EconPapers    
Economics at your fingertips  
 

Decentralized Machine Learning Models to Preserve Data Privacy in Intrusion Detection Systems (IDS)

Cletus A. Sieh, Edwin Hope Beh, Daniel Chibamb and Aditya Dayal Tyagi
Additional contact information
Cletus A. Sieh: Department of Computer Science and Application Sharda University, Greater Noida, India
Edwin Hope Beh: Department of Computer Science and Application Sharda University, Greater Noida, India
Daniel Chibamb: Department of Computer Science and Application Sharda University, Greater Noida, India
Aditya Dayal Tyagi: Department of Computer Science and Application Sharda University, Greater Noida, India

International Journal of Latest Technology in Engineering, Management & Applied Science, 2025, vol. 14, issue 4, 655-661

Abstract: As Technology keeps advancing rapidly, the risk of data leakage is on the increase. centralized servers are often attacked in order to control the flow of data and divert the actual network direction and breach data privacy. Data can be manipulated on a higher scale once the centralized systems have been attacked and the existing IDS fails to recognize a breach in the network server. In order to have a more robust privacy of data and accurate functioning of the IDS through ML and DL approaches to curb cyber-attacks and network attacks, the use of a decentralized ML model would be effective. This approach aims at introducing a decentralized network where data will be shared in protective nodes and each node will have an existing IDS that will not be exhausted with a huge workload. Federated Learning, which is a sub domain of DML, would offer solutions by enhancing local models on edge devices without the need and reliance of a centralized server [16]. This approach will reduce the risk of data exposure by ensuring that data stays on the source device and can only be accessed and controlled from that source only. The outcome of this research would vividly outline the effectiveness of decentralization of data and the efficiency of IDS on specialized points of the data network to protect the exchange and control of data without a maximum risk of data leak.

Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://www.ijltemas.in/DigitalLibrary/Vol.14Issue4/655-661.pdf (application/pdf)
https://www.ijltemas.in/papers/volume-14-issue-4/655-661.html (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:bjb:journl:v:14:y:2025:i:4:p:655-661

Access Statistics for this article

International Journal of Latest Technology in Engineering, Management & Applied Science is currently edited by Dr. Pawan Verma

More articles in International Journal of Latest Technology in Engineering, Management & Applied Science from International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Bibliographic data for series maintained by Dr. Pawan Verma ().

 
Page updated 2025-06-18
Handle: RePEc:bjb:journl:v:14:y:2025:i:4:p:655-661