{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T14:54:11Z","timestamp":1770821651165,"version":"3.50.1"},"reference-count":33,"publisher":"MDPI AG","issue":"20","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Union","doi-asserted-by":"publisher","award":["957406"],"award-info":[{"award-number":["957406"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Internet of Things (IoT) is a concept adopted in nearly every aspect of human life, leading to an explosive utilization of intelligent devices. Notably, such solutions are especially integrated in the industrial sector, to allow the remote monitoring and control of critical infrastructure. Such global integration of IoT solutions has led to an expanded attack surface against IoT-enabled infrastructures. Artificial intelligence and machine learning have demonstrated their ability to resolve issues that would have been impossible or difficult to address otherwise; thus, such solutions are closely associated with securing IoT. Classical collaborative and distributed machine learning approaches are known to compromise sensitive information. In our paper, we demonstrate the creation of a network flow-based Intrusion Detection System (IDS) aiming to protecting critical infrastructures, stemming from the pairing of two machine learning techniques, namely, federated learning and active learning. The former is utilized for privately training models in federation, while the latter is a semi-supervised approach applied for global model adaptation to each of the participant\u2019s traffic. Experimental results indicate that global models perform significantly better for each participant, when locally personalized with just a few active learning queries. Specifically, we demonstrate how the accuracy increase can reach 7.07% in only 10 queries.<\/jats:p>","DOI":"10.3390\/s21206743","type":"journal-article","created":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T21:45:32Z","timestamp":1633988732000},"page":"6743","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["IDS for Industrial Applications: A Federated Learning Approach with Active Personalization"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5430-497X","authenticated-orcid":false,"given":"Vasiliki","family":"Kelli","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Western Macedonia, 501 31 Kozani, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4679-8049","authenticated-orcid":false,"given":"Vasileios","family":"Argyriou","sequence":"additional","affiliation":[{"name":"Department of Networks and Digital Media, Kingston University, London KT1 1LQ, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0749-9794","authenticated-orcid":false,"given":"Thomas","family":"Lagkas","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Kavala Campus, International Hellenic University, 654 04 Kavala, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8961-7423","authenticated-orcid":false,"given":"George","family":"Fragulis","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Western Macedonia, 501 31 Kozani, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7322-6954","authenticated-orcid":false,"given":"Elisavet","family":"Grigoriou","sequence":"additional","affiliation":[{"name":"Sidroco Holdings Ltd., Nicosia 1077, Cyprus"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6042-0355","authenticated-orcid":false,"given":"Panagiotis","family":"Sarigiannidis","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Western Macedonia, 501 31 Kozani, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2021,10,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2287","DOI":"10.1007\/s11277-019-06986-8","article-title":"Machine learning based intrusion detection systems for IoT applications","volume":"111","author":"Verma","year":"2019","journal-title":"Wirel. Pers. Commun."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Kiran, S., Kumar, U.V., and Kumar, T.M. (2020, January 10\u201312). A review of machine learning algorithms on IoT applications. Proceedings of the 2020 International Conference on Smart Electronics and Communication (ICOSEC), Tamilnadu, India.","DOI":"10.1109\/ICOSEC49089.2020.9215430"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Qian, B., Su, J., Wen, Z., Jha, D.N., Li, Y., Guan, Y., Puthal, D., James, P., Yang, R., and Zomaya, A.Y. (2020). Orchestrating the development lifecycle of machine learning-based IoT applications: A taxonomy and survey. ACM Comput. Surv., 53.","DOI":"10.1145\/3398020"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.ijresmar.2020.04.005","article-title":"Machine learning and AI in marketing \u2013 Connecting computing power to human insights","volume":"37","author":"Ma","year":"2020","journal-title":"Int. J. Res. Mark."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s12152-019-09423-6","article-title":"AI assistants and the paradox of internal automaticity","volume":"13","author":"Bauer","year":"2019","journal-title":"Neuroethics"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Amberkar, A., Awasarmol, P., Deshmukh, G., and Dave, P. (2018, January 1\u20133). Speech recognition using recurrent neural networks. Proceedings of the 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT), Coimbatore, India.","DOI":"10.1109\/ICCTCT.2018.8551185"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"4235","DOI":"10.1109\/TII.2019.2902878","article-title":"Artificial intelligence-driven mechanism for edge computing-based industrial applications","volume":"15","author":"Sodhro","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"102808","DOI":"10.1016\/j.jnca.2020.102808","article-title":"Detecting false data attacks using machine learning techniques in smart grid: A survey","volume":"170","author":"Cui","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Pant, M., Kumar Sharma, T., Arya, R., Sahana, B., and Zolfagharinia, H. (2020). Development of IDS using supervised machine learning. Soft Computing: Theories and Applications, Springer.","DOI":"10.1007\/978-981-15-4032-5"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"107840","DOI":"10.1016\/j.comnet.2021.107840","article-title":"Machine learning methods for cyber security intrusion detection: Datasets and comparative study","volume":"188","author":"Kilincer","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Gupta, A.R.B., and Agrawal, J. (2020, January 10\u201312). A Comprehensive survey on various machine learning methods used for intrusion detection system. Proceedings of the 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), Gwalior, India.","DOI":"10.1109\/CSNT48778.2020.9115764"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Radoglou-Grammatikis, P., Sarigiannidis, P., Efstathopoulos, G., Karypidis, P.A., and Sarigiannidis, A. (2020, January 25\u201328). DIDEROT: An intrusion detection and prevention system for DNP3-based SCADA systems. Proceedings of the 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland.","DOI":"10.1145\/3407023.3409314"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Chen, Y.C., Mooney, V., and Grijalva, S. (2020, January 13\u201314). Electricity grid cyber-physical security risk assessment using simulation of attack stages and physical impact. Proceedings of the 2020 IEEE Kansas Power and Energy Conference (KPEC), Manhattan, KS, USA.","DOI":"10.1109\/KPEC47870.2020.9167679"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2011.67","article-title":"Stuxnet: Dissecting a cyberwarfare weapon","volume":"9","author":"Langner","year":"2011","journal-title":"IEEE Secur. Priv."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MC.2011.115","article-title":"Lessons from Stuxnet","volume":"44","author":"Chen","year":"2011","journal-title":"Computer"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Elbir, A.M., and Coleri, S. (2021). A family of hybrid federated and centralized learning architectures in machine learning. arXiv.","DOI":"10.23919\/EUSIPCO54536.2021.9616120"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"107335","DOI":"10.1109\/ACCESS.2020.3000476","article-title":"Deep transfer learning for IoT attack detection","volume":"8","author":"Vu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Drainakis, G., Katsaros, K.V., Pantazopoulos, P., Sourlas, V., and Amditis, A. (2020, January 24\u201327). Federated vs. centralized machine learning under privacy-elastic users: A comparative analysis. In Proceedings of the 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA.","DOI":"10.1109\/NCA51143.2020.9306745"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Mothukuri, V., Khare, P., Parizi, R.M., Pouriyeh, S., Dehghantanha, A., and Srivastava, G. (2021). Federated learning-based anomaly detection for IoT security attacks. IEEE Internet Things J., 1.","DOI":"10.1109\/JIOT.2021.3077803"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1109\/MNET.011.2000286","article-title":"Internet of Things intrusion detection: Centralized, on-Device, or federated learning?","volume":"34","author":"Rahman","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_21","first-page":"50","article-title":"Federated learning: Challenges, methods, and future directions","volume":"37","author":"Li","year":"2020","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_22","unstructured":"Konyushkova, K., Sznitman, R., and Fua, P. (2017). Learning active learning from data. arXiv."},{"key":"ref_23","unstructured":"Geifman, Y., and El-Yaniv, R. (2019). Deep active learning with a neural architecture search. arXiv."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Truong, N., Sun, K., Wang, S., Guitton, F., and Guo, Y. (2021). Privacy preservation in federated learning: An insightful survey from the GDPR perspective. arXiv.","DOI":"10.1016\/j.cose.2021.102402"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Dhakal, S., Prakash, S., Yona, Y., Talwar, S., and Himayat, N. (2019, January 9\u201313). Coded federated learning. Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA.","DOI":"10.1109\/GCWkshps45667.2019.9024521"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"5615","DOI":"10.1109\/TII.2020.3023430","article-title":"DeepFed: Federated deep learning for intrusion detection in industrial cyber-physical systems","volume":"17","author":"Li","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Marchal, S., Miettinen, M., Fereidooni, H., Asokan, N., and Sadeghi, A.R. (2019, January 7\u201310). D\u00cfoT: A federated self-learning anomaly detection system for IoT. Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA.","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"ref_28","unstructured":"Schneble, W., and Thamilarasu, G. (August, January 29). Attack detection using federated learning in medical cyber-physical systems. Proceedings of the 28th International Conference on Computer Communications and Networks (ICCCN), Valencia, Spain."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"G\u00f6rnitz, N., Kloft, M., Rieck, K., and Brefeld, U. (2009, January 9). Active learning for network intrusion detection. Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, Chicago, IL, USA.","DOI":"10.1145\/1654988.1655002"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Abe, N., Zadrozny, B., and Langford, J. (2006, January 20\u201323). Outlier detection by active learning. Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA.","DOI":"10.1145\/1150402.1150459"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Pimentel, T., Monteiro, M., Veloso, A., and Ziviani, N. (2020). Deep active learning for anomaly detection. arXiv.","DOI":"10.1109\/IJCNN48605.2020.9206769"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Phaladisailoed, T., and Numnonda, T. (2018, January 24\u201326). Machine learning models comparison for bitcoin price prediction. Proceedings of the 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE), Bali, Indonesia.","DOI":"10.1109\/ICITEED.2018.8534911"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Gafni, T., Shlezinger, N., Cohen, K., Eldar, Y.C., and Poor, H.V. (2021). Federated learning: A signal processing perspective. arXiv.","DOI":"10.1109\/MSP.2021.3125282"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/20\/6743\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:11:41Z","timestamp":1760166701000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/20\/6743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":33,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2021,10]]}},"alternative-id":["s21206743"],"URL":"https:\/\/doi.org\/10.3390\/s21206743","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,11]]}}}