{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T19:21:48Z","timestamp":1774293708604,"version":"3.50.1"},"reference-count":84,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T00:00:00Z","timestamp":1657843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"SPC RAS","award":["#22-21-00724"],"award-info":[{"award-number":["#22-21-00724"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>In order to provide an accurate and timely response to different types of the attacks, intrusion and anomaly detection systems collect and analyze a lot of data that may include personal and other sensitive data. These systems could be considered a source of privacy-aware risks. Application of the federated learning paradigm for training attack and anomaly detection models may significantly decrease such risks as the data generated locally are not transferred to any party, and training is performed mainly locally on data sources. Another benefit of the usage of federated learning for intrusion detection is its ability to support collaboration between entities that could not share their dataset for confidential or other reasons. While this approach is able to overcome the aforementioned challenges it is rather new and not well-researched. The challenges and research questions appear while using it to implement analytical systems. In this paper, the authors review existing solutions for intrusion and anomaly detection based on the federated learning, and study their advantages as well as open challenges still facing them. The paper analyzes the architecture of the proposed intrusion detection systems and the approaches used to model data partition across the clients. The paper ends with discussion and formulation of the open challenges.<\/jats:p>","DOI":"10.3390\/a15070247","type":"journal-article","created":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:00:28Z","timestamp":1658091628000},"page":"247","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":59,"title":["Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6707-9153","authenticated-orcid":false,"given":"Elena","family":"Fedorchenko","sequence":"first","affiliation":[{"name":"Saint Petersburg Institute for Informatics and Automation, Federal Research Center of the Russian Academy of Sciences, 199178 Saint Petersburg, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2923-4954","authenticated-orcid":false,"given":"Evgenia","family":"Novikova","sequence":"additional","affiliation":[{"name":"Saint Petersburg Institute for Informatics and Automation, Federal Research Center of the Russian Academy of Sciences, 199178 Saint Petersburg, Russia"}]},{"given":"Anton","family":"Shulepov","sequence":"additional","affiliation":[{"name":"Saint Petersburg Institute for Informatics and Automation, Federal Research Center of the Russian Academy of Sciences, 199178 Saint Petersburg, Russia"},{"name":"Faculty of Computer Science and Technology, Saint Petersburg Electrotechnical University \u201cLETI\u201d, 197376 Saint Petersburg, Russia"}]}],"member":"1968","published-online":{"date-parts":[[2022,7,15]]},"reference":[{"key":"ref_1","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Hampson, S., and y Arcas, B.A. (2017, January 20\u201322). Communication-Efficient Learning of Deep Networks from Decentralized Data. Proceedings of the AISTATS, Fort Lauderdale, FL, USA."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Kruchten, P., Fraser, S., and Coallier, F. (2019, January 21\u201325). A Taxonomy of Software Engineering Challenges for Machine Learning Systems: An Empirical Investigation. Proceedings of the Agile Processes in Software Engineering and Extreme Programming, Montreal, QC, Canada.","DOI":"10.1007\/978-3-030-19034-7"},{"key":"ref_3","unstructured":"Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., and Kallitsis, M. (2017, January 16\u201318). Understanding the Mirai Botnet. Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, Canada."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Novikova, E., Doynikova, E., and Golubev, S. (2022). Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case. Algorithms, 15.","DOI":"10.3390\/a15040104"},{"key":"ref_5","unstructured":"Ludwig, H., Baracaldo, N., Thomas, G., Zhou, Y., Anwar, A., Rajamoni, S., Ong, Y.J., Radhakrishnan, J.K., Verma, A., and Sinn, M. (2020). IBM Federated Learning: An Enterprise Framework White Paper V0.1. arXiv."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Lo, S.K., Lu, Q., Zhu, L., Paik, H.-Y., Xu, X., and Wang, C. (2021). Architectural Patterns for the Design of Federated Learning Systems. arXiv.","DOI":"10.1016\/j.jss.2022.111357"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ek, S., Portet, F., Lalanda, P., and Vega, G. (2021, January 22\u201326). A Federated Learning Aggregation Algorithm for Pervasive Computing: Evaluation and Comparison. Proceedings of the 2021 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kassel, Germany.","DOI":"10.1109\/PERCOM50583.2021.9439129"},{"key":"ref_8","unstructured":"Yurochkin, M., Agarwal, M., Ghosh, S.S., Greenewald, K.H., Hoang, T.N., and Khazaeni, Y. (2019, January 9\u201315). Bayesian Nonparametric Federated Learning of Neural Networks. Proceedings of the ICML, Long Beach, CA, USA."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Mansour, A.B., Carenini, G., Duplessis, A., and Naccache, D. (2022). Federated Learning Aggregation: New Robust Algorithms with Guarantees. arXiv.","DOI":"10.1109\/ICMLA55696.2022.00120"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Li, Q., He, B., and Song, D. (2021). Model-Contrastive Federated Learning. arXiv.","DOI":"10.1109\/CVPR46437.2021.01057"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.inffus.2021.09.014","article-title":"Supervised contrastive learning over prototype-label embeddings for network intrusion detection","volume":"79","author":"Arribas","year":"2022","journal-title":"Inf. Fusion"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Shahid, O., Pouriyeh, S., Parizi, R.M., Sheng, Q.Z., Srivastava, G., and Zhao, L. (2021). Communication Efficiency in Federated Learning: Achievements and Challenges. arXiv.","DOI":"10.3390\/app12188980"},{"key":"ref_13","unstructured":"Juvekar, C., Vaikuntanathan, V., and Chandrakasan, A. (2018, January 15\u201317). GAZELLE: A Low Latency Framework for Secure Neural Network Inference. Proceedings of the 27th USENIX Conference on Security Symposium (SEC\u201918), Baltimore, MD, USA."},{"key":"ref_14","unstructured":"Zhang, C., Li, S., Xia, J., Wang, W., Yan, F., and Liu, Y. (2020, January 15\u201317). BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning. Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference, Virtual Event."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Kairouz, P., McMahan, H.B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A.N., Bonawit, K., Charles, Z., Cormode, G., and Cummings, R. (2021). Advances and Open Problems in Federated Learning. Foundations and Trends in Machine Learning, Now Publishers.","DOI":"10.1561\/2200000083"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Truex, S., Liu, L., Chow, K.H., Gursoy, M.E., and Wei, W. (2020, January 27). LDP-Fed: Federated learning with local differential privacy. Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, Heraklion, Greece.","DOI":"10.1145\/3378679.3394533"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Shokri, R., and Shmatikov, V. (October, January 29). Privacy-preserving deep learning. Proceedings of the 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA.","DOI":"10.1109\/ALLERTON.2015.7447103"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1038\/s41746-020-00323-1","article-title":"The future of digital health with federated learning","volume":"3","author":"Rieke","year":"2020","journal-title":"NPJ Digit. Med."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3501813","article-title":"Federated Learning for Healthcare: Systematic Review and Architecture Proposal","volume":"13","author":"Antunes","year":"2022","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Marchal, S., Miettinen, M., Fereidooni, H., Asokan, N., and Sadeghi, A.R. (2019, January 7\u20139). D\u00cfoT: A Federated Self-learning Anomaly Detection System for IoT. Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA.","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"5615","DOI":"10.1109\/TII.2020.3023430","article-title":"DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber\u2013Physical Systems","volume":"17","author":"Li","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"108693","DOI":"10.1016\/j.comnet.2021.108693","article-title":"Federated learning for malware detection in IoT devices","volume":"204","author":"Rey","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"29696","DOI":"10.1109\/ACCESS.2021.3058528","article-title":"LocKedge: Low-Complexity Cyberattack Detection in IoT Edge Computing","volume":"9","author":"Huong","year":"2021","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Khoa, T.V., Saputra, Y.M., Hoang, D.T., Trung, N.L., Nguyen, D., Ha, N.V., and Dutkiewicz, E. (2020, January 25\u201328). Collaborative Learning Model for Cyberattack Detection Systems in IoT Industry 4.0. Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, Korea.","DOI":"10.1109\/WCNC45663.2020.9120761"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Long, G., Tan, Y., Jiang, J., and Zhang, C. (2020). Federated Learning for Open Banking. arXiv.","DOI":"10.1007\/978-3-030-63076-8_17"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.future.2021.08.028","article-title":"Reliable customer analysis using federated learning and exploring deep-attention edge intelligence","volume":"127","author":"Ahmed","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Li, J., Cui, T., Yang, K., Yuan, R., He, L., and Li, M. (2021). Demand Forecasting of E-Commerce Enterprises Based on Horizontal Federated Learning from the Perspective of Sustainable Development. Sustainability, 13.","DOI":"10.3390\/su132313050"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"108661","DOI":"10.1016\/j.comnet.2021.108661","article-title":"Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges","volume":"203","author":"Campos","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Novikova, E., Fomichov, D., Kholod, I., and Filippov, E. (2022). Analysis of Privacy-Enhancing Technologies in Open-Source Federated Learning Frameworks for Driver Activity Recognition. Sensors, 22.","DOI":"10.3390\/s22082983"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Lyu, L., Yu, H., and Yang, Q. (2020). Threats to Federated Learning: A Survey. arXiv.","DOI":"10.1007\/978-3-030-63076-8_1"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Sarkar, S., Aouedi, O., Yenduri, G., Piamrat, K., Bhattacharya, S., Maddikunta, P.K.R., and Gadekallu, T.R. (2021). Federated Learning for Intrusion Detection System: Concepts, Challenges and Future Directions. arXiv.","DOI":"10.1016\/j.comcom.2022.09.012"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Bellatreche, L., Boukhalfa, K., and Richard, P. (2008, January 2\u20135). Data Partitioning in Data Warehouses: Hardness Study, Heuristics and ORACLE Validation. Proceedings of the 10th International Conference on Data Warehousing and Knowledge Discovery (DaWaK \u201908), Turin, Italy.","DOI":"10.1007\/978-3-540-85836-2_9"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H.B., Patel, S., Ramage, D., Segal, A., and Seth, K. (November, January 30). Practical Secure Aggregation for Privacy-Preserving Machine Learning. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201917), Dallas, TX, USA.","DOI":"10.1145\/3133956.3133982"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","article-title":"Survey of intrusion detection systems: Techniques, datasets and challenges","volume":"2","author":"Khraisat","year":"2019","journal-title":"Cybersecur"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"042007","DOI":"10.1088\/1742-6596\/1015\/4\/042007","article-title":"Detection of network attacks based on adaptive resonance theory","volume":"1015","author":"Bukhanov","year":"2018","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Yunwu, W. (2009, January 15\u201317). Using Fuzzy Expert System Based on Genetic Algorithms for Intrusion Detection System. Proceedings of the 2009 International Forum on Information Technology and Applications, Chengdu, China.","DOI":"10.1109\/IFITA.2009.107"},{"key":"ref_37","first-page":"273","article-title":"Improved Algorithm for Intrusion Detection Using Genetic Algorithm and SNORT","volume":"4","author":"Dave","year":"2014","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"29","DOI":"10.5121\/ijdkp.2014.4203","article-title":"A New Clustering Approach for Anomaly Intrusion Detection","volume":"4","author":"Ranjan","year":"2014","journal-title":"Int. J. Data Min. Knowl. Manag. Process. (IJDKP)"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Li, Z., Qin, Z., Huang, K., Yang, X., and Ye, S. (2017, January 14\u201318). Intrusion Detection Using Convolutional Neural Networks for Representation Learning. Proceedings of the International Conference on Neural Information Processing (ICONIP), Guangzhou, China.","DOI":"10.1007\/978-3-319-70139-4_87"},{"key":"ref_40","first-page":"569","article-title":"An Improved CNN Approach for Network Intrusion Detection System","volume":"23","author":"Jianwei","year":"2021","journal-title":"Int. J. Netw. Secur."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"43","DOI":"10.4018\/IJISMD.2017070103","article-title":"Evaluation of Recurrent Neural Network and Its Variants for Intrusion Detection System IDS","volume":"8","author":"Vinayakumar","year":"2017","journal-title":"Int. J. Inf. Syst. Model. Des."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Song, Y., Hyun, S., and Cheong, Y.G. (2021). Analysis of Autoencoders for Network Intrusion Detection. Sensors, 21.","DOI":"10.3390\/s21134294"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1739","DOI":"10.1007\/s10586-017-1105-z","article-title":"A distributed IDS architecture model for Smart Home systems","volume":"22","author":"Gajewski","year":"2017","journal-title":"Clust. Comput."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"945","DOI":"10.3103\/S0146411618080230","article-title":"A Distributed Intrusion Detection System with Protection from an Internal Intruder","volume":"52","author":"Shterenberg","year":"2018","journal-title":"Autom. Control Comput. Sci."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Schueller, Q., Basu, K., Younas, M., Patel, M., and Ball, F. (2018, January 21\u201323). A Hierarchical Intrusion Detection System using Support Vector Machine for SDN Network in Cloud Data Center. Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia.","DOI":"10.1109\/ATNAC.2018.8615255"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Saghezchi, F.B., Mantas, G., Ribeiro, J., Al-Rawi, M., Mumtaz, S., and Rodriguez, J. (2017, January 26\u201330). Towards a secure network architecture for smart grids in 5G era. Proceedings of the 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain.","DOI":"10.1109\/IWCMC.2017.7986273"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/TSG.2011.2159818","article-title":"Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids","volume":"2","author":"Zhang","year":"2011","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MC.2019.2914906","article-title":"A Partition-Driven Integrated Security Architecture for Cyberphysical Systems","volume":"53","author":"Javed","year":"2020","journal-title":"Computer"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Kholod, I., Yanaki, E., Fomichev, D., Shalugin, E., Novikova, E., Filippov, E., and Nordlund, M. (2021). Open-Source Federated Learning Frameworks for IoT: A Comparative Review and Analysis. Sensors, 21.","DOI":"10.3390\/s21010167"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.future.2022.04.010","article-title":"SecFedNIDS: Robust defense for poisoning attack against federated learning-based network intrusion detection system","volume":"134","author":"Zhang","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"102631","DOI":"10.1016\/j.cose.2022.102631","article-title":"Differentially private self-normalizing neural networks for adversarial robustness in federated learning","volume":"116","author":"Ibitoye","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.jpdc.2022.03.003","article-title":"FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things","volume":"165","author":"Friha","year":"2022","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"102033","DOI":"10.1016\/j.cose.2020.102033","article-title":"A trusted feature aggregator federated learning for distributed malicious attack detection","volume":"99","author":"Hei","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"101157","DOI":"10.1016\/j.phycom.2020.101157","article-title":"Intelligent intrusion detection based on federated learning aided long short-term memory","volume":"42","author":"Zhao","year":"2020","journal-title":"Phys. Commun."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"107440","DOI":"10.1016\/j.compeleceng.2021.107440","article-title":"Security and privacy-aware Artificial Intrusion Detection System using Federated Machine Learning","volume":"96","author":"Kumar","year":"2021","journal-title":"Comput. Electr. Eng."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2021.10.023","article-title":"Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System","volume":"128","author":"Astillo","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Sarhan, M., Lo, W.W., Layeghy, S., and Portmann, M. (2022). HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection. arXiv.","DOI":"10.1016\/j.compeleceng.2022.108379"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/BF00048682","article-title":"Multinomial logistic regression algorithm","volume":"44","author":"Dankmar","year":"1992","journal-title":"Ann. Inst. Stat. Math."},{"key":"ref_59","unstructured":"Li, X., Huang, K., Yang, W., Wang, S., and Zhang, Z. (2020, January 26\u201330). On the Convergence of FedAvg on Non-IID Data. Proceedings of the 8th International Conference on Learning Representations, Addis Ababa, Ethiopia."},{"key":"ref_60","unstructured":"Yu, P., Wynter, L., and Lim, S.H. (2020). Fed+: A Family of Fusion Algorithms for Federated Learning. arXiv."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","article-title":"TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems","volume":"8","author":"Alsaedi","year":"2020","journal-title":"IEEE Access"},{"key":"ref_62","unstructured":"(2022, March 15). Evaluating-FL-for-Intrusion-Detection-in-IoT-Review-and-Challenges Datasets (2021). Available online: https:\/\/github.com\/Enrique-Marmol\/Evaluating-FL-for-Intrusion-Detection-in-IoT-review-and-challenges."},{"key":"ref_63","unstructured":"(2022, March 15). A Micro Web Framework Written in Python. Available online: https:\/\/flask.palletsprojects.com\/en\/2.1.x\/."},{"key":"ref_64","unstructured":"(2022, March 15). Flask Socketio. Available online: https:\/\/flask-socketio.readthedocs.io\/en\/latest\/."},{"key":"ref_65","unstructured":"(2022, March 15). Flask Socketio Client. Available online: https:\/\/github.com\/socketio\/socket.io-client."},{"key":"ref_66","unstructured":"(2022, March 15). Gevent Asynchronous Framework. Available online: https:\/\/github.com\/gevent\/gevent."},{"key":"ref_67","unstructured":"(2022, March 15). Keras Deep Learning Library. Available online: https:\/\/faroit.github.io\/keras-docs\/2.0.2\/."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","article-title":"N-BaIoT\u2014Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders","volume":"17","author":"Meidan","year":"2018","journal-title":"IEEE Pervasive Comput."},{"key":"ref_69","unstructured":"(2022, March 30). Fed_IoT_Guard. Available online: https:\/\/github.com\/ValerianRey\/fed_iot_guard."},{"key":"ref_70","unstructured":"Moustafa, N. (2022, July 13). The Bot-IoT Dataset. Available online: https:\/\/research.unsw.edu.au\/projects\/bot-iot-dataset."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"3975","DOI":"10.1109\/TITS.2020.3002712","article-title":"A Hierarchical Blockchain-Enabled Federated Learning Algorithm for Knowledge Sharing in Internet of Vehicles","volume":"22","author":"Chai","year":"2021","journal-title":"Trans. Intell. Transport. Sys."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_73","unstructured":"(2022, March 26). Keras: Python Deep Learning Library. Available online: http:\/\/keras.io\/."},{"key":"ref_74","unstructured":"Morris, T., and Gao, W. (2014, January 17\u201319). Industrial Control System Traffic Datasets for Intrusion Detection Research. Proceedings of the International Conference on Critical Infrastructure Protection, Arlington, VA, USA."},{"key":"ref_75","unstructured":"Schneble, W., and Thamilarasu, G. (August, January 29). Attack Detection Using Federated Learning in Medical Cyber-Physical Systems. Proceedings of the 28th International Conference on Computer Communications and Networks, Valencia, Spain."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/MIS.2020.2988604","article-title":"FedHealth: A Federated Transfer Learning Framework for Wearable Healthcare","volume":"35","author":"Chen","year":"2020","journal-title":"IEEE Intell. Syst."},{"key":"ref_77","unstructured":"(2022, March 15). KDD Dataset. Available online: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"ref_78","unstructured":"(2022, March 15). University of New Brunswick Dataset. Available online: https:\/\/www.unb.ca\/cic\/datasets\/nsl.html."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Moustafa, N., and Slay, J. (2015, January 10\u201312). UNSW-NB15: A comprehensive dataset for network intrusion detection systems (UNSW-NB15 network dataset). Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref_80","unstructured":"FATE (2022, June 25). An Industrial Grade Federated Learning Framework. Available online: https:\/\/fate.fedai.org\/."},{"key":"ref_81","unstructured":"(2022, June 25). Secure Water Treatment (SWaT). Available online: https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/dataset_info\/."},{"key":"ref_82","unstructured":"(2022, March 30). Google Colaboratory. Available online: https:\/\/colab.research.google.com\/."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.inffus.2020.07.009","article-title":"Federated Learning and Differential Privacy: Software tools analysis, the Sherpa.ai FL framework and methodological guidelines for preserving data privacy","volume":"64","author":"Stipcich","year":"2020","journal-title":"Inf. Fusion"},{"key":"ref_84","unstructured":"Anthony, L.F.W., Kanding, B., and Selvan, R. (2020). Carbontracker: Tracking and predicting the carbon footprint of training deep learning models. arXiv."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/7\/247\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:51:16Z","timestamp":1760140276000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/7\/247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,15]]},"references-count":84,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2022,7]]}},"alternative-id":["a15070247"],"URL":"https:\/\/doi.org\/10.3390\/a15070247","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,15]]}}}