{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:58Z","timestamp":1750309438450,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:00:00Z","timestamp":1731974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Business Finland","award":["9665\/31\/2022"],"award-info":[{"award-number":["9665\/31\/2022"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,19]]},"DOI":"10.1145\/3703790.3703822","type":"proceedings-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T12:30:00Z","timestamp":1744115400000},"page":"273-278","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Federated Learning-powered DDoS Attack Detection for Securing Cyber Physical Systems in 5G and Beyond Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9003-9581","authenticated-orcid":false,"given":"Pramod","family":"Munaweera","sequence":"first","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7726-5063","authenticated-orcid":false,"given":"Suranga","family":"Prasad","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4520-6542","authenticated-orcid":false,"given":"Tharaka","family":"Hewa","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5992-891X","authenticated-orcid":false,"given":"Yushan","family":"Siriwardhana","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8079-5514","authenticated-orcid":false,"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]}],"member":"320","published-online":{"date-parts":[[2025,3,31]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Ijaz Ahmad Tanesh Kumar Madhusanka Liyanage Jude Okwuibe Mika Ylianttila and Andrei Gurtov. 2018. Overview of 5G Security Challenges and Solutions. IEEE Communications Standards Magazine 2 1 (2018) 36\u201343. 10.1109\/MCOMSTD.2018.1700063","DOI":"10.1109\/MCOMSTD.2018.1700063"},{"key":"e_1_3_3_1_3_2","first-page":"2938","volume-title":"International conference on artificial intelligence and statistics","author":"Bagdasaryan Eugene","year":"2020","unstructured":"Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2020. How to backdoor federated learning. In International conference on artificial intelligence and statistics. PMLR, 2938\u20132948."},{"key":"e_1_3_3_1_4_2","first-page":"634","volume-title":"International conference on machine learning","author":"Bhagoji Arjun\u00a0Nitin","year":"2019","unstructured":"Arjun\u00a0Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, and Seraphin Calo. 2019. Analyzing federated learning through an adversarial lens. In International conference on machine learning. PMLR, 634\u2013643."},{"key":"e_1_3_3_1_5_2","unstructured":"Peva Blanchard El\u00a0Mahdi El\u00a0Mhamdi Rachid Guerraoui and Julien Stainer. 2017. Machine learning with adversaries: Byzantine tolerant gradient descent. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838942"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSDE56538.2022.10089285"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Taki Eddine\u00a0Toufik Djaidja Bouziane Brik Abdelwahab Boualouache Sidi\u00a0Mohammed Senouci and Yacine Ghamri-Doudane. 2024. Federated learning for 5G and beyond a blessing and a curse-an experimental study on intrusion detection systems. Computers & Security 139 (2024) 103707.","DOI":"10.1016\/j.cose.2024.103707"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327918"},{"volume-title":"Flower A Friendly Federated Learning Framework","year":"2024","key":"e_1_3_3_1_10_2","unstructured":"Flower 2024. Flower A Friendly Federated Learning Framework. Retrieved September 30, 2024 from https:\/\/flower.ai\/"},{"key":"e_1_3_3_1_11_2","unstructured":"Jonas Geiping Liam Fowl W\u00a0Ronny Huang Wojciech Czaja Gavin Taylor Michael Moeller and Tom Goldstein. 2020. Witches\u2019 brew: Industrial scale data poisoning via gradient matching. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2009.02276 (2020)."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Xueluan Gong Yanjiao Chen Huayang Huang Yuqing Liao Shuai Wang and Qian Wang. 2022. Coordinated backdoor attacks against federated learning with model-dependent triggers. IEEE network 36 1 (2022) 84\u201390.","DOI":"10.1109\/MNET.011.2000783"},{"key":"e_1_3_3_1_13_2","first-page":"3521","volume-title":"International Conference on Machine Learning","author":"Guerraoui Rachid","year":"2018","unstructured":"Rachid Guerraoui, S\u00e9bastien Rouault, et\u00a0al. 2018. The hidden vulnerability of distributed learning in byzantium. In International Conference on Machine Learning. PMLR, 3521\u20133530."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Bilal Hussain Qinghe Du Bo Sun and Zhiqiang Han. 2020. Deep learning-based DDoS-attack detection for cyber\u2013physical system over 5G network. IEEE Transactions on Industrial Informatics 17 2 (2020) 860\u2013870.","DOI":"10.1109\/TII.2020.2974520"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Jiaqi Li Zhifeng Zhao and Rongpeng Li. 2018. Machine learning-based IDS for software-defined 5G network. Iet Networks 7 2 (2018) 53\u201360.","DOI":"10.1049\/iet-net.2017.0212"},{"key":"e_1_3_3_1_16_2","unstructured":"Suyi Li Yong Cheng Wei Wang Yang Liu and Tianjian Chen. 2020. Learning to detect malicious clients for robust federated learning. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2002.00211 (2020)."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Yunlong Lu Xiaohong Huang Ke Zhang Sabita Maharjan and Yan Zhang. 2020. Communication-efficient federated learning for digital twin edge networks in industrial IoT. IEEE Transactions on Industrial Informatics 17 8 (2020) 5709\u20135718.","DOI":"10.1109\/TII.2020.3010798"},{"key":"e_1_3_3_1_18_2","unstructured":"Lingjuan Lyu Han Yu Xingjun Ma Chen Chen Lichao Sun Jun Zhao Qiang Yang and S\u00a0Yu Philip. 2022. Privacy and robustness in federated learning: Attacks and defenses. IEEE transactions on neural networks and learning systems (2022)."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Ishtiaque Mahmood Tahir Alyas Sagheer Abbas Tariq Shahzad Qaiser Abbas and Khmaies Ouahada. 2023. Intrusion Detection in 5G Cellular Network Using Machine Learning. Computer Systems Science & Engineering 47 2 (2023).","DOI":"10.32604\/csse.2023.033842"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC51059.2022.9992702"},{"key":"e_1_3_3_1_21_2","first-page":"1273","volume-title":"Artificial intelligence and statistics","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise\u00a0Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR, 1273\u20131282."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSN53354.2021.00044"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Viraaji Mothukuri Reza\u00a0M Parizi Seyedamin Pouriyeh Yan Huang Ali Dehghantanha and Gautam Srivastava. 2021. A survey on security and privacy of federated learning. Future Generation Computer Systems 115 (2021) 619\u2013640.","DOI":"10.1016\/j.future.2020.10.007"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC50213.2020.00019"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","unstructured":"Raheeb Muzaffar Mahin Ahmed Emiliano Sisinni Thilo Sauter and Hans-Peter Bernhard. 2023. 5G Deployment Models and Configuration Choices for Industrial Cyber-Physical Systems \u2013 A State of Art Overview. IEEE Transactions on Industrial Cyber-Physical Systems 1 (2023) 236\u2013256. 10.1109\/TICPS.2023.3311394","DOI":"10.1109\/TICPS.2023.3311394"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS49255.2021.9468259"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"e_1_3_3_1_28_2","unstructured":"Hongyi Wang Kartik Sreenivasan Shashank Rajput Harit Vishwakarma Saurabh Agarwal Jy-yong Sohn Kangwook Lee and Dimitris Papailiopoulos. 2020. Attack of the tails: Yes you really can backdoor federated learning. Advances in Neural Information Processing Systems 33 (2020) 16070\u201316084."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"Kang Wei Jun Li Ming Ding Chuan Ma Howard\u00a0H Yang Farhad Farokhi Shi Jin Tony\u00a0QS Quek and H\u00a0Vincent Poor. 2020. Federated learning with differential privacy: Algorithms and performance analysis. IEEE transactions on information forensics and security 15 (2020) 3454\u20133469.","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Jiazhen Zhang Chunbo Luo Marcus Carpenter and Geyong Min. 2022. Federated learning for distributed IIoT intrusion detection using transfer approaches. IEEE Transactions on Industrial Informatics 19 7 (2022) 8159\u20138169.","DOI":"10.1109\/TII.2022.3216575"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539231"}],"event":{"name":"IoT 2024: 14th International Conference on the Internet of Things","acronym":"IoT 2024","location":"Oulu Finland"},"container-title":["Proceedings of the 14th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703790.3703822","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3703790.3703822","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:42Z","timestamp":1750295382000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703790.3703822"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,19]]},"references-count":30,"alternative-id":["10.1145\/3703790.3703822","10.1145\/3703790"],"URL":"https:\/\/doi.org\/10.1145\/3703790.3703822","relation":{},"subject":[],"published":{"date-parts":[[2024,11,19]]},"assertion":[{"value":"2025-03-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}