Adaptive and Privacy-Preserving Security for Federated Learning Using Biological Immune System Principles
DOI:
https://doi.org/10.70112/ajcst-2024.13.2.4303Keywords:
Federated Learning, Cyber Threats, Data Poisoning, Privacy-Preserving Mechanisms, Biological Immune SystemsAbstract
The increasing frequency and sophistication of cyber threats pose significant challenges to the security of distributed systems handling sensitive data. Federated learning, a decentralized machine learning framework, enables collaborative model training without sharing raw data, offering privacy advantages. However, ensuring the security and resilience of federated learning systems remains a pressing concern due to potential vulnerabilities, such as data poisoning and model inversion attacks. This study aims to enhance the security of federated learning systems for website threat intelligence by leveraging nature-inspired principles from biological immune systems. The objective is to design a robust and adaptive framework that addresses evolving cyber threats while preserving data privacy. A security framework was proposed, inspired by the adaptive and self-defensive mechanisms of biological immune systems. Key components include adaptive anomaly detection, dynamic threat response, and privacy-preserving mechanisms. The system architecture was validated using simulated federated learning environments, where machine learning algorithms and differential privacy techniques were employed to monitor and respond to threats in real time. The proposed system demonstrated effective detection of anomalies such as data poisoning and model inversion attacks, achieving high accuracy and low false-positive rates. The dynamic threat response mechanism mitigated potential risks by isolating compromised nodes and restoring model integrity. Privacy-preserving measures, including differential privacy and secure multi-party computation, ensured that sensitive data remained protected during the training process. The nature-inspired approach provided a robust, adaptive solution for enhancing the security of federated learning systems. By mimicking the immune system’s ability to detect and respond to threats, the proposed framework improves resilience against evolving cyber threats, making it suitable for securing sensitive applications such as website threat intelligence. This study highlights the potential of biological principles in addressing modern cybersecurity challenges while safeguarding data privacy.
References
A. Elgabli, J. Park, S. Ahmed, and M. Bennis, “L-FGADMM: Layer-Wise Federated Group ADMM for Communication Efficient Decentralized Deep Learning,” in Proc. 2020 IEEE Wireless Commun. Netw. Conf. (WCNC), Seoul, Korea (South), 2020, pp. 1-6, doi: 10.1109/WCNC45663.2020.9120758.
L. Miao, W. Yang, R. Hu, L. Li, and L. Huang, “Against Backdoor Attacks in Federated Learning with Differential Privacy,” in Proc. ICASSP 2022 - 2022 IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Singapore, 2022, pp. 2999-3003, doi: 10.1109/ICASSP43922.2022.9747653.
X. Yan, B. Cui, Y. Xu, P. Shi, and Z. Wang, “A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack,” IEEE/ACM Trans. Comput. Biol. Bioinf., vol. 18, no. 3, pp. 871-881, May-Jun. 2021, doi: 10.1109/TCBB.2019.2940583.
Y. Chen, X. Sun, and Y. Jin, “Communication-Efficient Federated Deep Learning With Layerwise Asynchronous Model Update and Temporally Weighted Aggregation,” IEEE Trans. Neural Netw. Learn. Syst., vol. 31, no. 10, pp. 4229-4238, Oct. 2020, doi: 10.1109/TNNLS.2019.2953131.
V. Golovko, M. Komar, and A. Sachenko, “Principles of Neural Network Artificial Immune System Design to Detect Attacks on Computers,” in Proc. 2010 Int. Conf. Modern Problems Radio Eng., Telecommun. Comput. Sci. (TCSET), Lviv, Ukraine, 2010, pp. 237-237.
M. R. Kumar and V. Lakshmipraba, “Hybrid Privacy Preserving Mechanism: An Approach to Protect Health Care Data,” Asian Journal of Computer Science and Technology, vol. 7, no. 1, pp. 71-78, Feb. 2018.
C. Hu, S. Wang, C. Liu, and T. Zhang, “Efficient Privacy-Preserving Data Aggregation for Lightweight Secure Model Training in Federated Learning,” in Proc. 2023 7th Int. Conf. Cryptogr., Security Privacy (CSP), Tianjin, China, 2023, pp. 119-123, doi: 10.1109/CSP58884.2023.00026.
S. Selvam, “A New Algorithm for Pattern Based Using Mining Association Rules,” Asian Journal of Computer Science and Technology, vol. 9, no. 2, pp. 24-27, Aug. 2020.
P. R. Kumar, S. Ravichandran, and N. Satyala, “Deep Learning Analysis: A Review,” Asian Journal of Computer Science and Technology, vol. 7, no. S1, pp. 24-28, Oct. 2018.
B. Fang and T. Zhang, “Deeper Leakage from Gradients through Membership Inference Attack,” in Proc. 2024 7th Int. Conf. Inf. Comput. Technol. (ICICT), Honolulu, HI, USA, 2024, pp. 295-300, doi: 10.1109/ICICT62343.2024.00054.
T. Gong, “Artificial Immune System Based on Normal Model and Immune Learning,” in Proc. 2008 IEEE Int. Conf. Syst., Man, Cybern., Singapore, 2008, pp. 1320-1325, doi: 10.1109/ICSMC.2008.4811468.
M. B. A. Hamid and T. K. A. Rahman, “Short Term Load Forecasting Using an Artificial Neural Network Trained by Artificial Immune System Learning Algorithm,” in Proc. 2010 12th Int. Conf. Comput. Modelling Simulation, Cambridge, UK, 2010, pp. 408-413, doi: 10.1109/UKSIM.2010.82.
P. Dewangan and Neelamsahu, “A Proposed Method for Mining Breast Cancer Pattern Using Particle Swarm Optimization,” Asian Journal of Computer Science and Technology, vol. 8, no. 1, pp. 69-73, Feb. 2019.
W. Yuwen, G. Yu, and L. Xiangjun, “Differential Privacy Hierarchical Federated Learning Method Based on Privacy Budget Allocation,” in Proc. 2023 9th Int. Conf. Comput. Commun. (ICCC), Chengdu, China, 2023, pp. 2177-2181, doi: 10.1109/ICCC59590.2023.10507299.
V. Subrahmanyam, V. Janaki, P. S. Rao, N. Gurrapu, S. K. Mandala, and R. Roshan, “Internet of Things (IoT) Based Data Analysis for Feature Selection by Hybrid Swarm Intelligence (SI) Algorithm,” in Proc. 2024 IEEE Int. Conf. Interdiscip. Approaches Technol. Manag. Social Innov. (IATMSI), Gwalior, India, 2024, pp. 1-6, doi: 10.1109/IATMSI60426.2024.10503278.
R. R. Ema and P. C. Shill, “Integration of Fuzzy C-Means and Artificial Neural Network with Principal Component Analysis for Heart Disease Prediction,” in Proc. 2020 11th Int. Conf. Comput., Commun. Netw. Technol. (ICCCNT), Kharagpur, India, 2020, pp. 1-6, doi: 10.1109/ICCCNT49239.2020.9225366.
M. Hassan, M. A. Butt, and M. Z. Baba, “Logistic Regression Versus Neural Networks: The Best Accuracy in Prediction of Diabetes Disease,” Asian Journal of Computer Science and Technology, vol. 6, no. 2, pp. 33-42, Sep. 2017.
J. Xu, Z. Ning, Y. Zhou, X. Liao, W. Zou, and S. Xing, “An Indoor Localization Mechanism Based on Local Differential Privacy,” in Proc. 2023 4th Inf. Commun. Technol. Conf. (ICTC), Nanjing, China, 2023, pp. 121-126, doi: 10.1109/ICTC57116.2023.10154748.
M. B. Fathima Sanjeetha, Y. Kanagaraj, V. Herath, and S. Lokuliyana, “Deep Learning for Edge Computing Applications: A Comprehensive Survey,” Asian Journal of Computer Science and Technology, vol. 11, no. 2, pp. 39-47, Nov. 2022.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Centre for Research and Innovation
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.