Giter VIP home page Giter VIP logo

fedrl-for-iot-security's Introduction

FedRL for IT-Sec

This work pays large tribute to Timo Schenk's work on RL based MTD deployment that can be found here.
A full documentation of this work including the theoretical background can be found in the PDF-report.

1. Introduction/ Motivation

Federated Reinforcement Learning for Private and Collaborative Selection of Moving Target Defense Mechanisms for IoT Devices Security.

Content 🏷️

Managing de security of IoT devices is non-trivial due to the complexity and heterogeneity of such devices. The differentiation from traditional security issues motivates the need to investigate new security approaches applicable to the IoT computing paradigm. Moving- Target-Defense (MTD) is a novel paradigm that addresses proactive and dynamic cyberat- tacks. The basic philosophy behind MTD is that “perfect security” most likely will never be achievable, making it congruent with the current state of IoT security. In that sense, MTD defends against cyberattacks instead of preventing them using various strategies. Reinforcement Learning (RL) is a powerful and interesting approach to determine the best MTD technique able to mitigate heterogeneous IoT malware. More in detail, RL is suitable for IoT scenarios where supervised and unsupervised models do not work because the trained model must learn in an online fashion based on the suitability of deployed MTDs. However, there are still many problems in the implementation of RL in practical scenarios. For example, many RL algorithms have the problem of learning time caused by low sample efficiency. Therefore, through information exchange between agents, learning speed can be greatly accelerated. The problem of sharing information is that some IoT tasks and scenarios need to prevent agent information leakage and protect its privacy during the application of RL. Federated Reinforcement Learning (FRL) is a novel approach that can reduce the previ- ous limitations thanks to privacy-preserving and collaborative training of agents. However, the FRL concept is a very incipient, and its feasibility and performance have not been analyzed in IoT malware scenarios. Therefore, the main goal of this project consists of creating and evaluating a framework that uses FRL to select the best MTD mechanism for each malware affecting one or more IoT devices.

Code structure 📖

  • /data: contains the code for data monitoring, the training data and the data exploration.

  • /prototypes: contains prototypes 1 - 3 including the three different sensor environment versions.

  • /src: dependencies which are share between the different prototypes.

  • /state_anomaly_detection: investigation of different models for state anomaly detection.

fedrl-for-iot-security's People

Contributors

jan-kreischer avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.