Optimization Scheme of Collaborative Intrusion Detection System Based on Blockchain Technology

被引:0
|
作者
Huang, Jiachen [1 ]
Chen, Yuling [1 ]
Wang, Xuewei [2 ]
Ouyang, Zhi [1 ]
Du, Nisuo [1 ]
机构
[1] Guizhou Univ, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Weifang Univ Sci & Technol, Comp Coll, Weifang 261000, Peoples R China
来源
ELECTRONICS | 2025年 / 14卷 / 02期
基金
中国国家自然科学基金;
关键词
collaborative intrusion detection; ensemble learning; weighted random forest; ALGORITHM;
D O I
10.3390/electronics14020261
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In light of the escalating complexity of the cyber threat environment, the role of Collaborative Intrusion Detection Systems (CIDSs) in reinforcing contemporary cybersecurity defenses is becoming ever more critical. This paper presents a Blockchain-based Collaborative Intrusion Detection Framework (BCIDF), an innovative methodology aimed at enhancing the efficacy of threat detection and information dissemination. To address the issue of alert collisions during data exchange, an Alternating Random Assignment Selection Mechanism (ARASM) is proposed. This mechanism aims to optimize the selection process of domain leader nodes, thereby partitioning traffic and reducing the size of conflict domains. Unlike conventional CIDS approaches that typically rely on independent node-level detection, our framework incorporates a Weighted Random Forest (WRF) ensemble learning algorithm, enabling collaborative detection among nodes and significantly boosting the system's overall detection capability. The viability of the BCIDF framework has been rigorously assessed through extensive experimentation utilizing the NSL-KDD dataset. The empirical findings indicate that BCIDF outperforms traditional intrusion detection systems in terms of detection precision, offering a robust and highly effective solution within the realm of cybersecurity.
引用
收藏
页数:26
相关论文
共 50 条
  • [31] A SURVEY ON MULTI-AGENT BASED COLLABORATIVE INTRUSION DETECTION SYSTEMS
    Bougueroua, Nassima
    Mazouzi, Smaine
    Belaoued, Mohamed
    Seddari, Noureddine
    Derhab, Abdelouahid
    Bouras, Abdelghani
    JOURNAL OF ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING RESEARCH, 2021, 11 (02) : 111 - 142
  • [32] Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection
    Fragkiadakis, Alexandros G.
    Siris, Vasilios A.
    Petroulakis, Nikolaos E.
    Traganitis, Apostolos P.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2015, 15 (02): : 276 - 294
  • [33] Particle swarm optimization and feature selection for intrusion detection system
    Kunhare, Nilesh
    Tiwari, Ritu
    Dhar, Joydip
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2020, 45 (01):
  • [34] A Collaborative Intrusion Detection System against DDoS Attack in Peer to Peer Network
    Ranjbar, Leila
    Khorsandi, Siavash
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 3, 2011, 181 : 353 - +
  • [35] Harris hawk optimization trained artificial neural network for anomaly based intrusion detection system
    Narengbam, Lenin
    Dey, Shouvik
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23):
  • [36] A hierarchical intrusion detection system based on extreme learning machine and nature-inspired optimization
    Alzaqebah, Abdullah
    Aljarah, Ibrahim
    Al-Kadi, Omar
    COMPUTERS & SECURITY, 2023, 124
  • [37] Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection
    Li, Wenjuan
    Tian, Fei
    Li, Jin
    Xiang, Yang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16):
  • [38] Generative Pattern Dissemination for Collaborative Intrusion Detection
    Petersen, Mike
    Hardegen, Christoph
    Buehler, Ulrich
    2023 6TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2023, : 163 - 170
  • [39] Improved Ant Colony Optimization and Machine Learning Based Ensemble Intrusion Detection Model
    Vanitha, S.
    Balasubramanie, P.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (01): : 849 - 864
  • [40] A secure localization scheme based on trust assessment for WSNs using blockchain technology
    Goyat, Rekha
    Kumar, Gulshan
    Alazab, Mamoun
    Saha, Rahul
    Thomas, Reji
    Rai, Mritunjay Kumar
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 221 - 231