
neous client’s data, and maintains comparable perfor-
mance to server-based centralized calibration as α in-
creases (i.e., α > 0.4), while offering advantages in
terms of privacy, as no calibration data must be shared
with the server. At the same time, our federated cali-
bration outperforms a local calibration strategy, where
each client calibrates separately the base model (e.g.
trained by means of FL): separate calibration steps at
different nodes might leverage partially representative
data and, hence, result in non-trustworthy models.
In addition, the classification performance in
terms of accuracy and F1-score of our proposed ap-
proach is not affected with respect to the base model,
and it is comparable to that of a model obtained by
performing centralized calibration.
These features make our approach particularly
well-suited for the deployment of reliable ML-based
Intrusion Detection Systems, where data are typically
unbalanced and where privacy and efficient resource
usage are essential. However, it still faces challenges
to work well with under-represented classes, high-
lighting an area for potential improvements. In ad-
dition, for future works, we plan to investigate other
approaches to calibration in a federated learning set-
ting, like isotonic regression and/or methods based on
the conformal prediction framework.
ACKNOWLEDGMENT
The research leading to these results has been par-
tially funded by the Italian Ministry of University and
Research (MUR) under the PRIN 2022 PNRR frame-
work (EU Contribution – NextGenerationEU – M.
4,C. 2, I. 1.1), SHIELDED project, ID P2022ZWS82.
REFERENCES
Al-Garadi, M. A., Mohamed, A., Al-Ali, A. K., Du, X., Ali,
I., and Guizani, M. (2020). A Survey of Machine and
Deep Learning Methods for Internet of Things (IoT)
Security. IEEE Communications Surveys Tutorials,
22(3):1646–1685.
Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., and
Anwar, A. (2020). TON-IoT Telemetry Dataset: A
New Generation Dataset of IoT and IIoT for Data-
Driven Intrusion Detection Systems. IEEE Access,
8:165130–165150.
Aouedi, O., Piamrat, K., Muller, G., and Singh, K. (2022).
Intrusion detection for Softwarized Networks with
Semi-supervised Federated Learning. In ICC 2022.
Beutel, D. J., Topal, T., Mathur, A., Qiu, X., Fernandez-
Marques, J., Gao, Y., Sani, L., Li, K. H., Parcol-
let, T., de Gusm
˜
ao, P. P. B., et al. (2020). Flower:
A Friendly Federated Learning Research Framework.
arXiv preprint arXiv:2007.14390.
B
¨
oken, B. (2021). On the Appropriateness of Platt Scal-
ing in Classifier Calibration. Information Systems,
95:101641.
Campos, E. M., Saura, P. F., Gonz
´
alez-Vidal, A.,
Hern
´
andez-Ramos, J. L., and et al. (2021). Evaluat-
ing Federated Learning for Intrusion Detection in In-
ternet of Things: Review and Challenges. Computer
Networks, page 108661.
Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac,
C., and Faruki, P. (2019). Network Intrusion De-
tection for IoT Security Based on Learning Tech-
niques. IEEE Communications Surveys Tutorials,
21(3):2671–2701.
Chen, T. and Guestrin, C. (2016). Xgboost: A Scalable Tree
Boosting System. In KDD 2016.
Chu, Y.-W., Han, D.-J., Hosseinalipour, S., and Brin-
ton, C. (2024). Unlocking the Potential of Model
Calibration in Federated Learning. arXiv preprint
arXiv:2409.04901.
European Union Agency for Cybersecurity (2023). ENISA
Threat Landscape 2023. https://www.enisa.europa.eu/
publications/enisa-threat-landscape-2023. [Accessed:
09-December-2024].
Guo, C., Pleiss, G., Sun, Y., and Weinberger, K. Q. (2017).
On Calibration of Modern Neural Networks. In ICML
2017.
Hassija, V., Chamola, V., Saxena, V., Jain, D., and et al.
(2019). A Survey on IoT Security: Application Areas,
Security Threats, and Solution Architectures. IEEE
Access, 7:82721–82743.
Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., et al.
(2021). Advances and Open Problems in Feder-
ated Learning. Foundations and Trends® in Machine
Learning, 14(1–2):1–210.
Khraisat, A., Gondal, I., Vamplew, P., and Kamruzzaman,
J. (2019). Survey of Intrusion Detection Systems:
Techniques, Datasets and Challenges. Cybersecurity,
2(1):1–22.
Liu, H. and Lang, B. (2019). Machine Learning and Deep
Learning Methods for Intrusion Detection Systems: A
Survey. Applied Sciences, 9:4396.
Markovic, T., Leon, M., Buffoni, D., and Punnekkat, S.
(2022). Random Forest based on Federated Learning
for Intrusion Detection. In AIAI 2022. Springer.
McMahan, B., Moore, E., Ramage, D., Hampson, S.,
and y Arcas, B. A. (2017). Communication-efficient
Learning of Deep Networks from Decentralized Data.
In Artificial Intelligence and Statistics, pages 1273–
1282.
Mothukuri, V., Parizi, R., Pouriyeh, S., Huang, Y., and et al.
(2020). A survey on Security and Privacy of Federated
Learning. Future Generation Computer Systems.
Moustafa, N., Hu, J., and Slay, J. (2018). A Holistic Review
of Network Anomaly Detection Systems: A Compre-
hensive Survey. Journal of Network and Computer
Applications, 128.
A Federated Approach to Enhance Calibration of Distributed ML-Based Intrusion Detection Systems
847