Next Article in Journal
Biotechnology and Bio-Based Products Perceptions in the Community of Madrid: A Representative Survey Dataset
Previous Article in Journal
Exploring Spatial Patterns in Sensor Data for Humidity, Temperature, and RSSI Measurements
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cloud-Based Smart Contract Analysis in FinTech Using IoT-Integrated Federated Learning in Intrusion Detection

by
Venkatagurunatham Naidu Kollu
1,
Vijayaraj Janarthanan
2,
Muthulakshmi Karupusamy
3 and
Manikandan Ramachandran
4,*
1
Department of Computer Science and Engineering, Dr.M.G.R. Educational and Research Institute, Chennai 600095, India
2
Department of Artificial Intelligence and Data Science, Easwari Engineering College, Ramapuram, Chennai 600089, India
3
Department of Information Technology, PanimalarEngineering College, Poonamallee, Chennai 600123, India
4
School of Computing, SASTRA Deemed University, Thanjavur 613401, India
*
Author to whom correspondence should be addressed.
Submission received: 13 March 2023 / Revised: 24 April 2023 / Accepted: 24 April 2023 / Published: 29 April 2023
(This article belongs to the Special Issue Data Management for Internet-of-Things)

Abstract

:
Data sharing is proposed because the issue of data islands hinders advancement of artificial intelligence technology in the 5G era. Sharing high-quality data has a direct impact on how well machine-learning models work, but there will always be misuse and leakage of data. The field of financial technology, or FinTech, has received a lot of attention and is growing quickly. This field has seen the introduction of new terms as a result of its ongoing expansion. One example of such terminology is “FinTech”. This term is used to describe a variety of procedures utilized frequently in the financial technology industry. This study aims to create a cloud-based intrusion detection system based on IoT federated learning architecture as well as smart contract analysis. This study proposes a novel method for detecting intrusions using a cyber-threat federated graphical authentication system and cloud-based smart contracts in FinTech data. Users are required to create a route on a world map as their credentials under this scheme. We had 120 people participate in the evaluation, 60 of whom had a background in finance or FinTech. The simulation was then carried out in Python using a variety of FinTech cyber-attack datasets for accuracy, precision, recall, F-measure, AUC (Area under the ROC Curve), trust value, scalability, and integrity. The proposed technique attained accuracy of 95%, precision of 85%, RMSE of 59%, recall of 68%, F-measure of 83%, AUC of 79%, trust value of 65%, scalability of 91%, and integrity of 83%.

1. Introduction

It has been stated that the fields of ML (machine learning) as well as data science play a crucial role in science. As a result, the need for privacy remains a fundamental value for the majority of people. The idea of collecting data is becoming more popular all over the world. It has also been demonstrated that social media platforms can improve services by collecting user data [1]. The amount of data used has significantly increased, resulting in an increase in private data. As a result, privacy-related concepts have attracted the attention of consumers and policymakers. General Data Protection Regulation (GDPR) is among the moves made because of information security across globe. The move has been linked to the need to promote the necessary kinds of developments and ensure that significant accomplishments in the field of protected data are made. In 2017, Google introduced the concept of FL [2]. The idea empowered information researchers to share their factual models in dissecting information. However, security was an essential requirement for data sharing. As a result, federated learning proved to be a successful strategy for facilitating privacy for data analysts all over the world. Blockchain technology has begun to be recognized by financial services as having the potential to revolutionize areas such as increasing revenue, enhancing the end-user experience, and the delivery process [3]. Similarly to every other technology-focused sector, the financial technology industry is currently developing. There are a great deal of new monetary applications coming out constantly, and every one offers better and more innovative ways of taking care of installments and cycling them. It is anticipated that financial blockchain industry will have reached a value of 36.04 billion dollars by the end of 2028 [4].
An emerging financial technology known as “Decentralized Finance,” or “DeFi,” is based on the blockchain and aims to limit banks’ control over money and financial services. Digital ledgers will also have a big impact on how we obtain, send, store, and manage our money over many decades. Cybercriminals can target almost any business, but they typically select their targets based on which ones will bring in the most revenue or have the greatest impact. Because they satisfy the aforementioned requirements, banks and other similar financial services are frequently targeted by hackers. Their continuous endeavors to carefully change as well as the difficult strategic situation that is accelerating the utilization of hybridwork areas all make it more straightforward for cybercriminals to get information and sell it. Cyber threat actors are disproportionately concentrating on the banking sector as a direct result of this [5]. This is the basis for complex joint model training, which makes these benefits possible [6]. For training this proposed model, we obtained datasets from https://www.unb.ca/cic/datasets/nsl.html, https://www.kaggle.com/datasets/galaxyh/kdd-cup-1999-data, https://www.unb.ca/cic/datasets/ids.html (all accessed on 9 January 2023) with data license from Canadian Institute for Cybersecurity.
Research Gap: Ongoing advancements in deep-learning procedures have delivered critical enhancements in well-established simulated intelligence occupations, such as medication revelation, quality examination, and discourse and picture acknowledgment. According to McMahan et al., despite the numerous benefits of deep learning, the same training dataset that made it so reliable also raises serious privacy concerns. Federated Deep Learning is a mobile device-specific distributed deep-learning paradigm (FDL). In FDL, distributed training involves a number of parties, and a parameter server keeps track of a developing deep-learning model. This effectively combines distributed computation with deep learning.
Research Goal: The cyber threat federated graphical authentication system is used to develop the proposed model for cloud-based smart contracts in FinTech data and their intrusion detection. Utilizing artificial intelligence and blockchain technology has numerous benefits. Simply put, blockchain’s inherent security features can be strengthened by utilizing machine learning’s analytical capabilities. The capacity to handle enormous measures of information safely and really in the monetary administrations industry might be very significant to foundations and end clients.
Research Questions: The industrial Internet of Things (IIoT) has radically changed over the past few years as a result of the swift advancement of wireless transmission and processing. IoT networks have seen the emergence of a wide variety of cutting-edge portable devices, including smart phones, smart watches, and smart apps. They have been heavily utilized by a variety of businesses, including live gaming, smart manufacturing, navigational systems, smart cities, and smart healthcare. Because of their rapid adoption, there are still a number of significant problems with IoT network design. One of the main issues is finding effective and adaptable control for IoT systems that might help with energy conservation, increase the number of applications, and make future development easier. Other key barriers are the cognitive load, time efficiency, and ongoing need for computer resources in IoT networks. Additionally, they ensure confidentiality and protection against unauthorized access. Due to the rapid advancement of personal awareness and digital technology, people are starting to take personal data security even more seriously. Distributed learning techniques are necessary for devices to cooperate to produce a single learning approach with local training. Federated learning (FL) is a decentralized machine-learning (ML) platform. In contrast to centralized learning frameworks, data created on an end device do not leave the device, hence the FL framework naturally encourages secrecy and privacy. The distributed learning model is trained on the device itself using the data from the participating devices. A client device (such a neighbourhood Wi-Fi switch) and a cloud server only provide the modified settings. The following are some benefits of using FL in remote IoT networks: (i) local ML system settings can save power and use less wireless bandwidth than exchanging a lot of training data; (ii) by locally calibrating an ML model’s parameters, a significant reduction in transmission delay can be achieved; and (iii) FL can help with information protection because the majority of the local learning model factors are sent, and the preparation information is stored locally.

2. Literature Review

Every financial institution wants to develop a safe business operating system to increase its level of security without having to install a lot of hardware resources [7]. When electronic transactions and networking methods first emerged, the financial industry’s cyber problem was initially viewed as a business issue [8]. A number of surveys have highlighted the importance of developing solid IT security strategies [9]. The use of various security measures to safeguard sensitive data is the subject of one of the surveys about business operations.

Existing FinTech Intrusion Detection System

A recent study by [10] investigates whether or not the financial institution’s records are protected against current attacks. In addition, the study measured the potential effects of security risks on business scope, sales, performance, and markets. In addition, Ref. [11] has demonstrated how much IT transparency can affect the trustworthiness of financial counseling encounters. Overall, concerns about business operations stem from an unidentified technicality and the concealment of the implementation process and IT strategy formulation [12]. One application of FinTech for enhancing business operations is the use of intelligent agents to predict and monitor financial risks [13]. In general, the implementation process, IT strategy formulation, and unknown technical details are the root causes of most business operations-related concerns. Some hidden technical components arise as a result of business operations concerns. The classification of cyber incidents and masked technical complexity have prompted the majority of FSI cyber concerns. In addition, the FinTech industry has largely accepted cloud computing as a web-based service model [14]. For instance, Bank of America (BoA) recently announced that Microsoft and financial institutions are collaborating on the development of blockchain technologies to improve financial transitions [15]. Cloud-based solutions boost system performance by connecting financial companies and their intended markets in close proximity [16]. However, because workload is outsourced, this company also introduced new threats and attacks. The most pressing issues with cloud-based solutions are: a) an absence of information controls in mists that make veil intricacy issues for FSIs [17] on the grounds that private mists become standard in FinTech. Federated ML was the focus of work [18] and author [19] presentations of FL’s current advanced and unsolved issues. Numerous researchers focused on FL’s issues, and work [20] conducted a survey of FL system components regarding privacy as well as security. In mobile-edge computing (MEC), author [21] provided an overview of FL chain’s concepts and opportunities. Author [22] provided a comprehensive analysis of FL privacy and security that has the potential to help bridge the gap between the current state of federated AI (FAI)and the future. Work [23] discussed the privacy issue and preservation measures surrounding the integration of BT and FL for IoT. The summary based on the existing technique is added in Table 1.

3. Proposed Model

In this section, a novel method for cloud-based smart contracts in FinTech data and their intrusion detection with a cyber-threat federated graphical authentication system are proposed and discussed. Federated learning is used to train models by distributing existing training models to multiple personal edge devices as well as utilizing the edge devices’ local data, as shown in Figure 1. In order to update global model, central server accepts as well as incorporates training results from each edge device.
Anomalies in statistics are data points that deviate significantly from other observations (also known as outliers and abnormalities). We consider the regions N1, N2, and N3 to be typical data instance regions since we presume that they are made up of the majority of observations. Data points O1 and O2 can be categorized as anomalies if they are far from these zones. In order to more precisely describe anomalies, we suppose that an n-dimensional dataset with the dimensions I 1,…, n, and µj follows a normal distribution with mean µj and variance σj for every dimension. In particular, using the normal distribution assumption, we have the following by using Equation (1):
μ j = i = 1 m x i , j / m , σ j 2 = i = 1 m ( x i , j μ j ) 2 / m
If a new vector x exists, probability p(x) of an anomaly is computed using the formula in Equation (2):
p ( x ) = j = 1 n p ( x j ; μ j , σ j 2 ) = j = 1 n 1 2 π σ j exp ( ( x j μ j ) 2 2 σ j 2 )
As shown on the right side of Figure 2, ENs distribute the global method to participants at the beginning of each global iteration, and each fading block of collaborative method download has two phases. NDs and RDs receive the global model from ENs in the first phase. RDs send the received model to FDs in the second phase. Privacy information could be leaked if RDs were able to decode the ENs’ superimposed code more quickly than FDs.

3.1. Cloud Based Smart Contract Analysis

In order to simplify things, Figure 3 shows how Ethereum smart contracts work without the mining process. The EVM-1 transaction for this smart contract is broadcast to the blockchain after it has been machine-compiled into byte code, where each byte denotes a single operation. A miner intercepts it and confirms Block 1. EVM-2 retrieves web-based data after a user submits a request via a web interface, inserts it into a transaction, and then deploys it to the blockchain. In Block2, the status of transaction tx is modified. Node 3 must synchronize up to at least Block 2 in order to examine the future states contained in the contract and see the changes that tx results in.
Contracts that we create include metadata about record ownership, permissions, and data integrity. Instructions for managing these properties are cryptographically signed in the blockchain transactions of our system. Before granting third-party viewing permission, a policy may, for instance, require sending of separate consent transactions from healthcare professionals as well as patients.
We planned a framework in view of blockchain shrewd agreements for complex medical services work processes. The management of data access permissions between various entities in healthcare ecosystem is the purpose for which smart contracts are developed for various medical workflows. A number of stakeholders are participating in this plan and engage in a variety of activities, as shown in Figure 3. As can be seen, a smart contract that is kept using blockchain technology might be created to meet all the requirements, from controlling access to data to managing different permissions. This will lead to improved communication between patients and physicians. Data authorization requirements are part of smart contracts. It can also assist in tracking every activity with a unique identifier, from its beginning to its completion. Along with all of the processes and functions that are embedded in the smart contracts, numerous scenarios have been designed as well as explained. Because the operation can be directly managed through smart contract, there will be no need for a centralized entity to manage as well as approve it. The expense of managing the process administratively will be greatly decreased as a result.
We use smart contracts on Ethereum blockchain to record patient–provider connections and add a cryptographic hash of record to blockchain to prevent data manipulation. These contracts link a medical record to data retrieval instructions and viewing rights for remote server execution. Individuals can provide their permission for their medical providers to share their records, and doctors can add a new record for a particular patient. Both times, the individual receiving the new data is automatically notified and given the option of studying the proposed record before accepting or rejecting it. Participants in the creation of their records thereafter continue to be involved and informed. By offering a specified contract that compiles references to all patient–provider connections for a user, this system prioritizes usability. Users now have a central location to check for updates to their medical history. We use a DNS-like technology to manage identity verification, mapping the user’s Ethereum address to an existing and well-known form of identification, such as their name or social security number. After our database authentication server consults the blockchain to confirm permissions, a syncing mechanism manages “off-chain” data transfers between a patient database and a provider database.

3.2. FinTech Intrusion Detection Based IoT Module Using Cyber Threat Federated Graphical Authentication System

Traditional distributed deep-learning algorithms gather and examine a specific volume of private data on central servers during the method training phase, utilizing the distributed stochastic gradient descent (DSGD) method. Because of this, the training process may expose IIoT devices to data privacy leakage risks. There are three phases to the FL procedure: the update phase, aggregation phase, and initialization phase. We suppose FL has N edge devices, and that, during the setup phase, a parameter aggregator, also referred to as a cloud aggregator, distributes a pre-trained global method t based on public datasets to every edge device. To do so, local loss function to be optimized is described as Equation (3):
min x d F k ( x ) = 1 D k i D k E z i D k f ( x ; z i ) + λ h ( x ) ,
The cloud aggregator uses Federated during the update phase to obtaina new global model for iteration t + 1; therefore we have by Equation (4)
ω t + 1 ω t + 1 n n = 1 N F t + 1 n
where n = 1 N F t + 1 n denotes method updates aggregation and 1 n n = 1 N F t + 1 n denotes average aggregation. The above procedure is repeated by cloud aggregator as well as edge devices until global method converges. We have the following for a deep neural network’s fully connected (FC) layer: b = f(Wa + v), where b is output, f is nonlinear mapping, a is input, v is bias, and W is weight. A neural network’s most fundamental operation is this formula. The aforementioned formula can be simplified as follows for each specific neuron i: b i = ReLU ( j = 0 n 1 W i j a j ) , where the activation function is ReLU. The equivalent formula is given as Equation (5) because gradient compression transforms the appropriate weight matrix into a sparse matrix.
b i = ReLU ( j X i Y Sparse [ I i j ] a j )
where Ij stand for the location data of gradient in weight matrix W and j X i Y S [ I i j ] denotes the compressed weight matrix. The communication overhead is decreased by this strategy by saving the gradient in the weight matrix W. Initially, based on load state of all optional edge devices taking part in FL, we determine the load center value of various network resources.
In condition 2, the estimation method is shown, and the heap balance is then identified as Equation (6).
l m = 1 k i = 1 k n u m r e i m
Among these, num rem I signifies number of m resources accessible on edge device I and k denotes number of optional edge devices. Equation (7) illustrates how to evaluate degree of load balance, and Equation (6) can be used to determine it.
l b = 1 k m = 1 ξ i = 1 k ( l m i l m ) 2
After method is supplied to edge device, we measure the edge device’s real-time load in accordance with Equation (8).
ε j i = m = 1 ξ w j i m ( 1 μ j i )
where memory resources (m = 1), CPU resources (m = 2), and bandwidth resources (m = 3) are indicated. The weight of every resource after Model J is sent to the edge device is wmji. As seen in Equation (9), i. mji represents the quantity of resources that are being used.
μ j i m = a m o r e m n u m r e i m
The number of m resources needed for method training is indicated by notation amo rem. The method for calculating num rem I is given in Equation (10).
num _ re = tot _ re i m a m _ r e m ,
Because edges would be unsightly and would limit the user’s ability to select which photographs to click, our system does not adopt Jansen’s solution for the graphical passwords. The user was given the option to choose their chosen image. Regardless of size, the technology separates the image into thirty thumbnail photos that are all the same size—10 mm by 10 mm. The frame measures 50 by 60 mm. Although the sizes of mobile touch displays vary, the human–computer interface in our method is uniform in size. The user chooses three to six thumbnails from the image using the touch panel on the mobile device. These pictures are used to create the user’s graphical password. The times when the client must input their graphical passwords are indicated in the message section at the base. When a user enters their graphical passwords successfully, this paper vibrates to let them know. Every time a user touches a touchscreen on a portable handheld device, the system records a pressure feature at thumbnail photo.
The system verifies the user’s graphical password sequence against the one that was registered during the enrolment process. If the user’s login request is inconsistent, the system rejects it. If not, related features are looked at. The user’s login is then approved or denied by the system according to a threshold t. The user is valid if D = t. If not, the system declines the user’s login request. In other words, a person can only log into a system if they can successfully authenticate using both the KDA and graphical password authentications. Thus, even if a shoulder-surfing assault manages to obtain the password, the likelihood of the authentication being compromized is decreased.
D = 1 4 k 2 f = 1 4 k 2 X v , f μ f σ f
Only the distance between the user’s login sample and the training samples is examined in this phase. Regardless of whether the quantity of clients builds, the ideal opportunity for completing the verification will notbe impacted. In a similar vein, computation during this phase is quick. Using the framework of cyber-attack attribution, analysis method, platform construction, and analysis content are all discussed. Additionally, this framework can serve as a model for actual deployment schema design.
The structure of attribution for cyberattacks is depicted in Figure 4. There are three main components to the framework: the beginning of the investigation, attribution analysis, and threat intelligence, The following sections discuss the functionalities and internal components of each component of the framework: (1) The beginning of the analysis. Based on previous experience with emergency response and cyber-attack analysis, the primary components of the initial data are as follows: samples of malware, information from the network, and logs. We can use a web spider to acquire malware from malware sample websites during the experiment. Malicious activities of malware, such as Cuckoo and ZeroWine, can be examined using the malware sandbox. Network traffic analysis focuses primarily on traffic detection and analysis. To catch bad behavior, we can add maliciousIP addresses and domain names to a blacklist. Traffic analysis can be used to determine the relationship between the traffic data. Wireshark, Moloch, Malcon, and Maltrail, among others, are typical examples of traffic detection and analysis software. Management and evaluation of logs are two of the log-related tasks. Users’ access histories, alarm data, operating records, and other data may be included in the log records. Effective log analysis can be provided by robust log management. Malware tests, network traffic, and log records are the beginning of digital-assault attribution examination.
(2) Threat intelligence. A threat intelligence quality test, data integration, and system integration are among the duties related to threat intelligence. Common standards for threat intelligence include STIX, TAXII, CybOX, Yara, and OpenIOC, among others. These standards can be utilized and referenced in practical attribution analysis work. The process of combining different data files as well as feeding threat intelligence data to the central database is known as threat intelligence data integration. The IP-related data, including systems such as ZoomEye, Shodan, and IVRE, are combined. In attribution analysis, we can fully utilize threat intelligence through system integration. The purpose of the quality test on threat intelligence is to improve the analysis result by assessing the quality of threat intelligence since its exchange. The attribution of cyber-attacks is based on threat intelligence.
(3) The input for attribution analysis consists of data from threat intelligence. Methods for attribution analysis fall into three categories: reasoning analysis, collaborative analysis, and association analysis. To obtain as much relevant and important data from the threat intelligence database as possible, association analysis is used. During the process of association analysis, primary concerns are efficiency and constraint. Reasoning investigation is used to obtain conceivable relationships and assault chains from related information. In attribution analysis, the goal of collaborative analysis is to make full use of computer performance and analyst thinking. The primary step in attributing a cyberattack is analysis. The architecture of cyber-attack attribution is introduced into the framework of analysis and threat intelligence. We can learn about the process of attributing cyber attacks as well as the systems and data that are associated with them from the framework. In parallel, we are able to quickly construct a testing environment in accordance with the framework to calculate effort of cyber-attack attribution.
To ensure that a strong D2D connect is laid out, we must also take into account the space constraints while selecting edge devices. Device A will function as a D2D transmitter to connect to the central server if Device A uses D2D communication to communicate with Device B. The SINR of the central server needs to be greater than a predetermined level. As seen in the accompanying example, this value guarantees trustworthiness in multi-hop communication (12).
γ d e a , s e = | h d e a , s e | 2 P d e a | h m e c , s e | 2 P m e c + σ 2 γ d e h
Hmec, se stands for channel gain between multiplexed cellular user and central server, while hdea, se stands for channel gain between Device A and the server. The abbreviations Pmec and Pdea represent the transmit powers of the respective cellular users and devices, respectively. De, which is the SINR of the channel between Device A and the central server, represents the threshold limit that needs to be attained. The SINR threshold is the lowest threshold that satisfies task delay, as can be observed from Equations (13) and (14),
R d e D 2 D = B log 2 [ 1 + min ( γ d e , s e ) ] ,
γ d e h h = 2 k d e D 2 D s 1
where B is the D2D communication link’s bandwidth. The interference-to-noise ratio between the apparatus and the central server is represented by γde, se. Equation (15) can be used to represent the minimal transmit power needed for equipment a and the central server to maintain dependable transmission.
P d e a min = γ d e h h ( | h m e c , s e | 2 P m e c + σ 2 ) | h d e a , s e | 2
The final edge device is reliably chosen when it is based on social attribute perception, which also successfully prevents edge device withdrawal from training and data contamination. All particles are drawn to the average of P b e s t , i t and   G best when c 1 = c 2.
The examination of the one-dimensional parameter Equations (16) and (17)
d S = μ ( t , θ , S ) d t + σ ( t , θ , S ) d B ( t ) .
G ( θ ) = g 0 ( S 0 θ ) n = 0 N 1 g ( S n + 1 S n ; θ )
Similarly, Equations (18)–(20) illustrate how to minimize the detrimental effect of the log-likelihood function to estimate θ.
log G ( θ ) = log [ g 0 ( S 0 θ ) ] n = 0 N 1 log [ g ( S n + 1 S n ; θ ) ]
S n + 1 = S n + μ ( t , θ , S n ) h + σ ( t , θ , S n ) Δ B n
1 σ ( t , θ , S n ) 2 π h exp [ ( S n + 1 S n μ ( t , θ , S n ) h ) 2 2 σ 2 ( t , θ , S n ) h ]
The method of moments achieves the simplest form on a discrete maximum likelihood function by using the approximated PDF indicated above rather than the actual transitional PDF g(Sn+1|Snt; ) in Equations (21)–(23).
α ¯ ( β ¯ n = 0 N 1 h n = 0 N 1 S n h ) = S N S 0
a ¯ ( β ¯ n = 0 N 1 h S n n = 0 N 1 h ) = n = 0 N 1 S n + 1 S n S n
σ ¯ 2 = 1 N n = 0 N 1 ( S n + 1 S n α ¯ ( β ¯ S n ) h ) 2 S n h
Here, we will outline our approach to inferring Markov network structure from data. We develop a probabilistic decision tree for each variable Xi to express the conditional probability of that variable given all other variables, P(Xi |X Xi). A set of conjunctive characteristics that can reflect the same probability distribution as the tree is created for each tree. All features are combined into a single model at this point, and any common weight-learning algorithm is used to learn weights worldwide.
With by Equations (24) and (25)
= { ( a , μ , C ) p | τ B | × | τ B | × K | τ L | : k = 1 K C k t = 1 , C k t 0 , k = 1 , , K t τ L } .
P i t ( a , μ ) = t N t left p i t ( a t , μ t ) t N t right ( 1 p i t ( a t , μ t ) ) , i = 1 , , N , t τ L
For each k = 1, …, K, the chance of an individual II being placed in class k is equal to t τ L P i t ( a * , μ * ) C k t * . Probability of belonging to class k returned by randomized tree is equal to Equation (26) for an entering individual with predictor vector x.
x Π k ( x ) : = t τ L P x t ( a * , μ * ) C k t *
The following unrestricted issue would arise according to Equation (27):
minim ( a , μ , a ˜ , μ ˜ ) ( p + 1 ) ( | τ B | + | τ L | 1 N i = 1 N ( t τ L P i t ( a , μ ) ( a ˜ t x i + μ ˜ t ) y i ) 2 + λ local j = 1 p ( a j . , a ˜ j ) 1 + λ global j = 1 p ( a j . , a ˜ j )
Using a nonparametric kernel density technique, a closed-form solution generated from the transitional density (28) and (29) can be employed as
g ¯ M [ ( t , S n ) ( t n 1 , S n 1 ) ; θ ] = 1 MD i = 1 M K ( S n T i D )
g [ ( t n , S n ) ( t n 1 , S n 1 ) , , ( t 0 , S 0 ) ; θ ]
Network Training:
To develop a neural network model that depicts the conditional distribution of inputs (for example, an input vector x = (x1, x2, …, xa)) to outputs (for example, a class y), one FL challenge is to extract the features from high-dimensional data. Each hidden layer node in this common design computes a weighted average of the inputs after receiving the output of the neurons from the previous layer as input. A non-linear activation function value is ultimately output to the entire input value. A neural network’s weight learning issue is a non-linear optimization problem. In supervised learning, the output error of the neural network after passing all training data serves as the objective function. Most of the methods that are utilized to tackle this problem are gradient descent variations. Typically, a random point marks the start of the steep drop. A trainer uses training data to determine the gradient of the non-linear objective function being optimized in subsequent iterations, updating the weights as necessary. Until the algorithm converges to a local optimum, this procedure will continue for a few epochs. The n participants asynchronously exchange their calculated gradient results to updatethe model parameters with one another after each cycle of training. The shared gradients are entirely within the participant’s control. The total of all gradients that went towards the local model’s optimum determines the global descent. As a result, participants gain from one another’s training datasets and create a more accurate model that can be trained independently and is not constrained to a local training dataset.
Algorithm for Proposed FL-based FinTech:
Initialize w , ϑ s , ϑ n , ϑ r , ϑ f , γ , η , ϵ
  • for Incident e 1 , , E do
  • for b B do
  • Rearrange w 0 , S b 0
  • Reset replay buffer D b , s , D b , n , D b , r , D b , f .
  • ϑ b , s e = ϑ s e , ϑ b , n c = ϑ n e , ϑ b , r c = ϑ r e , ϑ b , f c = ϑ f e .
  • for k 1 , K do
  • In every resource block b , every EN gives S b k and updates its observation to o b , s k .
  • Input o b , s k into every EN’s policy ϑ b , a e and finds present pricing method P b k
for end devices.
  • End devices viewer S b k and update their observations to o b , n k , o b , r k , o b , f k
  • Input o b , n k , o b , r k , o b , f k to actor network ϑ b , n ϵ , ϑ b , r ϵ , ϑ k , f ϵ and find transmit power ρ b , n k , ρ b , r k , ρ b , f k and jamming coefficient Ω b k , d , Ω b k , u
  • End devices upload w n k + 1 to specification server while near devices allocate jamming signals.
End devices do τ b k round local method update.
  • PS combined global method for end devices with w k + 1 = n = 1 N Q n w n k + 1 Q
  • Updates S b k into and evaluates rewards R b , s k , R b , n k , R b , r k , R b , f k
  • Store transitions ( o b , s k , a b , s k , R b , s k , o b , s k + 1 ) in D b , s

4. Results and Discussion

The model is evaluated with the help of the NSL-KDD dataset. In our research, each client trains a method utilizing local data and uploads updated method parameters to the server for aggregation, allowing the server to dynamically choose the client count. This experiment makes use of a server with the Windows 10 operating system and an Intel(R)Core(TM) i5- 10210U [email protected] GHz processor. Pytorch, a Python deep-learning library, is what we use.
Description of dataset: For the purpose of conducting experiments on intrusion detection in computer networks, Diro and Chilamkurti utilized three original-size datasets known as KDDCUP99, ISCX, and NSL-KDD. They proposed a conveyed deep-learning-based IoT/mist network assault recognition framework, and trials showed fruitful reception of computerized reasoning to online protection purposes. In addition, the distributed architecture attack detection system for IoT applications, such as smart cities, was designed as well as implemented by the authors. To demonstrate the superiority of deep over shallow methods, the evaluation process took into account performance metrics, such as accuracy, detection rate, and false alarm rate. The experimental section looked at two-class and four-class categories in the first round of experiments. In addition, unseen test data were selected as representations of zero-day attack detections.

4.1. Proposed Analysis

The above Table 2 shows the parametric analysis based on the proposed technique for cybersecurity datasets. Here the datasets analyzed are KDDCUP99, ISCX, and NSL-KDD in terms of accuracy, precision, RMSE, recall, F-measure, AUC, trust value, scalability, and integrity.
Figure 5 shows the parametric analysis for the KDDCUP99 dataset based on the proposed technique for cybersecurity datasets. Here, the proposed technique attained accuracy of 89%, precision of 77%, RMSE of 55%, recall of 65%, F-measure of 81%, AUC of 77%, trust value of 55%, scalability of 79%, and integrity of 59%.
Figure 6 shows the parametric analysis for the ISCX dataset for the proposed technique. The proposed technique attained accuracy of 92%, precision of 85%, RMSE of 59%, recall of 68%, F-measure of 83%, AUC of 79%, trust value of 59%, scalability of 81%, and integrity of 63%.
Figure 7 shows the parametric analysis for the NSL-KDD dataset based on the proposed technique for the cybersecurity dataset. Here, the proposed technique attained accuracy of 95%, precision of 88%, RMSE of 61%, recall of 71%, F-measure of 85%, AUC of 81%trust value of 63%, scalability of 83%, and integrity of 66%.
An effective IDS requires a strong dataset that faithfully captures the reality of real world. In our tests to determine whether the approach outlined in the study is effective, we use a public intrusion detection dataset known as NSL-KDD. The NSL-KDD dataset is extensively utilized for intrusion detection. The NSL-KDD dataset has an advantage over the original KDD CUP 99 dataset in that it doesn’t include repeating records in the preparation set, which prevents classifiers from favoring additional continuous records, among other things. This dataset contains the atypical attack types of denial-of-service (DoS), user to root (U2R), remote to local (R2L), and probing attack (Probe). Data about typical network behavior are also supplied. The main emphasis of our work is the classification and detection of four main types of anomalous attacks. Each example in the NSLKDD dataset contains forty-one element credits and one class-recognizable proof, and class ID is utilized to show whether the association record is typical or a particular sort of assault. The system’s channel bandwidth is varied between 10 MHz and 50 MHz during the simulations. Equilibrium method is utilized in these simulations to contrast with the proposed method. Under a threshold secure transmission rate, Equilibrium method represents the Stackelberg equilibrium of this multi-agent game. As the channel transfer speed is designated by the framework increment, the general advantage of the proposed approach diminishes. As with distributed ML, we can use this resource to save computation by only performing a small number of local updates instead of a large number of global updates.

4.2. Comparative Analysis

Table 3 shows analyses for various cybersecurity datasets. The datasets analyzed are KDDCUP99, ISCX, and NSL-KDD in terms of accuracy, precision, RMSE, recall, F-measure, AUC, trust value, scalability, and integrity.
Figure 8 shows the analysis of accuracy. Here, the proposed technique attained accuracy of 89%, existing FinTech attained 81%, and MEC attained accuracy of 88% for the KDDCUP99 dataset; for ISCX, the proposed technique attained accuracy of 92%, existing FinTech attained 88%, and MEC attained accuracy of 90%; while the proposed technique attained accuracy of 95%, existing FinTech attained 92%, and MEC attained accuracy of 94% for the NSL-KDD dataset.
Figure 9 shows the comparison of KDDCUP99, ISCX, and NSL-KDD in terms of precision. For the KDDCUP99 dataset, the proposed technique attained precision of 77%, existing FinTech attained 73%, and MEC attained precision of 75%; for ISCX, the proposed technique attained precision of 85%, existing FinTech attained precision of 81%, and MEC attained precision of 83%;while the proposed technique attained precision of 88%, existing FinTech attained precision of 81%, and MEC attained precision of 85% for the NSL-KDD dataset.
Figure 10 shows the comparative analysis of the RMSE. Here, the proposed technique attained RMSE of 55%, existing FinTech attained 50%, and MEC attained RMSE of 51% for KDDCUP99 dataset; for ISCX, the proposed technique attained RMSE of 59%, existing FinTech attained RMSE of 51%, and MEC attained RMSE of 55%;while the proposed technique attained RMSE of 61%, existing FinTech attained RMSE of 55%, and MEC attained RMSE of 58% for the NSL-KDD dataset.
Figure 11 shows a comparison of F-measure for KDDCUP99, ISCX, and NSL-KDD. The proposed technique attained F-measure of 81%, existing FinTech attained F-measure of 75%, and MEC attained F-measure of 78% for KDDCUP99 dataset; for ISCX, the proposed technique attained F-measure of 83%, existing FinTech attained an F-measure of 80%, and MEC attained F-measure of 81%; while the proposed technique attained F-measure of 85%, existing FinTech attained F-measure of 79%, and MEC attained F-measure of 81% for NSL-KDD dataset.
Figure 12 shows the comparative analysis of the AUC between the proposed and existing techniques. Here, the proposed technique attained AUC of 77%, existing FinTech attained AUC of 71%, and MEC attained AUC of 75% for KDDCUP99 dataset; for ISCX, the proposed technique attained an AUC of 79%, existing FinTech attained AUC of 72%, and MEC attained AUC of 75%;while the proposed technique attained AUC of 81%, existing FinTech attained AUC of 79%, and MEC attained AUC of 80% for NSL-KDD dataset.
Figure 13 shows the comparative analysis of the trust value between the proposed and existing techniques. Here, the proposed technique attained a trust value of 61%, existing FinTech attained a trust value of 55%, and MEC attained a trust value of 59% for KDDCUP99 dataset; for ISCX, the proposed technique attained a trust value of 63%, existing FinTech attained a trust value of 57%, and MEC attained a trust value of 62%; while the proposed technique attained a trust value of 65%, existing FinTech attained a trust value of 59%, and MEC attained trust value of 63% for NSL-KDD dataset.
Figure 14 shows the comparative analysis of scalability between the proposed and existing techniques. Here, the proposed technique attained scalability of 81%, existing FinTech attained trust value scalability of 77%, and MEC attained scalability of 79% for KDDCUP99 dataset; for ISCX, the proposed technique attained scalability of 85%, existing FinTech attained scalability of 82%, and MEC attained scalability of 83%; and the proposed technique attained scalability of 91%, existing FinTech attained scalability of 85%, and MEC attained scalability of 89% for the NSL-KDD dataset.
Figure 15 shows the comparative analysis of integrity between the proposed and existing techniques. Here, the proposed technique attained integrity of 75%, existing FinTech attained integrity of 71%, and MEC attained integrity of 73% for the KDDCUP99 dataset; for ISCX, the proposed technique attained integrity of 79%, existing FinTech attained integrity of 72%, and MEC attained integrity of 75%; while the proposed technique attained integrity of 83%, existing FinTech attained integrity of 75%, and MEC attained integrity of 79% for the NSL-KDD dataset.

4.3. Discussion

Five edge nodes, fifteen end devices, and a parameter server make up the system in the experiment. Each of the five resource blocks contains an edge node, a device that is close by, a device that is relayed, and a device that is far away.
Because the system is set up for full participation, all devices, regardless of whether they have more or fewer data, must participate in model training. For a single resource block, the SNR is 30, the path loss factor is 2, and the channel bandwidth is set to W = 20. Default values for data quantity and data quality in simulation experiments are Q = 512 and 0.5, respectively. On Windows 10, we use PyTorch 1.8 to carry out our experiments. We utilized a fully connected multi-layer processor with two hidden 64-unit output layers and headers to represent the policy. The actor network server’s pricing strategy is determined by three headers. There are three headers for near and far devices and two headers for relay devices in the devices actor network to determine their communication strategies. The value coefficient is c = 0.5, the clip ratio is equal to 0.2, the discount factor is equal to 0.99, and local learning rate is set to 0.0003. The number of training episodes is set to E = 100, each episode has a length of K = 16, and the number of previous experiences is L = 4. Depending on its computation resource, each device can select a different Db 16, 32 of the mini-batch size when performing the local update. The neural networks are then optimized using the Adam optimizer. The proposed technique attained accuracy of 89%, precision of 77%, RMSE of 55%, F-measure of 81%, AUC of 77%, trust value of 61%, scalability of 81%, and integrity of 75%.; existing FinTech attained accuracy of 81%, precision of 77%, RMSE of 50%,F-measure of 75%, AUC of 71%, trust value of 63%, scalability of 85%, and integrity of 79%; MEC attained accuracy of 88%, precision of 75%, RMSE of 51%,F-measure of 78%, AUC of 75%, trust value of 65%, scalability of 91%, and integrity of 83%.

5. Conclusions

This study aimed to develop a cloud-based IDS based on IoT federated learning architecture and smart contract analysis. A federated graphical authentication system was developed for cloud-based smart contracts in FinTech data and their intrusion detection with the help of cyber threats. Data augmentation is intended to increase the quantity of training data by making use of knowledge that is already present in local training data. This will increase the local model’s generalizability, while failing to generalize to data that has not yet been discovered. For secure certification of credit sharing method results under FL, we suggest authority control contracts and credit verification contracts. According to thorough experimental results and security research, our suggested credit model sharing system, which is based on FL as well as blockchain, is extremely accurate, effective, and stable. The proposed technique attained accuracy of 95%, precision of 85%, RMSE of 59%, recall of 68%, F-measure of 83%, AUC of 79%, trust value of 65%, scalability of 91%, and integrity of 83%. The proposed method may be used broadly in industries where data security and privacy are crucial, yet cooperation across organizations can result in significantly higher performance and accuracy. We plan to develop class-adaptive solutions in the context of ongoing research.
It is simple to plan correspondence-productive methodologies that convey short messages or model changes over and over as a component of the preparation interaction, as opposed to sending the total informational collection over the organization. Connection, bandwidth, and power are essential for maintaining these activities because this process is carried out in millions of tiny devices. The best two choices for making these cycles more effective and diminishing correspondence in stages are: (1) reducing the total number of rounds of communication, and (2) reducing the number of messages exchanged during each round.

Author Contributions

Conceptualization, V.N.K.; original draft and review& editing, V.J.; validation, M.K.; proposal of the new methodology, M.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The dataset presented in this study is openly available at https://www.unb.ca/cic/datasets/nsl.html, https://www.kaggle.com/datasets/galaxyh/kdd-cup-1999-data; https://www.unb.ca/cic/datasets/ids.html., accessed on 9 January 2023.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chuang, L.M.; Liu, C.C.; Kao, H.K. The adoption of fintech service: TAM perspective. Int. J. Manag. Adm. Sci. 2016, 3, 1–15. [Google Scholar]
  2. Hu, Z.; Ding, S.; Li, S.; Chen, L.; Yang, S. Adoption intention of fintech services for bank users: An empirical examination with an extended technology acceptance model. Symmetry 2019, 11, 340. [Google Scholar] [CrossRef]
  3. Dospinescu, O.; Dospinescu, N.; Agheorghiesei, D.T. Fintech Services and Factors Determining the Expected Benefits of Users: Evidence in Romania for Millennials and Generation Z; Technical University of Liberec: Liberec, Czechia, 2021. [Google Scholar]
  4. Nasir, A.; Shaukat, K.; Iqbal Khan, K.; Hameed, I.A.; Alam, T.M.; Luo, S. Trends and directions of financial technology (Fintech) in society and environment: A bibliometric study. Appl. Sci. 2021, 11, 10353. [Google Scholar] [CrossRef]
  5. Mai, T.; Yao, H.; Xu, J.; Zhang, N.; Liu, Q.; Guo, S. Automatic double-auction mechanism for federated learning service market in internet of things. IEEE Trans. Netw. Sci. Eng. 2022, 9, 3123–3135. [Google Scholar] [CrossRef]
  6. Aouedi, O.; Piamrat, K.; Muller, G.; Singh, K. Federated semisupervised learning for attack detection in industrial Internet of Things. IEEE Trans. Ind. Inform. 2022, 19, 286–295. [Google Scholar] [CrossRef]
  7. Wan, Y.; Qu, Y.; Gao, L.; Xiang, Y. Privacy-preserving blockchain-enabled federated learning for B5G-Driven edge computing. Comput. Netw. 2022, 204, 108671. [Google Scholar] [CrossRef]
  8. Noman, A.A.; Rahaman, M.; Pranto, T.H.; Rahman, R.M. Blockchain for medical collaboration: A federated learning-based approach for multi-class respiratory disease classification. Healthc. Anal. 2023, 3, 100135. [Google Scholar] [CrossRef]
  9. Islam, A.; Al Amin, A.; Shin, S.Y. FBI: A Federated Learning-Based Blockchain-Embedded Data Accumulation Scheme Using Drones for Internet of Things. IEEE Wirel. Commun. Lett. 2022, 11, 972–976. [Google Scholar] [CrossRef]
  10. Loh, Y.; Chen, Z.; Zhao, Y.; Yu, H. FLAS: A Platform for Studying Attacks on Federated Learning. In Social Computing and Social Media: Design, User Experience and Impact, Proceedings of the 14th International Conference, SCSM 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, 26 June–1 July 2022, Part I; Springer International Publishing: Cham, Switzerland, 2022; pp. 160–169. [Google Scholar]
  11. Sheng, X.; Gao, Z.; Cui, X.; Yu, C. Federated Reinforcement Learning Technology and Application in Edge Intelligence Scene. In Advances in Internet, Data & Web Technologies, Proceedings of the 11th International Conference on Emerging Internet, Data & Web Technologies (EIDWT-2023), Semarang, Indonesia, 23–25 February 2023; Springer International Publishing: Cham, Switzerland, 2023; pp. 284–291. [Google Scholar]
  12. Lyu, L.; Yu, H.; Ma, X.; Chen, C.; Sun, L.; Zhao, J.; Yang, Q.; Philip, S.Y. Privacy and robustness in federated learning: Attacks and defenses. IEEE Trans. Neural Netw. Learn. Syst. 2022, 1–21. [Google Scholar] [CrossRef] [PubMed]
  13. Khadidos, A.; Subbalakshmi AV, V.S.; Khadidos, A.; Alsobhi, A.; Yaseen, S.M.; Mirza, O.M. Wireless communication based cloud network architecture using AI assisted with IoT for FinTech application. Optik 2022, 269, 169872. [Google Scholar] [CrossRef]
  14. Ali, A.; Almaiah, M.A.; Hajjej, F.; Pasha, M.F.; Fang, O.H.; Khan, R.; Teo, J.; Zakarya, M. An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors 2022, 22, 572. [Google Scholar] [CrossRef] [PubMed]
  15. Upreti, K.; Syed, M.H.; Khan, M.A.; Fatima, H.; Alam, M.S.; Sharma, A.K. Enhanced algorithmic modelling and architecture in deep reinforcement learning based on wireless communication Fintech technology. Optik 2023, 272, 170309. [Google Scholar] [CrossRef]
  16. Kumar, P.; Kumar, R.; Gupta, G.P.; Tripathi, R. BDEdge: Blockchain and deep-learning for secure edge-envisioned green CAVs. IEEE Trans. Green Commun. Netw. 2022, 6, 1330–1339. [Google Scholar] [CrossRef]
  17. Singh, R.; Deorari, R. Enhancing Collaborative Intrusion detection networks against insider attack using supervised learning technique. In Proceedings of the 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), Mysuru, India, 16–17 October 2022; pp. 1–6. [Google Scholar]
  18. Sheth, H.S.K.; Ilavarasi, A.K.; Tyagi, A.K. Deep Learning, blockchain based multi-layered Authentication and Security Architectures. In Proceedings of the 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India, 9–11 May 2022; pp. 476–485. [Google Scholar]
  19. Baliker, C.; Baza, M.; Alourani, A.; Alshehri, A.; Alshahrani, H.; Choo, K.K.R. On the Applications of Blockchain in FinTech: Advancements and Opportunities. IEEE Trans. Eng. Manag. 2023. [Google Scholar] [CrossRef]
  20. Ch, R.; Srivastava, G.; Nagasree YL, V.; Ponugumati, A.; Ramachandran, S. Robust Cyber-Physical System Enabled Smart Healthcare Unit Using Blockchain Technology. Electronics 2022, 11, 3070. [Google Scholar] [CrossRef]
  21. Stojanović, B.; Božić, J. Robust Financial Fraud Alerting System Based in the Cloud Environment. Sensors 2022, 22, 9461. [Google Scholar] [CrossRef] [PubMed]
  22. Gehlot, A.; Joshi, A. Multilayer Statistical Intrusion Detection Model for Wireless Network. In Proceedings of the 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), Mysuru, India, 16–17 October 2022; pp. 1–7. [Google Scholar]
  23. Rana, A.; Srivastava, V.K. Design of IoT network using Deep learning model for Anomaly Detection. In Proceedings of the 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), Mysuru, India, 16–17 October 2022; pp. 1–8. [Google Scholar]
Figure 1. Proposed intrusion detection system for FinTech based on IoT.
Figure 1. Proposed intrusion detection system for FinTech based on IoT.
Data 08 00083 g001
Figure 2. Secure FinTech data analysis.
Figure 2. Secure FinTech data analysis.
Data 08 00083 g002
Figure 3. Ethereum Smart Contract Mechanism.
Figure 3. Ethereum Smart Contract Mechanism.
Data 08 00083 g003
Figure 4. Framework of cyber attack attribution.
Figure 4. Framework of cyber attack attribution.
Data 08 00083 g004
Figure 5. Parametric analysis for KDDCUP99 dataset.
Figure 5. Parametric analysis for KDDCUP99 dataset.
Data 08 00083 g005
Figure 6. Parametric analysis for ISCX dataset.
Figure 6. Parametric analysis for ISCX dataset.
Data 08 00083 g006
Figure 7. parametric analysis for NSL-KDD dataset.
Figure 7. parametric analysis for NSL-KDD dataset.
Data 08 00083 g007
Figure 8. Comparison of accuracy.
Figure 8. Comparison of accuracy.
Data 08 00083 g008
Figure 9. Comparison of precision.
Figure 9. Comparison of precision.
Data 08 00083 g009
Figure 10. Comparison of RMSE.
Figure 10. Comparison of RMSE.
Data 08 00083 g010
Figure 11. Comparison of F-measure.
Figure 11. Comparison of F-measure.
Data 08 00083 g011
Figure 12. Comparison of AUC.
Figure 12. Comparison of AUC.
Data 08 00083 g012
Figure 13. Comparison of trust value.
Figure 13. Comparison of trust value.
Data 08 00083 g013
Figure 14. Comparison of scalability.
Figure 14. Comparison of scalability.
Data 08 00083 g014
Figure 15. Comparison of Integrity.
Figure 15. Comparison of Integrity.
Data 08 00083 g015
Table 1. Summary based on existing FL-based FinTech intrusion detection.
Table 1. Summary based on existing FL-based FinTech intrusion detection.
Applicable DomainObjectiveContributionLimitation
Blockchain and AIA study on AI-related blockchain applicationsThe literature reviews on new blockchain platforms, applications, and protocolsTheir study did not take into account issues such as privacy, smart contract security, trustworthy oracles, scalability, consensus protocols, standardization, interoperability, quantum computing robustness, and governance.
Blockchain technologyA thorough analysis of BCIn this study, BC architecture and fundamental aspects of BC were covered.In this study, BC architecture and fundamental aspects of BC were covered.
Decentralized FL framework created in BCA distributed FL architectural context that was created on BC with committee consensus (BFLC)The quantity of consensus computation may be efficiently reduced with the use of a novel committee consensus technique, which may also lessen malicious attacks.Time complexity was nottaken into account.
For the allocation of sensitive data in the Internet of Things, BC, and FLUsing blockchain technology, construct a secure data sharing architecture for numerous distributed participants.The authors added FL to the permissioned BC consensus process, enabling the use of the consensus computing effort for federated training.The study’s technological resources were insufficient.
Vehicle-based edge computingA secure peer-to-peer data-exchange strategy for in-vehicle computing and systems was proposed.A secure peer-to-peer data exchange strategy for in-vehicle computing and systems was proposed.Limited dataset was employed in this investigation.
A federated learning methodology based on blockchainTo maintain the privacy and security of loHT data, FL, and discrepancy confidentiality (DC) were proposed, enabling isolated loHT data to be educated at the holder’s location.The topic of integrating a minimal security and privacy solution into the FL environment was addressed by the authors.The settings for the accuracy and loss measures are quite low, but they can be raised in the future.
Table 2. Parametric analysis of proposed technique based on various cybersecurity datasets.
Table 2. Parametric analysis of proposed technique based on various cybersecurity datasets.
DatasetAccuracyPrecisionRMSERecallF-MeasureAUCTrust ValueScalabilityIntegrity
KDDCUP99897755658177557959
ISCX928559688379598163
NSL-KDD958861718581638366
Table 3. Analysis based on various cybersecurity datasets.
Table 3. Analysis based on various cybersecurity datasets.
DatasetTechniquesAccuracyPrecisionRMSEF-MeasureAUCTrust ValueScalabilityIntegrity
KDDCUP99FinTech8173507571557771
MEC8875517875597973
CSCA_IoT_IFLID8977558177618175
ISCXFinTech8881518072578272
MEC9083558175628375
CSCA_IoT_IFLID9285598379638579
NSL-KDDFinTech9281557979598575
MEC9485588180638979
CSCA_IoT_IFLID9588618581659183
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kollu, V.N.; Janarthanan, V.; Karupusamy, M.; Ramachandran, M. Cloud-Based Smart Contract Analysis in FinTech Using IoT-Integrated Federated Learning in Intrusion Detection. Data 2023, 8, 83. https://doi.org/10.3390/data8050083

AMA Style

Kollu VN, Janarthanan V, Karupusamy M, Ramachandran M. Cloud-Based Smart Contract Analysis in FinTech Using IoT-Integrated Federated Learning in Intrusion Detection. Data. 2023; 8(5):83. https://doi.org/10.3390/data8050083

Chicago/Turabian Style

Kollu, Venkatagurunatham Naidu, Vijayaraj Janarthanan, Muthulakshmi Karupusamy, and Manikandan Ramachandran. 2023. "Cloud-Based Smart Contract Analysis in FinTech Using IoT-Integrated Federated Learning in Intrusion Detection" Data 8, no. 5: 83. https://doi.org/10.3390/data8050083

APA Style

Kollu, V. N., Janarthanan, V., Karupusamy, M., & Ramachandran, M. (2023). Cloud-Based Smart Contract Analysis in FinTech Using IoT-Integrated Federated Learning in Intrusion Detection. Data, 8(5), 83. https://doi.org/10.3390/data8050083

Article Metrics

Back to TopTop