Blockchain and Machine Learning-Based Hybrid IDS to Protect Smart Networks and Preserve Privacy

被引:9
作者
Mishra, Shailendra [1 ]
机构
[1] Majmaah Univ, Coll Comp & Informat Sci, Dept Comp Engn, Al Majmaah 11952, Saudi Arabia
关键词
cyber security; machine learning; blockchain; machine intelligence; smart network; ARTIFICIAL-INTELLIGENCE; SYSTEMS;
D O I
10.3390/electronics12163524
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cyberspace is a convenient platform for creative, intellectual, and accessible works that provide a medium for expression and communication. Malware, phishing, ransomware, and distributed denial-of-service attacks pose a threat to individuals and organisations. To detect and predict cyber threats effectively and accurately, an intelligent system must be developed. Cybercriminals can exploit Internet of Things devices and endpoints because they are not intelligent and have limited resources. A hybrid decision tree method (HIDT) is proposed in this article that integrates machine learning with blockchain concepts for anomaly detection. In all datasets, the proposed system (HIDT) predicts attacks in the shortest amount of time and has the highest attack detection accuracy (99.95% for the KD99 dataset and 99.72% for the UNBS-NB 15 dataset). To ensure validity, the binary classification test results are compared to those of earlier studies. The HIDT's confusion matrix contrasts with previous models by having low FP/FN rates and high TP/TN rates. By detecting malicious nodes instantly, the proposed system reduces routing overhead and has a lower end-to-end delay. Malicious nodes are detected instantly in the network within a short period. Increasing the number of nodes leads to a higher throughput, with the highest throughput measured at 50 nodes. The proposed system performed well in terms of the packet delivery ratio, end-to-end delay, robustness, and scalability, demonstrating the effectiveness of the proposed system. Data can be protected from malicious threats with this system, which can be used by governments and businesses to improve security and resilience.
引用
收藏
页数:23
相关论文
共 35 条
  • [1] Energetics Systems and artificial intelligence: Applications of industry 4.0
    Ahmad, Tanveer
    Zhu, Hongyu
    Zhang, Dongdong
    Tariq, Rasikh
    Bassam, A.
    Ullah, Fasee
    AlGhamdi, Ahmed S.
    Alshamrani, Sultan S.
    [J]. ENERGY REPORTS, 2022, 8 : 334 - 361
  • [2] Blockchain-based multi-factor authentication: A systematic literature review
    Almadani, Mwaheb S.
    Alotaibi, Suhair
    Alsobhi, Hada
    Hussain, Omar K.
    Hussain, Farookh Khadeer
    [J]. INTERNET OF THINGS, 2023, 23
  • [3] 6G Mobile Communication Technology: Requirements, Targets, Applications, Challenges, Advantages, and Opportunities
    Banafaa, Mohammed
    Shayea, Ibraheem
    Din, Jafri
    Azmi, Marwan Hadri
    Alashbi, Abdulaziz
    Daradkeh, Yousef Ibrahim
    Alhammadi, Abdulraqeb
    [J]. ALEXANDRIA ENGINEERING JOURNAL, 2023, 64 : 245 - 274
  • [4] Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey
    Bellini, Emanuele
    Iraqi, Youssef
    Damiani, Ernesto
    [J]. IEEE ACCESS, 2020, 8 (08): : 21127 - 21151
  • [5] Privacy-preserving aware data aggregation for IoT-based healthcare with green computing technologies
    Ben Othman, Soufiene
    Almalki, Faris A.
    Chakraborty, Chinmay
    Sakli, Hedi
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 101
  • [6] Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks
    Dawadi, Babu R.
    Adhikari, Bibek
    Srivastava, Devesh K.
    [J]. SENSORS, 2023, 23 (04)
  • [7] Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security
    Derhab, Abdelouahid
    Guerroumi, Mohamed
    Gumaei, Abdu
    Maglaras, Leandros
    Ferrag, Mohamed Amine
    Mukherjee, Mithun
    Khan, Farrukh Aslam
    [J]. SENSORS, 2019, 19 (14)
  • [8] DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks
    Dong, Shi
    Sarem, Mudar
    [J]. IEEE ACCESS, 2020, 8 : 5039 - 5048
  • [9] Metaverse beyond the hype: Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy
    Dwivedi, Yogesh K.
    Hughes, Laurie
    Baabdullah, Abdullah M.
    Ribeiro-Navarrete, Samuel
    Giannakis, Mihalis
    Al-Debei, Mutaz M.
    Dennehy, Denis
    Metri, Bhimaraya
    Buhalis, Dimitrios
    Cheung, Christy M. K.
    Conboy, Kieran
    Doyle, Ronan
    Dubey, Rameshwar
    Dutot, Vincent
    Felix, Reto
    Goyal, D. P.
    Gustafsson, Anders
    Hinsch, Chris
    Jebabli, Ikram
    Janssen, Marijn
    Kim, Young-Gab
    Kim, Jooyoung
    Koos, Stefan
    Kreps, David
    Kshetri, Nir
    Kumar, Vikram
    Ooi, Keng-Boon
    Papagiannidis, Savvas
    Pappas, Ilias O.
    Polyviou, Ariana
    Park, Sang-Min
    Pandey, Neeraj
    Queiroz, Maciel M.
    Raman, Ramakrishnan
    Rauschnabel, Philipp A.
    Shirish, Anuragini
    Sigala, Marianna
    Spanaki, Konstantina
    Tan, Garry Wei-Han
    Tiwari, Manoj Kumar
    Viglia, Giampaolo
    Wamba, Samuel Fosso
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2022, 66
  • [10] Blockchain and Artificial Intelligence as Enablers of Cyber Security in the Era of IoT and IIoT Applications
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Benbouzid, Mohamed
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (03)