Research Article

Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things

Table 1

Specific description of each type of attack.

CategoryDescriptionSpecific attacks included in the training setSpecific attacks included in the test set

DoSSending a large number of packets to the server to make it busy, the attacker tries to prevent legitimate users from accessing the serverback, land, Neptune, pod, smurf, teardropapache2, mailbomb, processtable

U2RThe attacker accesses the system through a normal user account and then attempts to gain root access to the system using certain vulnerabilitiesbuffer-overflow, perl, load module, rootkithttptunnel, ps, sqlattack, xterm

R2LThe attacker can remotely log into the computer and then use the computer’s account and weak password to enter the computer to operateftp-write, imap, multihop, phf, guess-passwd, warezclient, spy, warezmastersendmail, worm, named, xlock, snmpgetattack, snmpguess, xsnoop

ProbeThe attacker purposefully collects information about a computer network to bypass its security controlsipsweep, Satan, nmap, portsweepMscan, saint