﻿<?xml version="1.0" encoding="utf-8"?>
<ArticleSet>
  <ARTICLE>
    <Journal>
      <PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName>
      <JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle>
      <ISSN>2322-1437</ISSN>
      <Volume>13</Volume>
      <Issue>52</Issue>
      <PubDate PubStatus="epublish">
        <Year>2026</Year>
        <Month>2</Month>
        <Day>3</Day>
      </PubDate>
    </Journal>
    <ArticleTitle>Federated Learning for Privacy-Preserving Intrusion Detection: A Systematic Review, Taxonomy, Challenges and Future Directions</ArticleTitle>
    <VernacularTitle>Federated Learning for Privacy-Preserving Intrusion Detection: A Systematic Review, Taxonomy, Challenges and Future Directions</VernacularTitle>
    <FirstPage>333</FirstPage>
    <LastPage>345</LastPage>
    <ELocationID EIdType="doi">10.66224/jist.45751.13.52.333</ELocationID>
    <Language>en</Language>
    <AuthorList>
      <Author>
        <FirstName>Dattatray Raghunath</FirstName>
        <LastName>Kale</LastName>
        <Affiliation></Affiliation>
      </Author>
      <Author>
        <FirstName>Swati</FirstName>
        <LastName>Shirke-Deshmukh</LastName>
        <Affiliation>Pimpri Chinchwad University Pune</Affiliation>
      </Author>
      <Author>
        <FirstName>Amulkumar</FirstName>
        <LastName>Jadhav</LastName>
        <Affiliation>D.Y.Patil College of Engineering and Technology, Kolhapur Maharashtra, India</Affiliation>
      </Author>
      <Author>
        <FirstName>Shrihari </FirstName>
        <LastName>Khatawkar </LastName>
        <Affiliation>Annasaheb Dange College of Engineering  and Technology, Ashta India</Affiliation>
      </Author>
      <Author>
        <FirstName>Sunny</FirstName>
        <LastName>Mohite</LastName>
        <Affiliation>D Y Patil College of Engineering and Technology, Kolhapur, India</Affiliation>
      </Author>
      <Author>
        <FirstName>Sarang</FirstName>
        <LastName>Patil</LastName>
        <Affiliation>Amity School of Engineering &amp; Technology,  Amity University Mumbai</Affiliation>
      </Author>
      <Author>
        <FirstName>Madhav</FirstName>
        <LastName>Salunkhe</LastName>
        <Affiliation>Annasaheb Dange College of Engineering  and Technology, Ashta India</Affiliation>
      </Author>
      <Author>
        <FirstName>Rahul</FirstName>
        <LastName>Sonkamble</LastName>
        <Affiliation>Pimpri Chinchwad University Pune</Affiliation>
      </Author>
    </AuthorList>
    <History PubStatus="received">
      <Year>2024</Year>
      <Month>2</Month>
      <Day>8</Day>
    </History>
    <Abstract>&lt;p class="Sammary"&gt;This paper presents a systematic review of intrusion detection systems (IDS) that leverage federated learning (FL) to enhance privacy in distributed cybersecurity environments. A total of 78 peer-reviewed studies published between 2019 and 2024 were selected using PRISMA guidelines. We categorize FL-based IDS solutions based on architecture (centralized, decentralized, hierarchical), aggregation methods (e.g., FedAvg, DAFL), and privacy-preserving techniques (e.g., differential privacy, homomorphic encryption). The survey also examines solutions to key challenges such as communication overhead, data heterogeneity, and poisoning attacks. Furthermore, this study outlines unresolved issues and proposes future research directions, including adaptive federated optimization and cross-domain deployments. This review serves as a valuable resource for researchers and practitioners aiming to develop privacy-aware, scalable, and intelligent IDS using federated learning.&lt;/p&gt;</Abstract>
    <ObjectList>
      <Object Type="Keyword">
        <Param Name="Value">Federated Learning</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Intrusion Detection</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Data Privacy</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Cyber security</Param>
      </Object>
    </ObjectList>
    <ArchiveCopySource DocType="Pdf">http://jist.ir/fa/Article/Download/45751</ArchiveCopySource>
  </ARTICLE>
</ArticleSet>