Optimization Scheme of Collaborative Intrusion Detection System Based on Blockchain Technology

被引:0
|
作者
Huang, Jiachen [1 ]
Chen, Yuling [1 ]
Wang, Xuewei [2 ]
Ouyang, Zhi [1 ]
Du, Nisuo [1 ]
机构
[1] Guizhou Univ, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Weifang Univ Sci & Technol, Comp Coll, Weifang 261000, Peoples R China
来源
ELECTRONICS | 2025年 / 14卷 / 02期
基金
中国国家自然科学基金;
关键词
collaborative intrusion detection; ensemble learning; weighted random forest; ALGORITHM;
D O I
10.3390/electronics14020261
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In light of the escalating complexity of the cyber threat environment, the role of Collaborative Intrusion Detection Systems (CIDSs) in reinforcing contemporary cybersecurity defenses is becoming ever more critical. This paper presents a Blockchain-based Collaborative Intrusion Detection Framework (BCIDF), an innovative methodology aimed at enhancing the efficacy of threat detection and information dissemination. To address the issue of alert collisions during data exchange, an Alternating Random Assignment Selection Mechanism (ARASM) is proposed. This mechanism aims to optimize the selection process of domain leader nodes, thereby partitioning traffic and reducing the size of conflict domains. Unlike conventional CIDS approaches that typically rely on independent node-level detection, our framework incorporates a Weighted Random Forest (WRF) ensemble learning algorithm, enabling collaborative detection among nodes and significantly boosting the system's overall detection capability. The viability of the BCIDF framework has been rigorously assessed through extensive experimentation utilizing the NSL-KDD dataset. The empirical findings indicate that BCIDF outperforms traditional intrusion detection systems in terms of detection precision, offering a robust and highly effective solution within the realm of cybersecurity.
引用
收藏
页数:26
相关论文
共 50 条
  • [41] A comprehensive review of AI based intrusion detection system
    Sowmya T.
    Mary Anita E.A.
    Measurement: Sensors, 2023, 28
  • [42] An Intrusion Detection System Based on a Simplified Residual Network
    Xiao, Yuelei
    Xiao, Xing
    INFORMATION, 2019, 10 (11)
  • [43] Intrusion detection of industrial control system based on grey wolf optimization integrated random black hole
    Geng Z.
    Zeng R.
    Xu Y.
    Han Y.
    Gu X.
    Huagong Xuebao/CIESC Journal, 2020, 71 (03): : 1080 - 1087
  • [44] Collaborative based Vehicular Ad-hoc Network Intrusion Detection System using Optimized Support Vector Machine
    Azath, M.
    Singh, Vaishali
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (03) : 238 - 244
  • [45] Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection
    Li, Wenjuan
    Meng, Weizhi
    Kwok, Lam For
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 453 - 463
  • [46] A new intrusion detection and alarm correlation technology based on neural network
    Liu, Yansong
    Zhu, Li
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [47] Maximum correlation based mutual information scheme for intrusion detection in the data networks
    Gavel, Shashank
    Raghuvanshi, Ajay Singh
    Tiwari, Sudarshan
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 189
  • [48] Intrusion detection technology research based high-speed network
    Bo, S
    Ming, Y
    Jie, L
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 206 - 210
  • [49] An Intrusion Detection Method for CBTC Systems Using Blockchain and LSTM
    Li, Qichang
    Zhao, Junyi
    2023 3RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND COMPUTER SCIENCE, ACCTCS, 2023, : 609 - 612
  • [50] Challenge-based collaborative intrusion detection in software-defined networking: an evaluation
    Li, Wenjuan
    Wang, Yu
    Jin, Zhiping
    Yu, Keping
    Li, Jin
    Xiang, Yang
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (02) : 257 - 263