Deep Learning based Moving Target Defence for Federated Learning against Poisoning Attack in MEC Systems with a 6G Wireless Model

๐Ÿ“… 2025-09-13
๐Ÿ“ˆ Citations: 0
โœจ Influential: 0
๐Ÿ“„ PDF
๐Ÿค– AI Summary
In 6G-enabled multi-access edge computing (MEC) systems, existing model-based anomaly detection methods for defending against model poisoning attacks in federated learning lack robustness under device heterogeneity and sophisticated attack patterns. To address this, we propose a novel framework integrating device-level uplink traffic time-series analysis with mobile target defense (MTD). First, we employ recurrent neural networks to model temporal traffic characteristics over 6G wireless channels, thereby evaluating participant trustworthiness without accessing local model parameters. Second, we design a deep reinforcement learningโ€“driven dynamic topology mutation mechanism to adaptively optimize edge node collaboration. The framework significantly improves detection speed and accuracy against DDoS- and botnet-style poisoning attacks. Evaluated in low-latency edge environments, it demonstrates strong security guarantees, real-time responsiveness, and practical deployability.

Technology Category

Application Category

๐Ÿ“ Abstract
Collaboration opportunities for devices are facilitated with Federated Learning (FL). Edge computing facilitates aggregation at edge and reduces latency. To deal with model poisoning attacks, model-based outlier detection mechanisms may not operate efficiently with hetereogenous models or in recognition of complex attacks. This paper fosters the defense line against model poisoning attack by exploiting device-level traffic analysis to anticipate the reliability of participants. FL is empowered with a topology mutation strategy, as a Moving Target Defence (MTD) strategy to dynamically change the participants in learning. Based on the adoption of recurrent neural networks for time-series analysis of traffic and a 6G wireless model, optimization framework for MTD strategy is given. A deep reinforcement mechanism is provided to optimize topology mutation in adaption with the anticipated Byzantine status of devices and the communication channel capabilities at devices. For a DDoS attack detection application and under Botnet attack at devices level, results illustrate acceptable malicious models exclusion and improvement in recognition time and accuracy.
Problem

Research questions and friction points this paper is trying to address.

Defending federated learning against model poisoning attacks
Using traffic analysis to anticipate participant reliability
Optimizing topology mutation with deep reinforcement learning
Innovation

Methods, ideas, or system contributions that make the work stand out.

Device-level traffic analysis for reliability
Topology mutation as Moving Target Defence
Deep reinforcement optimizes Byzantine adaptation
๐Ÿ”Ž Similar Papers
No similar papers found.