Not logged in.

Contribution Details

Type Journal Article
Scope Discipline-based scholarship
Title Robust Federated Learning for execution time-based device model identification under label-flipping attack
Organization Unit
Authors
  • Pedro Miguel Sánchez Sánchez
  • Alberto Huertas Celdran
  • José R Buendía Rubio
  • Gérôme Bovet
  • Gregorio Martínez Pérez
Item Subtype Original Work
Refereed Yes
Status Published in final form
Language
  • English
Journal Title Cluster Computing
Publisher Springer
Geographical Reach international
ISSN 1386-7857
Volume 27
Number 1
Page Range 313 - 324
Date 2024
Abstract Text The computing device deployment explosion experienced in recent years, motivated by the advances of technologies such as Internet-of-Things (IoT) and 5G, has led to a global scenario with increasing cybersecurity risks and threats. Among them, device spoofing and impersonation cyberattacks stand out due to their impact and, usually, low complexity required to be launched. To solve this issue, several solutions have emerged to identify device models and types based on the combination of behavioral fingerprinting and Machine/Deep Learning (ML/DL) techniques. However, these solutions are not appropriate for scenarios where data privacy and protection are a must, as they require data centralization for processing. In this context, newer approaches such as Federated Learning (FL) have not been fully explored yet, especially when malicious clients are present in the scenario setup. The present work analyzes and compares the device model identification performance of a centralized DL model with an FL one while using execution time-based events. For experimental purposes, a dataset containing execution-time features of 55 Raspberry Pis belonging to four different models has been collected and published. Using this dataset, the proposed solution achieved 0.9999 accuracy in both setups, centralized and federated, showing no performance decrease while preserving data privacy. Later, the impact of a label-flipping attack during the federated model training is evaluated using several aggregation mechanisms as countermeasures. Zeno and coordinate-wise median aggregation show the best performance, although their performance greatly degrades when the percentage of fully malicious clients (all training samples poisoned) grows over 50%.
Free access at DOI
Digital Object Identifier 10.1007/s10586-022-03949-w
Other Identification Number merlin-id:23167
PDF File Download from ZORA
Export BibTeX
EP3 XML (ZORA)