Internet of Things (IoT) is a technology that has revolutionized various fields, offering numerous benefits, such as remote patient monitoring, enhanced energy efficiency, and automation of routine tasks in homes. However, unsecured IoT devices are susceptible to botnet-based attacks such as distributed denial of Service (DDoS). Conventional machine learning models used for detecting these attacks compromise data privacy, prompting the adoption of federated learning (FL) to improve privacy. Yet, most FL-based cyberattack detection models proposed for IoT environments do not address computational complexity to suit their deployment on resource-constrained IoT edge devices. This paper introduces an FL model with low computational complexity, designed for detecting IoT botnet attacks. The study employs feature selection and dimensionality reduction to minimize computational complexity while maintaining high accuracy. First, an extreme gradient boosting model, trained with repeated stratified k-fold cross-validation, is used to select the optimal features of the botnet dataset based on feature importance. Principal component analysis is then used to reduce the dimensionality of these features. Finally, a differentially private multi-layer perceptron is trained locally by four FL clients and aggregated through federated averaging (FedAvg) to form a global Mirai botnet attack detection model. The model achieved an accuracy, precision, recall, and F1-score of 99.93%, an area under the curve of 1.0, and 8,612 floating-point operations, contributing to 87.34% reduction in computational complexity compared to the previous work. The proposed model is well-suited for detecting botnet attacks in smart homes, smart grids, and environments where resource-constrained IoT edge devices are deployed.
Read full abstract