"Rey, V., S\u00e1nchez S\u00e1nchez, P.M., Huertas Celdr\u00e1n, A., Bovet, G.: Federated learning for malware detection in IoT devices. Comput. Netw. 204, 108693 (2022)","journal-title":"Comput. Netw."},{"key":"15_CR32","unstructured":"Shi, S., et al.: Harvesting private medical images in federated learning systems with crafted models. arXiv (2024)"},{"key":"15_CR33","unstructured":"Shi, S., et al.: Scale-MIA: a scalable model inversion attack against secure federated learning via latent space reconstruction. arXiv (2023)"},{"key":"15_CR34","unstructured":"Sun, S., Sugrim, S., Stavrou, A., Wang, H.: Partner in crime: boosting targeted poisoning attacks against federated learning. arXiv (2024)"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp.\u00a01\u20136 (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Wang, L., Xu, S., Wang, X., Zhu, Q.: Addressing class imbalance in federated learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 10165\u201310173 (2021)","DOI":"10.1609\/aaai.v35i11.17219"},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"Wang, N., Chen, Y., Hu, Y., Lou, W., Hou, Y.T.: FeCo: boosting intrusion detection capability in IoT networks via contrastive learning. In: IEEE Conference on Computer Communications (INFOCOM). pp. 1409\u20131418 (2022)","DOI":"10.1109\/INFOCOM48880.2022.9796926"},{"issue":"5","key":"15_CR38","doi-asserted-by":"publisher","first-page":"3099","DOI":"10.1109\/TNSE.2022.3146399","volume":"9","author":"H Wu","year":"2022","unstructured":"Wu, H., Wang, P.: Node selection toward faster convergence for federated learning on non-IID data. IEEE Trans. Netw. Sci. Eng. 9(5), 3099\u20133111 (2022)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"15_CR39","unstructured":"Xu, J., Tong, X., Huang, S.L.: Personalized federated learning with feature alignment and classifier collaboration. In: The Eleventh International Conference on Learning Representations (ICLR) (2023)"},{"key":"15_CR40","unstructured":"Yoon, T., Shin, S., Hwang, S.J., Yang, E.: FedMix: approximation of mixup under mean augmented federated learning. arxiv (2021)"},{"key":"15_CR41","doi-asserted-by":"crossref","unstructured":"Zhang, C., Wang, N., Shi, S., Du, C., Lou, W., Hou, Y.T.: MINDFL: mitigating the impact of imbalanced and noisy-labeled data in federated learning with quality and fairness-aware client selection. In: IEEE Military Communications Conference (MILCOM), pp. 331\u2013338 (2023)","DOI":"10.1109\/MILCOM58377.2023.10356215"},{"key":"15_CR42","unstructured":"Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., Chandra, V.: Federated learning with non-IID data. arXiv (2018)"},{"issue":"4","key":"15_CR43","doi-asserted-by":"publisher","first-page":"6822","DOI":"10.1109\/JIOT.2019.2912022","volume":"6","author":"M Zolanvari","year":"2019","unstructured":"Zolanvari, M., Teixeira, M.A., Gupta, L., Khan, K.M., Jain, R.: Machine learning-based network vulnerability analysis of industrial Internet of Things. IEEE Internet Things J. 6(4), 6822\u20136834 (2019)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-75764-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T11:08:07Z","timestamp":1729595287000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-75764-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"ISBN":["9783031757631","9783031757648"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-75764-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"17 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc24.cs.gmu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}