Table 2 Federated data partitioning schemes.
From: Dataset-centric evaluation of federated intrusion detection models in IoT networks
Dataset | Clients | Partition strategy | Data distribution characteristics |
|---|---|---|---|
Edge-IIoTset | 6 | By device/application type (each client has traffic from certain IoT/IIoT devices and associated attacks) | Moderate non-i.i.d.: some attack types appear only on specific clients (e.g., Client A might see mostly industrial-related attacks, Client B sees home IoT attacks). |
CIC-IoT2023 | 10 | By groups of IoT devices (approximately 10 devices per client) | Moderate non-i.i.d.: all attack classes present overall, but distribution varies: e.g., one client may contain more DDoS attacks if those targeted its device group heavily, another client might have more web attacks, etc |
TII-SSRC-23 | 5 | Random flow partition (each client gets a mix of all traffic types) | Nearly i.i.d.: each client receives a stratified sample of benign and all 26 attack subtypes. Minor statistical differences exist but largely balanced |
Combined | 3 | Each client is an entire dataset (Client1 =Edge, Client2=CIC, Client3=TII) | Highly non-i.i.d.: completely different distributions per client (different feature scaling, attack mixtures, class definitions) |