Deep learning (DL) methods have been widely applied to anomaly-based network intrusion detection system (NIDS) to detect malicious traffic. To expand the usage scenarios of DL-based methods, the federated learning (FL) framework allows multiple users to train a global model on the basis of respecting individual data privacy. However, it has not yet been systematically evaluated how robust FL-based NIDSs are against existing privacy attacks under existing defenses. To address this issue, we propose two privacy evaluation metrics designed for FL-based NIDSs, including (1) privacy score that evaluates the similarity between the original and recovered traffic features using reconstruction attacks, and (2) evasion rate against NIDSs using Generative Adversarial Network-based adversarial attack with the reconstructed benign traffic. We conduct experiments to show that existing defenses provide little protection that the corresponding adversarial traffic can even evade the SOTA NIDS Kitsune. To defend against such attacks and build a more robust FL-based NIDS, we further propose FedDef, a novel optimization-based input perturbation defense strategy with theoretical guarantee. It achieves both high utility by minimizing the gradient distance and strong privacy protection by maximizing the input distance. We experimentally evaluate four existing defenses on four datasets and show that our defense outperforms all the baselines in terms of privacy protection with up to 7 times higher privacy score, while maintaining model accuracy loss within 3% under optimal parameter combination.
翻译:深度学习(DL)方法被广泛应用于基于异常的网络入侵探测系统(NIDS),以检测恶意交通。为了扩大基于DL方法的使用情景,联邦学习(FL)框架允许多个用户在尊重个人数据隐私的基础上培训一个全球模式。然而,尚未系统地评估基于FL的深入学习(DL)方法如何在现有的防御下抵御现有的隐私攻击。为解决这一问题,我们提议为基于FL的网络入侵探测系统(NIDS)设计两种隐私评价标准,包括:(1) 隐私评分,评估利用重建袭击评估原有和已恢复的交通特征之间的相似性;(2) 利用基于Genemental Aversarial网络的对抗性攻击来规避NIDS的速度,与重建的良性交通相结合。我们进行实验,以显示现有的防御性保护几乎没有多少保护,而相应的对抗性通信流量甚至可以逃避STOA NIDK Kitsune。为了防范这种攻击,我们进一步建议FedDef, 一种基于优化优化的防御性投入,加上理论保证。我们通过最优化的距离基线,在最优化的国防基准下,在最优化地展示了现有四度上展示了我们。