Research Article

Predicting the APT for Cyber Situation Comprehension in 5G-Enabled IoT Scenarios Based on Differentially Private Federated Learning

Table 1

The APTPMFL pseudo-code.

APTPMFL algorithm

(1) procedure IoT DEVICE SIDE
(2)  Nullification operation:
(3)  Features extraction:
(4)  Norm bounding:
(5)  Adding perturbation:
(6)  Upload to the edge server
(7) end procedure
(8) procedure EDGE SERVER SIDE
(9) EVENT: Receive perturbed features
(10)  Initialize:
(11)  for each do
(12)   for batch do
(13)    
(14)    
(15)   end for
(16)   
(17) end for
(18)  Upload to the SECURITY SERVICE CLOUD
(19) end procedure
(20) procedure SECURITY SERVICE CLOUD SIDE
(21) EVENT: Receive local model updates
(22)  Initialize global parameters
(23)  for all do
(24)   
(25)  end for
(26)  Send to the edge server
(27) end procedure