{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T22:26:10Z","timestamp":1777328770471,"version":"3.51.4"},"reference-count":27,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2019YFB2102000"],"award-info":[{"award-number":["2019YFB2102000"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,4,21]]},"abstract":"<jats:p>Driven by the advancements in 5G-enabled Internet of Things (IoT) technologies, the IoT devices have shown an explosive growth trend with massive data generated at the edge of the network. However, IoT systems exhibit inherent vulnerability for diverse attacks, and Advanced Persistent Threat (APT) is one of the most powerful attack models that could lead to a significant privacy leakage of systems. Moreover, recent detection technologies can hardly meet the demands of effective security defense against APTs. To address the above problems, we propose an APT Prediction Method based on Differentially Private Federated Learning (APTPMFL) to predict the probability of subsequent APT attacks occurring in IoT systems. It is the first time to apply a federated learning mechanism for aggregating suspicious activities in the IoT systems, where the APT prediction phase does not need any correlation rules. Moreover, to achieve privacy-preserving property, we further adopt a differentially private data perturbation mechanism to add the Laplacian random noises to the IoT device training data features, so as to achieve the maximum protection of privacy data. We also present a 5G-enabled edge computing-based framework to train and deploy the model, which can alleviate the computing and communication overhead of the typical IoT systems. Our evaluation results show that APTPMFL can efficiently predict subsequent APT behaviors in the IoT system accurately and efficiently.<\/jats:p>","DOI":"10.1155\/2021\/8814068","type":"journal-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T20:20:51Z","timestamp":1619122851000},"page":"1-14","source":"Crossref","is-referenced-by-count":14,"title":["Predicting the APT for Cyber Situation Comprehension in 5G-Enabled IoT Scenarios Based on Differentially Private Federated Learning"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8432-2426","authenticated-orcid":true,"given":"Xiang","family":"Cheng","sequence":"first","affiliation":[{"name":"The Second Research Institute of CAAC, Chengdu 610041, China"},{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 21106, China"}]},{"given":"Qian","family":"Luo","sequence":"additional","affiliation":[{"name":"The Second Research Institute of CAAC, Chengdu 610041, China"}]},{"given":"Ye","family":"Pan","sequence":"additional","affiliation":[{"name":"The Second Research Institute of CAAC, Chengdu 610041, China"}]},{"given":"Zitong","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 21106, China"}]},{"given":"Jiale","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 21106, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2863-5441","authenticated-orcid":true,"given":"Bing","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 21106, China"}]}],"member":"311","reference":[{"key":"1","first-page":"1","article-title":"Invisible and forgotten: zero-day blooms in the IoT","author":"K. Palani"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.05.018"},{"key":"3","first-page":"747","article-title":"Dynamic defense strategy against advanced persistent threat with insiders","author":"P. Hu"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332079"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2871866"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65172-9_43"},{"key":"7","first-page":"1","article-title":"Predicting cyber attacks with Bayesian networks using unconventional signals","author":"A. Okutan"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/tie.2018.2798605"},{"key":"9","first-page":"2563","article-title":"POSTER: cyber attack prediction of threats from unconventional resources (CAPTURE)","author":"A. Okutan"},{"key":"10","first-page":"349","article-title":"Using analysis of temporal variances within a honeypot dataset to better predict attack type probability","author":"S. Dowling"},{"key":"11","first-page":"536","article-title":"Towards predicting cyber attacks using information exchange and data mining","author":"M. Hus\u00e1k"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.055"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.010"},{"issue":"2","key":"14","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1145\/3305218.3305239","article-title":"Adaptive strategic cyber defense for advanced persistent threats in critical infrastructure networks","volume":"46","author":"L. Huang","year":"2018","journal-title":"Performance Evaluation Review"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2016inp0007"},{"issue":"1","key":"16","first-page":"1","article-title":"A hybrid deep learning architecture for privacy-preserving mobile analytics","volume":"1","author":"S. A. Osia","year":"2017","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"17","first-page":"1223","article-title":"Large scale distributed deep networks","author":"J. Dean"},{"key":"18","first-page":"538","article-title":"An efficient federated learning scheme with differential privacy in mobile edge computing","author":"J. L. Zhang"},{"key":"19","first-page":"308","article-title":"Deep learning with differential privacy","author":"M. Abadi"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"21","first-page":"1","article-title":"Differentially private federated learning: a client level perspective","author":"R. C. Geyer"},{"key":"22","first-page":"1175","article-title":"Practical secure aggregation for privacy-preserving machine learning","author":"K. Bonawitz"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2018.1700202"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2018.1700447"},{"key":"25","first-page":"1","article-title":"FedMEC: improving efficiency of differentially private federated learning via mobile edge computing","volume":"3","author":"J. L. Zhang","year":"2020","journal-title":"Mobile Networks and Applications"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.3390\/s19184045"},{"key":"27","first-page":"1","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"H. B. McMahan"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8814068.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8814068.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8814068.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T20:21:18Z","timestamp":1619122878000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/8814068\/"}},"subtitle":[],"editor":[{"given":"Luigi","family":"Coppolino","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,4,21]]},"references-count":27,"alternative-id":["8814068","8814068"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8814068","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,4,21]]}}}