4.8 Article

Federated Learning for Cybersecurity: Concepts, Challenges, and Future Directions

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 18, Issue 5, Pages 3501-3509

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2021.3119038

Keywords

Blockchains; Medical diagnostic imaging; Security; Hospitals; Data privacy; Data models; Ash; Attack detection; authentication; cyberattacks; cybersecurity; decentralized; federated learning (FL); privacy; trust management

Funding

  1. National Research Foundation of Korea [NRF-2021S1A5A2A03064391]
  2. National Research Foundation of Korea (NRF) - Korean Government (MSIT) [NRF-2019R1C1C1006143]
  3. BK21 Four, Korean Southeast Center for the 4th Industrial Revolution Leader Education
  4. National Research Foundation of Korea [2019R1C1C1006143] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

Ask authors/readers for more resources

This article presents the application of federated learning in enhancing cybersecurity and preventing cyberattacks in real-time scenarios. The authors conducted a comprehensive survey on various federated learning models developed by researchers for authentication, privacy, trust management, and attack detection. Real-time use cases and the adoption of federated learning for data privacy and system performance improvement are also discussed. The article concludes with prominent challenges and future directions for researchers to focus on.
Federated learning (FL) is a recent development in artificial intelligence, which is typically based on the concept of decentralized data. As cyberattacks are frequently happening in the various applications deployed in real time, most industrialists are hesitating to move forward in adopting the technology of the Internet of Everything. This article aims to provide an extensive study on how FL could be utilized for providing better cybersecurity and prevent various cyberattacks in real time. We present an extensive survey of the various FL models currently developed by researchers for providing authentication, privacy, trust management, and attack detection. We also discuss few real-time use cases that have been deployed recently and how FL is adopted in them for preserving privacy of data and improving the performance of the system. Based on the study, we conclude this article with some prominent challenges and future directions on which the researchers can focus for adopting FL in real-time scenarios.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available