Convolutional neural network for intrusion detection using blockchain technology

被引:4
作者
Aljabri A. [1 ]
Jemili F. [1 ]
Korbaa O. [1 ]
机构
[1] MARS Research Laboratory LR17ES05, Universite de Sousse, ISITCom, Hammam Sousse
关键词
Blockchain-based intrusion detection; convolutional neural networks; cyber-physical security; deep learning; feature selection; intrusion resilience;
D O I
10.1080/1206212X.2023.2284443
中图分类号
学科分类号
摘要
Cyber-physical systems (CPS) are becoming increasingly ubiquitous, connecting the physical world with the cyber realm. This convergence has exposed CPS to a growing threat landscape, necessitating robust intrusion detection systems (IDS) to safeguard critical infrastructure. Deep learning (DL) has emerged as a powerful tool for IDS, and convolutional neural networks (CNNs) have demonstrated exceptional performance in this domain. However, traditional IDS models are susceptible to data tampering and manipulation, compromising their integrity and effectiveness. Blockchain technology, with its inherent immutability and tamper-proof nature, offers a promising solution to enhance the security and reliability of IDS models. In this study, we propose a CNN-based IDS model that leverages blockchain technology to secure network traffic data. Our hypothesis is that integrating blockchain with CNNs can significantly improve the security and robustness of IDS models against data tampering and manipulation. To test our hypothesis, we employ a greedy-based genetic algorithm to select the most relevant features from network traffic data, followed by training a CNN model using the selected features. Finally, we evaluate the trained CNN model on a real-world dataset, demonstrating its ability to accurately classify network traffic as normal or intrusive. The results of our evaluation reveal that the proposed CNN-based IDS model achieves a classification accuracy of 99.2%, surpassing traditional IDS models. Moreover, our model exhibits enhanced resilience against data tampering and manipulation, demonstrating the effectiveness of blockchain integration in safeguarding the integrity of IDS models. Our findings underscore the potential of blockchain-enhanced CNNs as a robust and secure solution for intrusion detection in CPS, ensuring the integrity and protection of critical infrastructure. © 2023 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:67 / 77
页数:10
相关论文
共 47 条
[1]  
Hajimirzaei B., Navimipour N.J., Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm, Ict Express, 5, 1, pp. 56-59, (2019)
[2]  
Krishnaveni S., Sivamohan S., Sridhar S.S., Et al., Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing, Cluster Comput, 24, 3, pp. 1761-1779, (2021)
[3]  
Ghrabat M.J., Ma G., Avila P.L.P., Et al., Content-based image retrieval of color, shape and texture by using novel multi-SVM classifier, Int J Mach Learn Comput, 9, 4, pp. 483-489, (2019)
[4]  
Gao Y., Liu Y., Jin Y., Et al., A novel semi-supervised learning approach for network intrusion detection on cloud-based robotic system, IEEE Access, 6, pp. 50927-50938, (2018)
[5]  
Karuppusamy L., Ravi J., Dabbu M., Et al., Chronological salp swarm algorithm based deep belief network for intrusion detection in cloud using fuzzy entropy, Int J Numer Model Electron Networks Devices Fields, 35, 1, (2022)
[6]  
Mishra P., Varadharajan V., Pilli E.S., Et al., Vmguard: a vmi-based security architecture for intrusion detection in cloud environment, IEEE Trans Cloud Computing, 8, 3, pp. 957-971, (2018)
[7]  
Singh P., Ranga V., Attack and intrusion detection in cloud computing using an ensemble learning approach, Int J Inf Technol, 13, 2, pp. 565-571, (2021)
[8]  
Patil R., Dudeja H., Gawade S., Et al., (2018)
[9]  
Shyla S.I., Sujatha S.S., Cloud security: LKM and optimal fuzzy system for intrusion detection in cloud environment, J Intell Syst, 29, 1, pp. 1626-1642, (2019)
[10]  
Shamshirband S., Fathi M., Chronopoulos A.T., Et al., Computational intelligence intrusion detection techniques in mobile cloud computing environments. Review, Taxonomy, and Open Research Issues, J Inf Secur Appl, 55, (2020)