Federated Learning for Cybersecurity: Decentralized Threat Detection in Large Networks

Authors

  • Lagan Goel Author
  • Dr Shantanu Bindewari Author

DOI:

https://doi.org/10.63345/z5ftw797

Keywords:

Federated Learning, Cybersecurity, Threat Detection, Intrusion Detection Systems, PrivacyPreserving AI, Distributed Learning, Network Security

Abstract

Cybersecurity has become one of the most critical challenges in modern computing as cyber
threats increase in sophistication and frequency. Traditional centralized security models suffer
from several weaknesses, including privacy concerns, high communication costs, and
susceptibility to attacks targeting a single point of failure. Federated Learning (FL) presents a
novel approach by enabling distributed training of threat detection models across multiple devices
without transferring raw data, ensuring privacy and efficiency. This paper explores the
application of Federated Learning for cybersecurity, specifically in decentralized threat detection
across large-scale networks. The study evaluates the efficiency of FL models in identifying various
cyber threats, including malware, phishing attempts, denial-of-service (DoS) attacks, and
advanced persistent threats (APTs). The proposed FL-based cybersecurity framework is
compared with traditional centralized security models and conventional intrusion detection
systems (IDS), highlighting its higher detection accuracy, lower false positive rates, and improved
privacy protection. Experimental results indicate that FL-based threat detection reduces the risk
of data breaches, increases model adaptability in dynamic environments, and provides a scalable
approach to securing enterprise and IoT networks.

Downloads

Download data is not yet available.

Downloads

Published

2025-04-06

Issue

Section

Original Research Articles

How to Cite

Federated Learning for Cybersecurity: Decentralized Threat Detection in Large Networks. (2025). World Journal of Future Technologies in Computer Science and Engineering (WJFTCSE), 1(1), 23-33. https://doi.org/10.63345/z5ftw797

Similar Articles

You may also start an advanced similarity search for this article.