SlideShare a Scribd company logo
AN ASYNCHRONOUS DISTRIBUTED
DEEP LEARNING BASED INTRUSION
DETECTION SYSTEM FOR IOT DEVICES
PU TIAN
ADVISOR: DR. WEIXIAN LIAO
DEPARTMENT OF COMPUTER AND INFORMATION SCIENCES
TOWSON UNIVERSITY
5/29/2019
Background
• Internet of Things (IoTs).
• The connection of a wider range of everyday physical
devices, such as smart watch/phone and different
sensors.
• To collect a wider range of real-time data.
• Security issue.
• IoT Intrusion Detection System.
Design Goals
 Effective
• Identification of malicious network flow from complicated
protocols.
 Efficient
• Detection in a timely manner.
Existing IDS Models
 Knowledge Based Method:
• To establish exact rules for intrusion behaviors.
• Pros: Accurate and fast.
• Cons: (1) Vulnerable to new attacks.
(2) Time-consuming to create rules manually.
Existing IDS Models
 Machine Learning(ML) Method:
• Build model with labeled/unlabeled training data.
• Pros: Improved adaptability.
• Cons: (1) Computation resource consuming .
(2) Large data transmission for single-node
training.
General Federated Learning Model
 Synchronous Model
 Distributed nodes collect and train
local data independently.
 The central server fetches and
aggregates parameters after all
agents’ local updates are received.
General Federated Learning Model
• Pros: Reduced data transmission over the network.
• Cons: Performance problem of the slowest client.
Design Target
 Asynchronous Federated Learning Model
 Distributed nodes send their local
parameter update requests to the
server.
 The central server aggregates
immediately and sends updated
parameters back.
Challenges
 Staleness Problem
Challenges
 Existing Solutions for Staleness Problem
• Delayed Gradient Approximation Compensation.
• Update Weight Adjustment.
• Communication Optimization.
Proposed Method
 Neural Network
• Capacity of learning nonlinear complex patterns.
 Autoencoder(AE)
• Description: A NN used to
learn to represent itself as
close as possible.
• Encoder: Map(encode) input to
the latent layer, denoted by 𝓏.
• Decoder: Reconstruct the input
by mapping 𝓏 to the output
layer.
Proposed Method
Proposed Method
 Autoencoder(AE)
• Loss function: To measure the
discrepancy between the input 𝑥 𝑖
and
its reconstruction 𝑥 𝑖
.
• Root Mean Squared Error (RMSE)
RMSE =
∑ 𝑖=1
𝑛
(𝑥 𝑖− 𝑥 𝑖)2
𝑛
 For training: To minimize the RMSE value in order to reconstruct original input.
 For execution(detection): A smaller value indicates a higher possibility of similarity to the training
instances.
Proposed Method
 Intrusion Detection with AE
𝑋 𝑖+1
= {𝑥1, 𝑥1, 𝑥1, … … … , 𝑥 𝑛}
Case 1: 𝑅𝑀𝑆𝐸 < 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 → 𝑋 𝑖+1 is GOOD.
Case 2: 𝑅𝑀𝑆𝐸 > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 → 𝑋 𝑖+1
is BAD.
𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 = 0.45
Proposed Method
 Asynchronous Parameter Update
• The gradient descent delay compensation method based on the approximation for the delayed value. *
• Originally proposed for image classification with ResNet and adopted for AE in IDS scenario.
*Zheng, Shuxin, Qi Meng, Taifeng Wang, Wei Chen, Nenghai Yu, Zhi-Ming Ma, and Tie-Yan Liu. "Asynchronous
stochastic gradient descent with delay compensation." In Proceedings of the 34th International Conference on
Machine Learning-Volume 70, pp. 4120-4129. JMLR. org, 2017.
Experiments
 Dataset
• CICIDS2017 : Normal and common attacks ranging from 9 a.m., Monday, July 3, 2017 to 5 p.m. on
Friday July 7, 2017, for a total of 5 days.
• Training Data: 100,000 normal data instances randomly chosen from Monday dataset.
• Testing Data: 200,000 normal as well as abnormal data(DDoS) instances extracted .
 Experiment Setup
• Server and Clients: One parameter server and four clients.
• Input Data Dimension: 77 features.
• Hidden Layer: 75% of the input layer dimension, 55 in this case.
• Parameter Update Method: 50 iterations for local updates and then a request for a global
parameter aggregation (20 iterations of global updates).
Experiments
 Training Errors over Aggregation Epochs
Experiments
 Metrics
• True Positive (TP): Attack data correctly classified as an attack.
• False Positive (FP): Normal data incorrectly classified as an attack.
• True Negative (TN): Normal data correctly classified as normal.
• False Negative (FN): Attack data incorrectly classified as normal.
• Accuracy =
𝑇𝑃+𝑇𝑁
𝑇𝑃+𝑇𝑁+𝐹𝑃+𝐹𝑁
• Precision =
𝑇𝑃
𝑇𝑃+𝐹𝑃
• Recall =
𝑇𝑃
𝑇𝑃+𝐹𝑁
• F-Score = 2 ×
𝑃𝑟𝑒𝑠𝑖𝑜𝑛 × 𝑅𝑒𝑐𝑎𝑙𝑙
𝑃𝑟𝑒𝑠𝑖𝑜𝑛+ 𝑅𝑒𝑐𝑎𝑙𝑙
Experiments
 Results
Metrics
Parameter
Update Method
Accuracy Precision Recall F-Score
Synchronous 98.495% 99.994% 92.539% 96.097%
Asynchronous 98.489% 99.992% 92.503% 96.068%
Conclusion
 Deep learning network (Autoencoder) for intrusion detection.
 Asynchronous parameter update for efficiency with accuracy guaranteed.
 Test with relatively new dataset.
Future Work
 Optimize asynchronous parameter update mechanism for large
scale distributed IDS network.
 Test more attack types.
 Give a full theoretical analysis for the convergence of
Autoencoder in asynchronous parameter update scenario.
Thank You !

More Related Content

PPTX
PDF
Testing Machine Learning-enabled Systems: A Personal Perspective
PPTX
Introduction to Deep Learning
PPTX
Sim-to-Real Transfer in Deep Reinforcement Learning
ODP
Effort estimation1
PPTX
Learning Method In Data Mining
PDF
OCLR: A More Expressive, Pattern-Based Temporal Extension of OCL
PDF
Research-Based Innovation with Industry: Project Experience and Lessons Learned
Testing Machine Learning-enabled Systems: A Personal Perspective
Introduction to Deep Learning
Sim-to-Real Transfer in Deep Reinforcement Learning
Effort estimation1
Learning Method In Data Mining
OCLR: A More Expressive, Pattern-Based Temporal Extension of OCL
Research-Based Innovation with Industry: Project Experience and Lessons Learned

Similar to An Asynchronous Distributed Deep Learning Based Intrusion Detection System for IoT Devices (20)

PPT
SRM REVIEW PRESENTATION (27.01.2025).ppt
PPTX
Design and Implementation of Intrusion Detection and Prevention by Applying D...
PPTX
Deep learning approach for network intrusion detection system
PDF
A novel deep anomaly detection approach for intrusion detection in futuristic...
PPTX
An Intelligent Intrusion Detection System for Smart Consumer Electronics Netw...
PDF
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
PDF
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
PDF
Unified and evolved approach based on neural network and deep learning method...
PDF
Deep Convolutional Neural Network based Intrusion Detection System
PDF
Application of neural network and PSO-SVM in intrusion detection of network
PPTX
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
PDF
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
PDF
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
PDF
An intrusion detection system for packet and flow based networks using deep n...
PDF
LSTM deep learning method for network intrusion detection system
PPTX
Network Intrusion Detection (1)-converted-1.pptx
PDF
IRJET- Anomaly Detection System in CCTV Derived Videos
PDF
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
PDF
research project Generative oversasmling
PDF
Real Time Intrusion Detection System Using Computational Intelligence and Neu...
SRM REVIEW PRESENTATION (27.01.2025).ppt
Design and Implementation of Intrusion Detection and Prevention by Applying D...
Deep learning approach for network intrusion detection system
A novel deep anomaly detection approach for intrusion detection in futuristic...
An Intelligent Intrusion Detection System for Smart Consumer Electronics Netw...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
Unified and evolved approach based on neural network and deep learning method...
Deep Convolutional Neural Network based Intrusion Detection System
Application of neural network and PSO-SVM in intrusion detection of network
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
An intrusion detection system for packet and flow based networks using deep n...
LSTM deep learning method for network intrusion detection system
Network Intrusion Detection (1)-converted-1.pptx
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
research project Generative oversasmling
Real Time Intrusion Detection System Using Computational Intelligence and Neu...
Ad

More from Data Works MD (18)

PPTX
Data Journalism at The Baltimore Banner
PDF
Jolt’s Picks - Machine Learning and Major League Baseball Hit Streaks
PPTX
Introducing DataWave
PDF
Malware Detection, Enabled by Machine Learning
PPTX
Using AWS, Terraform, and Ansible to Automate Splunk at Scale
PDF
A Day in the Life of a Data Journalist
PPTX
Robotics and Machine Learning: Working with NVIDIA Jetson Kits
PDF
Connect Data and Devices with Apache NiFi
PDF
Introduction to Machine Learning
PPTX
Data in the City: Analytics and Civic Data in Baltimore
PPTX
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
PPTX
Automated Software Requirements Labeling
PPTX
Introduction to Elasticsearch for Business Intelligence and Application Insights
PDF
RAPIDS – Open GPU-accelerated Data Science
PPTX
Two Algorithms for Weakly Supervised Denoising of EEG Data
PDF
Detecting Lateral Movement with a Compute-Intense Graph Kernel
PDF
Predictive Analytics and Neighborhood Health
PPTX
Social Network Analysis Workshop
Data Journalism at The Baltimore Banner
Jolt’s Picks - Machine Learning and Major League Baseball Hit Streaks
Introducing DataWave
Malware Detection, Enabled by Machine Learning
Using AWS, Terraform, and Ansible to Automate Splunk at Scale
A Day in the Life of a Data Journalist
Robotics and Machine Learning: Working with NVIDIA Jetson Kits
Connect Data and Devices with Apache NiFi
Introduction to Machine Learning
Data in the City: Analytics and Civic Data in Baltimore
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Automated Software Requirements Labeling
Introduction to Elasticsearch for Business Intelligence and Application Insights
RAPIDS – Open GPU-accelerated Data Science
Two Algorithms for Weakly Supervised Denoising of EEG Data
Detecting Lateral Movement with a Compute-Intense Graph Kernel
Predictive Analytics and Neighborhood Health
Social Network Analysis Workshop
Ad

Recently uploaded (20)

PDF
Transforming Manufacturing operations through Intelligent Integrations
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Chapter 2 Digital Image Fundamentals.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Transforming Manufacturing operations through Intelligent Integrations
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Modernizing your data center with Dell and AMD
The Rise and Fall of 3GPP – Time for a Sabbatical?
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Weekly Chronicles - August'25 Week I
20250228 LYD VKU AI Blended-Learning.pptx
madgavkar20181017ppt McKinsey Presentation.pdf
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Chapter 2 Digital Image Fundamentals.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Dropbox Q2 2025 Financial Results & Investor Presentation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

An Asynchronous Distributed Deep Learning Based Intrusion Detection System for IoT Devices

  • 1. AN ASYNCHRONOUS DISTRIBUTED DEEP LEARNING BASED INTRUSION DETECTION SYSTEM FOR IOT DEVICES PU TIAN ADVISOR: DR. WEIXIAN LIAO DEPARTMENT OF COMPUTER AND INFORMATION SCIENCES TOWSON UNIVERSITY 5/29/2019
  • 2. Background • Internet of Things (IoTs). • The connection of a wider range of everyday physical devices, such as smart watch/phone and different sensors. • To collect a wider range of real-time data. • Security issue. • IoT Intrusion Detection System.
  • 3. Design Goals  Effective • Identification of malicious network flow from complicated protocols.  Efficient • Detection in a timely manner.
  • 4. Existing IDS Models  Knowledge Based Method: • To establish exact rules for intrusion behaviors. • Pros: Accurate and fast. • Cons: (1) Vulnerable to new attacks. (2) Time-consuming to create rules manually.
  • 5. Existing IDS Models  Machine Learning(ML) Method: • Build model with labeled/unlabeled training data. • Pros: Improved adaptability. • Cons: (1) Computation resource consuming . (2) Large data transmission for single-node training.
  • 6. General Federated Learning Model  Synchronous Model  Distributed nodes collect and train local data independently.  The central server fetches and aggregates parameters after all agents’ local updates are received.
  • 7. General Federated Learning Model • Pros: Reduced data transmission over the network. • Cons: Performance problem of the slowest client.
  • 8. Design Target  Asynchronous Federated Learning Model  Distributed nodes send their local parameter update requests to the server.  The central server aggregates immediately and sends updated parameters back.
  • 10. Challenges  Existing Solutions for Staleness Problem • Delayed Gradient Approximation Compensation. • Update Weight Adjustment. • Communication Optimization.
  • 11. Proposed Method  Neural Network • Capacity of learning nonlinear complex patterns.
  • 12.  Autoencoder(AE) • Description: A NN used to learn to represent itself as close as possible. • Encoder: Map(encode) input to the latent layer, denoted by 𝓏. • Decoder: Reconstruct the input by mapping 𝓏 to the output layer. Proposed Method
  • 13. Proposed Method  Autoencoder(AE) • Loss function: To measure the discrepancy between the input 𝑥 𝑖 and its reconstruction 𝑥 𝑖 . • Root Mean Squared Error (RMSE) RMSE = ∑ 𝑖=1 𝑛 (𝑥 𝑖− 𝑥 𝑖)2 𝑛  For training: To minimize the RMSE value in order to reconstruct original input.  For execution(detection): A smaller value indicates a higher possibility of similarity to the training instances.
  • 14. Proposed Method  Intrusion Detection with AE 𝑋 𝑖+1 = {𝑥1, 𝑥1, 𝑥1, … … … , 𝑥 𝑛} Case 1: 𝑅𝑀𝑆𝐸 < 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 → 𝑋 𝑖+1 is GOOD. Case 2: 𝑅𝑀𝑆𝐸 > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 → 𝑋 𝑖+1 is BAD. 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 = 0.45
  • 15. Proposed Method  Asynchronous Parameter Update • The gradient descent delay compensation method based on the approximation for the delayed value. * • Originally proposed for image classification with ResNet and adopted for AE in IDS scenario. *Zheng, Shuxin, Qi Meng, Taifeng Wang, Wei Chen, Nenghai Yu, Zhi-Ming Ma, and Tie-Yan Liu. "Asynchronous stochastic gradient descent with delay compensation." In Proceedings of the 34th International Conference on Machine Learning-Volume 70, pp. 4120-4129. JMLR. org, 2017.
  • 16. Experiments  Dataset • CICIDS2017 : Normal and common attacks ranging from 9 a.m., Monday, July 3, 2017 to 5 p.m. on Friday July 7, 2017, for a total of 5 days. • Training Data: 100,000 normal data instances randomly chosen from Monday dataset. • Testing Data: 200,000 normal as well as abnormal data(DDoS) instances extracted .  Experiment Setup • Server and Clients: One parameter server and four clients. • Input Data Dimension: 77 features. • Hidden Layer: 75% of the input layer dimension, 55 in this case. • Parameter Update Method: 50 iterations for local updates and then a request for a global parameter aggregation (20 iterations of global updates).
  • 17. Experiments  Training Errors over Aggregation Epochs
  • 18. Experiments  Metrics • True Positive (TP): Attack data correctly classified as an attack. • False Positive (FP): Normal data incorrectly classified as an attack. • True Negative (TN): Normal data correctly classified as normal. • False Negative (FN): Attack data incorrectly classified as normal. • Accuracy = 𝑇𝑃+𝑇𝑁 𝑇𝑃+𝑇𝑁+𝐹𝑃+𝐹𝑁 • Precision = 𝑇𝑃 𝑇𝑃+𝐹𝑃 • Recall = 𝑇𝑃 𝑇𝑃+𝐹𝑁 • F-Score = 2 × 𝑃𝑟𝑒𝑠𝑖𝑜𝑛 × 𝑅𝑒𝑐𝑎𝑙𝑙 𝑃𝑟𝑒𝑠𝑖𝑜𝑛+ 𝑅𝑒𝑐𝑎𝑙𝑙
  • 19. Experiments  Results Metrics Parameter Update Method Accuracy Precision Recall F-Score Synchronous 98.495% 99.994% 92.539% 96.097% Asynchronous 98.489% 99.992% 92.503% 96.068%
  • 20. Conclusion  Deep learning network (Autoencoder) for intrusion detection.  Asynchronous parameter update for efficiency with accuracy guaranteed.  Test with relatively new dataset.
  • 21. Future Work  Optimize asynchronous parameter update mechanism for large scale distributed IDS network.  Test more attack types.  Give a full theoretical analysis for the convergence of Autoencoder in asynchronous parameter update scenario.