A Decentralized and Self-Adaptive Intrusion Detection Approach Using Continuous Learning and Blockchain Technology
DOI:
https://doi.org/10.47852/bonviewJDSIS42023803Keywords:
blockchain technology, continuous learning, deep learning, intrusion detection system, neural networksAbstract
The landscape of cyber threats is constantly in flux, which can cause traditional intrusion detection systems (IDS) to fall behind the rapid evolution of attacks. This can result in delayed detection and devastating consequences. The proposed system leverages continuous learning and self-adaptive neural networks to transcend the limitations of traditional IDS. It takes a proactive approach by continuously analyzing intrusion logs, using a Long Short-Term Memory (LSTM) core to identify emerging patterns and refine its understanding of threats in real time. This eliminates the static limitations of traditional models and encourages continuous improvement. The system's neural network is distributed across each block of the blockchain, creating a decentralized 'brain' that develops defenses against advanced adversaries. Secure enclaves are located within Trusted Execution Environments (TEEs), ensuring tamper-proof operation and reliable threat detection. The system's superior performance is demonstrated through rigorous evaluations of established datasets, such as NSL-KDD. The model demonstrates a high level of accuracy of 0.9994 with a minimal false positive rate of 0.06, indicating its ability to differentiate between legitimate network activity and malicious intrusions. Embracing continuous learning and a decentralized architecture creates a dynamic and resilient system that proactively adapts to the ever-changing threat landscape. This approach has several advantages over traditional solutions, including enhanced precision, increased security, and real-time adaptability.
Received: 9 July 2024 | Revised: 4 September 2024 | Accepted: 10 October 2024
Conflicts of Interest
The authors declare that they have no conflicts of interest to this work.
Data Availability Statement
Data available on request from the corresponding author upon reasonable request.
Author Contribution Statement
Ahmed Abubakar Aliyu: Conceptualization, Methodology, Investigation, Data curation, Writing - original draft, Project administration. Jinshuo Liu: Validation, Resources, Visualization, Supervision, Funding acquisition. Ezekia Gilliard: Software, Formal analysis, Writing - review & editing.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Authors
This work is licensed under a Creative Commons Attribution 4.0 International License.