{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T17:25:06Z","timestamp":1776965106952,"version":"3.51.4"},"publisher-location":"New York, New York, USA","reference-count":30,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3368926.3369705","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T13:30:11Z","timestamp":1576848611000},"page":"273-279","source":"Crossref","is-referenced-by-count":139,"title":["Multi-Task Network Anomaly Detection using Federated Learning"],"prefix":"10.1145","author":[{"given":"Ying","family":"Zhao","sequence":"first","affiliation":[{"name":"Beijing University of Chemical Technology, Beijing, China"}]},{"given":"Junjun","family":"Chen","sequence":"additional","affiliation":[{"name":"Beijing University of Chemical Technology, Beijing, China"}]},{"given":"Di","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, Australia"}]},{"given":"Jian","family":"Teng","sequence":"additional","affiliation":[{"name":"Beijing University of Chemical Technology, Beijing, China"}]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, Australia"}]}],"member":"320","reference":[{"key":"key-10.1145\/3368926.3369705-1","doi-asserted-by":"crossref","unstructured":"Jasmin Kevric, Samed Jukic, and Abdulhamit Subasi. An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Computing and Applications, 28(1):1051--1058, 2017.","DOI":"10.1007\/s00521-016-2418-1"},{"key":"key-10.1145\/3368926.3369705-2","doi-asserted-by":"crossref","unstructured":"Rana Aamir Raza Ashfaq, Xi-Zhao Wang, Joshua Zhexue Huang, Haider Abbas, and Yu-Lin He. Fuzziness based semi-supervised learning approach for intrusion detection system. Information Sciences, 378:484--497, 2017.","DOI":"10.1016\/j.ins.2016.04.019"},{"key":"key-10.1145\/3368926.3369705-3","doi-asserted-by":"crossref","unstructured":"Wathiq Laftah Al-Yaseen, Zulaiha Ali Othman, and Mohd Zakree Ahmad Nazri. Multilevel hybrid support vector machine and extreme learning machine based on modified k-means for intrusion detection system. Expert Systems with Applications, 67:296--303, 2017.","DOI":"10.1016\/j.eswa.2016.09.041"},{"key":"key-10.1145\/3368926.3369705-4","doi-asserted-by":"crossref","unstructured":"Shui Yu, Wanlei Zhou, Weijia Jia, Song Guo, Yong Xiang, and Feilong Tang. Discriminating ddos attacks from flash crowds using flow correlation coefficient. IEEE Transactions on Parallel and Distributed Systems, 23(6):1073--1080, 2011.","DOI":"10.1109\/TPDS.2011.262"},{"key":"key-10.1145\/3368926.3369705-5","unstructured":"Sahil Garg, Kuljeet Kaur, Neeraj Kumar, and Joel JPC Rodrigues. Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in sdn: A social multimedia perspective. IEEE Transactions on Multimedia, 21(3):566--578, 2019."},{"key":"key-10.1145\/3368926.3369705-6","doi-asserted-by":"crossref","unstructured":"Nathan Shone, Tran Nguyen Ngoc, Vu Dinh Phai, and Qi Shi. A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1):41--50, 2018.","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"key-10.1145\/3368926.3369705-7","doi-asserted-by":"crossref","unstructured":"Zhipeng Li, Zheng Qin, Kai Huang, Xiao Yang, and Shuxiong Ye. Intrusion detection using convolutional neural networks for representation learning. In International Conference on Neural Information Processing, pages 858--866. Springer, 2017.","DOI":"10.1007\/978-3-319-70139-4_87"},{"key":"key-10.1145\/3368926.3369705-8","doi-asserted-by":"crossref","unstructured":"Tuan A Tang, Lotfi Mhamdi, Des McLernon, Syed Ali Raza Zaidi, and Mounir Ghogho. Deep learning approach for network intrusion detection in software defined networking. In 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pages 258--263. IEEE, 2016.","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"key-10.1145\/3368926.3369705-9","doi-asserted-by":"crossref","unstructured":"Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. Kitsune: an ensemble of autoencoders for online network intrusion detection. In Network and Distributed Systems Security Symposium (NDSS), 2018.","DOI":"10.14722\/ndss.2018.23204"},{"key":"key-10.1145\/3368926.3369705-10","doi-asserted-by":"crossref","unstructured":"He Huang, Haojiang Deng, Jun Chen, Luchao Han, and Wei Wang. Automatic multi-task learning system for abnormal network traffic detection. International Journal of Emerging Technologies in Learning, 13(4), 2018.","DOI":"10.3991\/ijet.v13i04.8466"},{"key":"key-10.1145\/3368926.3369705-11","unstructured":"Shahbaz Rezaei and Xin Liu. Multi-task learning for network traffic classification. arXiv preprint arXiv:1906.05248, 2019."},{"key":"key-10.1145\/3368926.3369705-12","doi-asserted-by":"crossref","unstructured":"Haifeng Sun, Yunming Xiao, Jing Wang, Jingyu Wang, Qi Qi, Jianxin Liao, and Xiulei Liu. Common knowledge based and one-shot learning enabled multi-task traffic classification. IEEE Access, 7:39485--39495, 2019.","DOI":"10.1109\/ACCESS.2019.2904039"},{"key":"key-10.1145\/3368926.3369705-13","unstructured":"Zilong Lin, Yong Shi, and Zhi Xue. Idsgan: Generative adversarial networks for attack generation against intrusion detection. arXiv preprint arXiv:1809.02077, 2018."},{"key":"key-10.1145\/3368926.3369705-14","unstructured":"Shui Yu, Song Guo, and Ivan Stojmenovic. Fool me if you can: Mimicking attacks and anti-attacks in cyberspace. IEEE Transactions on Computers, 64(1):139--151, 2013."},{"key":"key-10.1145\/3368926.3369705-15","unstructured":"Jakub Kone&#269;ny, H Brendan McMahan, Felix X Yu, Peter Richt&#225;rik, Ananda Theertha Suresh, and Dave Bacon. Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492, 2016."},{"key":"key-10.1145\/3368926.3369705-16","unstructured":"Jakub Kone&#269;ny, H Brendan McMahan, Daniel Ramage, and Peter Richt&#225;rik. Federated optimization: Distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527, 2016."},{"key":"key-10.1145\/3368926.3369705-17","unstructured":"Evita Bakopoulou, Balint Tillman, and Athina Markopoulou. A federated learning approach for mobile packet classification. arXiv preprint arXiv:1907.13113, 2019."},{"key":"key-10.1145\/3368926.3369705-18","unstructured":"H Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, et al. Communication-efficient learning of deep networks from decentralized data. arXiv preprint arXiv:1602.05629, 2016."},{"key":"key-10.1145\/3368926.3369705-19","unstructured":"Qiang Yang, Yang Liu, Tianjian Chen, and Yongxin Tong. Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST), 10(2):12, 2019."},{"key":"key-10.1145\/3368926.3369705-20","doi-asserted-by":"crossref","unstructured":"Reza Shokri and Vitaly Shmatikov. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pages 1310--1321. ACM, 2015.","DOI":"10.1145\/2810103.2813687"},{"key":"key-10.1145\/3368926.3369705-21","unstructured":"Donna Xu, Yaxin Shi, Ivor W Tsang, Yew-Soon Ong, Chen Gong, and Xiaobo Shen. A survey on multi-output learning. arXiv preprint arXiv:1901.00248, 2019."},{"key":"key-10.1145\/3368926.3369705-22","unstructured":"Yu Zhang and Qiang Yang. A survey on multi-task learning. arXiv preprint arXiv:1707.08114, 2017."},{"key":"key-10.1145\/3368926.3369705-23","doi-asserted-by":"crossref","unstructured":"Wenyi Huang and Jack W Stokes. Mtnet: a multi-task neural network for dynamic malware classification. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 399--418. Springer, 2016.","DOI":"10.1007\/978-3-319-40667-1_20"},{"key":"key-10.1145\/3368926.3369705-24","unstructured":"Andrew L Maas, Awni Y Hannun, and Andrew Y Ng. Rectifier nonlinearities improve neural network acoustic models. In The 30th International Conference on Machine Learning, volume 30, page 3, 2013."},{"key":"key-10.1145\/3368926.3369705-25","unstructured":"Inc The Tor Project. Tor: Anonymity online, 2015."},{"key":"key-10.1145\/3368926.3369705-26","doi-asserted-by":"crossref","unstructured":"Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou, and Jie Wu. Robust network traffic classification. IEEE\/ACM Transactions on Networking (TON), 23(4):1257--1270, 2015.","DOI":"10.1109\/TNET.2014.2320577"},{"key":"key-10.1145\/3368926.3369705-27","unstructured":"Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. In International Conference on Learning Representations, 2015."},{"key":"key-10.1145\/3368926.3369705-28","doi-asserted-by":"crossref","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In Proceedings of the 4th International Conference on Information Systems Security and Privacy, pages 108--116, 2018.","DOI":"10.5220\/0006639801080116"},{"key":"key-10.1145\/3368926.3369705-29","doi-asserted-by":"crossref","unstructured":"Gerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, and Ali A Ghorbani. Characterization of encrypted and vpn traffic using time-related. In Proceedings of the 2nd international conference on information systems security and privacy (ICISSP'16), pages 407--414, 2016.","DOI":"10.5220\/0005740704070414"},{"key":"key-10.1145\/3368926.3369705-30","doi-asserted-by":"crossref","unstructured":"Arash Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful Islam Mamun, and Ali A Ghorbani. Characterization of tor traffic using time based features. In Proceedings of the 3rd international conference on information systems security and privacy (ICISSP'17), pages 253--262, 2017.","DOI":"10.5220\/0006105602530262"}],"event":{"name":"the Tenth International Symposium","location":"Hanoi, Ha Long Bay, Viet Nam","acronym":"SoICT 2019","number":"10","sponsor":["SOICT, School of Information and Communication Technology - HUST","NAFOSTED, The National Foundation for Science and Technology Development"],"start":{"date-parts":[[2019,12,4]]},"end":{"date-parts":[[2019,12,6]]}},"container-title":["Proceedings of the Tenth International Symposium on Information and Communication Technology  - SoICT 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368926.3369705","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3369705&ftid=2101276&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:51Z","timestamp":1750203891000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3368926.3369705"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1145\/3368926.3369705","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}