{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T06:32:30Z","timestamp":1722666750761},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004586","name":"FAPERJ","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004586","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"CNPq","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1016\/j.comnet.2024.110351","type":"journal-article","created":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T15:44:13Z","timestamp":1711467853000},"page":"110351","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["FedSBS: Federated-Learning participant-selection method for Intrusion Detection Systems"],"prefix":"10.1016","volume":"244","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-5072-8102","authenticated-orcid":false,"given":"Helio N.","family":"Cunha Neto","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9446-7917","authenticated-orcid":false,"given":"Jernej","family":"Hribar","sequence":"additional","affiliation":[]},{"given":"Ivana","family":"Dusparic","sequence":"additional","affiliation":[]},{"given":"Natalia C.","family":"Fernandes","sequence":"additional","affiliation":[]},{"given":"Diogo M.F.","family":"Mattos","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"20","key":"10.1016\/j.comnet.2024.110351_b1","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.5344","article-title":"Toward a monitoring and threat detection system based on stream processing as a virtual network function for big data","volume":"31","author":"Andreoni Lopez","year":"2019","journal-title":"Concurr. Comput.: Pract. Exper."},{"key":"10.1016\/j.comnet.2024.110351_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102675","article-title":"A systematic literature review of methods and datasets for anomaly-based network intrusion detection","volume":"116","author":"Yang","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2024.110351_b3","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/j.future.2018.09.051","article-title":"BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks","volume":"93","author":"Viegas","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"10.1016\/j.comnet.2024.110351_b4","first-page":"702","article-title":"Design an intrusion detection system based on feature selection using ML algorithms","volume":"72","author":"Venkatesan","year":"2023","journal-title":"Math. Stat. Eng. Appl."},{"key":"10.1016\/j.comnet.2024.110351_b5","unstructured":"H.N. Cunha Neto, I. Dusparic, D.M.F. Mattos, N.C. Fernandes, FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing, in: Proceedings of the 2022 IEEE Conference on Network Softwarization (NetSoft), 2022, pp. 1\u20135."},{"key":"10.1016\/j.comnet.2024.110351_b6","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.comcom.2022.09.012","article-title":"Federated learning for intrusion detection system: Concepts, challenges and future directions","volume":"195","author":"Agrawal","year":"2022","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comnet.2024.110351_b7","doi-asserted-by":"crossref","first-page":"41928","DOI":"10.1109\/ACCESS.2023.3269980","article-title":"A survey on securing federated learning: Analysis of applications, attacks, challenges, and trends","volume":"11","author":"Cunha Neto","year":"2023","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.comnet.2024.110351_b8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-021-00105-6","article-title":"Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives","volume":"5","author":"Liu","year":"2022","journal-title":"Cybersecurity"},{"key":"10.1016\/j.comnet.2024.110351_b9","unstructured":"F. Lai, X. Zhu, H.V. Madhyastha, M. Chowdhury, Oort: Efficient federated learning via guided participant selection, in: 15th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 21), 2021, pp. 19\u201335."},{"issue":"2","key":"10.1016\/j.comnet.2024.110351_b10","doi-asserted-by":"crossref","first-page":"1212","DOI":"10.1109\/JIOT.2021.3079104","article-title":"Reputation-based federated learning for secure wireless networks","volume":"9","author":"Song","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2024.110351_b11","doi-asserted-by":"crossref","unstructured":"T. Nishio, R. Yonetani, Client Selection for Federated Learning with Heterogeneous Resources in Mobile Edge, in: ICC 2019 - 2019 IEEE International Conference on Communications, ICC, 2019, pp. 1\u20137.","DOI":"10.1109\/ICC.2019.8761315"},{"key":"10.1016\/j.comnet.2024.110351_b12","doi-asserted-by":"crossref","unstructured":"Q. Li, B. He, D. Song, Model-contrastive federated learning, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 10713\u201310722.","DOI":"10.1109\/CVPR46437.2021.01057"},{"key":"10.1016\/j.comnet.2024.110351_b13","series-title":"Fedmix: Approximation of mixup under mean augmented federated learning","author":"Yoon","year":"2021"},{"key":"10.1016\/j.comnet.2024.110351_b14","series-title":"Communication-efficient federated learning with acceleration of global momentum","author":"Kim","year":"2022"},{"key":"10.1016\/j.comnet.2024.110351_b15","series-title":"2019 53rd Asilomar Conference on Signals, Systems, and Computers","first-page":"1227","article-title":"Feddane: A federated newton-type method","author":"Li","year":"2019"},{"key":"10.1016\/j.comnet.2024.110351_b16","series-title":"International Conference on Machine Learning","first-page":"5132","article-title":"Scaffold: Stochastic controlled averaging for federated learning","author":"Karimireddy","year":"2020"},{"issue":"8","key":"10.1016\/j.comnet.2024.110351_b17","doi-asserted-by":"crossref","first-page":"1754","DOI":"10.1109\/TPDS.2020.2975189","article-title":"Accelerating federated learning via momentum gradient descent","volume":"31","author":"Liu","year":"2020","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"3","key":"10.1016\/j.comnet.2024.110351_b18","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","article-title":"Federated learning: Challenges, methods, and future directions","volume":"37","author":"Li","year":"2020","journal-title":"IEEE Signal Process. Mag."},{"issue":"2","key":"10.1016\/j.comnet.2024.110351_b19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3298981","article-title":"Federated machine learning: Concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"10.1016\/j.comnet.2024.110351_b20","series-title":"2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks","first-page":"1","article-title":"A novel reputation-aware client selection scheme for federated learning within mobile environments","author":"Wang","year":"2020"},{"issue":"4","key":"10.1016\/j.comnet.2024.110351_b21","doi-asserted-by":"crossref","first-page":"1742","DOI":"10.1109\/TCSS.2023.3259431","article-title":"Hierarchical federated learning with social context clustering-based participant selection for internet of medical things applications","volume":"10","author":"Zhou","year":"2023","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"10.1016\/j.comnet.2024.110351_b22","series-title":"ICC 2020-2020 IEEE International Conference on Communications","first-page":"1","article-title":"Hybrid-FL for wireless networks: Cooperative learning mechanism using non-IID data","author":"Yoshida","year":"2020"},{"key":"10.1016\/j.comnet.2024.110351_b23","series-title":"International Conference on Machine Learning","first-page":"7184","article-title":"On the linear speedup analysis of communication efficient momentum sgd for distributed non-convex optimization","author":"Yu","year":"2019"},{"key":"10.1016\/j.comnet.2024.110351_b24","unstructured":"H. Brendan McMahan, E. Moore, D. Ramage, S. Hampson, B. Ag\u00fcera y Arcas, Communication-efficient learning of deep networks from decentralized data, in: Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017, Vol. 54, 2017, pp. 1273\u20131282."},{"key":"10.1016\/j.comnet.2024.110351_b25","doi-asserted-by":"crossref","DOI":"10.1109\/COMST.2020.2986024","article-title":"Federated learning in mobile edge networks: A comprehensive survey","author":"Lim","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"10.1016\/j.comnet.2024.110351_b26","first-page":"18","article-title":"Feature selection based on information gain","volume":"2","author":"Azhagusundari","year":"2013","journal-title":"Int. J. Innov. Technol. Explor. Eng. (IJITEE)"},{"key":"10.1016\/j.comnet.2024.110351_b27","series-title":"Proceedings of the 2002 SIAM International Conference on Data Mining","first-page":"261","article-title":"A pattern search method for model selection of support vector regression","author":"Momma","year":"2002"},{"key":"10.1016\/j.comnet.2024.110351_b28","series-title":"Reinforcement Learning: an Introduction","author":"Sutton","year":"2018"},{"key":"10.1016\/j.comnet.2024.110351_b29","unstructured":"J. Wang, V. Tantia, N. Ballas, M. Rabbat, SlowMo: Improving Communication-Efficient Distributed SGD with Slow Momentum, in: International Conference on Learning Representations, 2019, pp. 1\u201327."},{"key":"10.1016\/j.comnet.2024.110351_b30","doi-asserted-by":"crossref","unstructured":"I. Sharafaldin, A.H. Lashkari, S. Hakak, A.A. Ghorbani, Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy, in: 2019 International Carnahan Conference on Security Technology, ICCST, 2019, pp. 1\u20138, http:\/\/dx.doi.org\/10.1109\/CCST.2019.8888419.","DOI":"10.1109\/CCST.2019.8888419"},{"key":"10.1016\/j.comnet.2024.110351_b31","series-title":"Measuring the effects of non-identical data distribution for federated visual classification","author":"Hsu","year":"2019"},{"key":"10.1016\/j.comnet.2024.110351_b32","series-title":"International Conference on Machine Learning","first-page":"7252","article-title":"Bayesian nonparametric federated learning of neural networks","author":"Yurochkin","year":"2019"},{"key":"10.1016\/j.comnet.2024.110351_b33","series-title":"Federated learning based on dynamic regularization","author":"Acar","year":"2021"},{"key":"10.1016\/j.comnet.2024.110351_b34","series-title":"Federated learning for mobile keyboard prediction","author":"Hard","year":"2018"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138912862400183X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138912862400183X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T12:00:23Z","timestamp":1712836823000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S138912862400183X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":34,"alternative-id":["S138912862400183X"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2024.110351","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2024,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"FedSBS: Federated-Learning participant-selection method for Intrusion Detection Systems","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2024.110351","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"110351"}}