Workshop Title:

Privacy-Preserving Intrusion Detection: Empowering Security with Federated Learning

Date:

September 23rd, 2024 (UTC +10)

Organizer:

Torrens University Australia

Keywords:

  • Intrusion Detection
  • Privacy Preservation
  • Federated Learning
  • Cybersecurity
  • Data Privacy
  • Machine Learning

Workshop Chair:

Dr. Ammar Alazab
Senior Lecturer in Torrens University Australia

Personal Bio:

Ammar Alazab is a Senior Cybersecurity Lecturer at Melbourne Institute of Technology, with a wealth of industry experience. His expertise extends beyond academia, as he has a strong background in the cybersecurity industry. This practical experience enriches his teaching and research, providing valuable real-world insights to his students. His work focuses on cyber security, digital forensics of computer systems, and cybercrime detection and prevention. With numerous published articles and over 50 research papers in top-tier journals and conferences, Alazab is a prominent figure in the cybersecurity field. His remarkable contributions have led him to secure research grants amounting to over 1 million from reputed industry players, further validating the practical significance of his work.

Workshop Committee members:

Dr. Sarabjot Singh Melbourne Institute Technology sarabjotsingh@academic.mit.edu.au

Dr. Ansam Khraisat Deakin university sarabjotsingh@academic.mit.edu.au

Workshop Description:

Background:

Intrusion detection plays a critical role in safeguarding digital assets and networks against malicious activities. Traditional approaches rely on centralized data repositories, raising concerns about data privacy and security. Federated Learning, a decentralized machine learning paradigm, offers a promising solution by enabling collaborative model training across distributed devices while preserving data privacy. By harnessing the collective intelligence of edge devices without compromising individual privacy, Federated Learning revolutionizes intrusion detection systems, enhancing both detection accuracy and privacy protection. This workshop explores the intersection of privacy-preserving techniques and intrusion detection through Federated Learning, providing participants with insights, strategies, and practical tools to deploy privacy-preserving intrusion detection systems effectively in real-world scenarios.

Goal/Rationale:

The workshop aims to address the pressing need for privacy-preserving intrusion detection systems in the era of increasing data breaches and privacy concerns. Traditional centralized approaches to intrusion detection compromise data privacy, hindering the adoption of effective security measures. Federated Learning offers a solution by enabling collaborative model training across distributed devices while preserving data privacy. Recent advances in privacy-preserving techniques, such as differential privacy and homomorphic encryption, have further enhanced the feasibility and effectiveness of Federated Learning for intrusion detection. By fostering collaboration and knowledge exchange among cybersecurity professionals, data scientists, and industry stakeholders, the workshop seeks to empower participants with the knowledge and tools needed to deploy robust and privacy-preserving intrusion detection systems using Federated Learning, thereby advancing the state-of-the-art in cybersecurity while protecting individual privacy rights.

Scope and Information for Participants:

The workshop will cover a wide range of topics related to privacy-preserving intrusion detection through Federated Learning. Specific themes include:

1. Fundamentals of Federated Learning and its application to intrusion detection.

2. Privacy-preserving techniques compatible with Federated Learning, such as differential privacy and homomorphic encryption.

3. Real-world implementation challenges and strategies for deploying Federated Learning in intrusion detection systems.

4. Case studies and best practices illustrating successful implementations of Federated Learning for intrusion detection.

5. Open discussion and collaboration on overcoming challenges and advancing the field of privacy-preserving intrusion detection.

Participants are encouraged to contribute presentations, panel discussions, and interactive sessions focusing on these themes to foster a comprehensive understanding of the topic and drive innovation in privacy-preserving intrusion detection.

Venue:

196 Flinders St, Melbourne VIC 3000, Australia

VISA:


https://immi.homeaffairs.gov.au/home

In order to ensure the information is correct and up to date, there may be changes which we are not aware of. And different countries have different rules for the visa application. It is always a good idea to check the latest regulations in your country. You should confirm details with your local Consular Office. This page just gives some general information of the visa application.

Australia Visa Information

Do I need a visa to enter Australia?

Unless you are an Australian citizen, you will need a valid Australian visa to enter the country. New Zealand passport holders can apply for a visa upon arrival in the country. All other passport holders, regardless of age, must apply for a visa before leaving home. You can apply for a range of Australian visa types, including tourist visas and working holiday visas, at your nearest Australian Embassy or Consulate. You can also apply for certain types of visas on the Australian Department of Home Affairs website.

There are different Australian visa types available for travelers to Australia. Knowing which Australian visa to apply for depends on the length of your stay, your passport and the purpose of your visit. You'll also need to meet certain financial and medical requirements, be outside of Australia when applying and maintain health insurance for the duration of your stay.

Electronic Travel Authority Visa (subclass 601)

This visa allows you to visit Australia as many times as you want, for up to a year, and stay for three months each visit. This visa is available to passport holders from a number of countries and regions, who live outside Australia. A step-by-step guide on how to apply is here.

E-Visitor (subclass 651)

This is a free visa for multiple visits to Australia for tourism or business purposes for up to three months at a time within a 12-month period. This visa is available to passport holders from a number of European countries and it cannot be extended.

Visitor visa (subclass 600)

The Visitor visa allows you to visit Australia, either for tourism or business purposes. It is open to all nationalities. Generally, a period of stay of up to three months is granted, but up to 12 months may be granted in certain circumstances. Applicants will have to pay a fee to submit their application.

How can I apply for an Australian tourist visa?

The application process may differ depending on which visa you need. You can only apply for the Electronic Travel Authority visa (subclass 601) through the Australian ETA app. A step-by-step guide on how to apply is located here.

For other visas, you can apply online by creating an ImmiAccount and completing the application process. Be sure to submit your application well in advance of your travel date to allow enough time for processing. You may be asked to provide further supporting information. You will be notified in writing if your tourist visa is approved and it will be digitally linked to your passport.

For more information on different visa types, and Australian visa requirements including how to apply for an Australian visa, visit the Department of Home Affairs website.