A Decentralized and Self-Adaptive Intrusion Detection Approach Using Continuous Learning and Blockchain Technology

Authors

  • Ahmed Abubakar Aliyu School of Cyber Science and Engineering, Wuhan University, China and Department of Computer Science, Kaduna State University, Nigeria https://orcid.org/0000-0002-8742-6500
  • Jinshuo Liu School of Cyber Science and Engineering, Wuhan University, China
  • Ezekia Gilliard School of Cyber Science and Engineering, Wuhan University, China

DOI:

https://doi.org/10.47852/bonviewJDSIS42023803

Keywords:

blockchain technology, continuous learning, deep learning, intrusion detection system, neural networks

Abstract

The landscape of cyber threats is constantly in flux, which can cause traditional intrusion detection systems (IDS) to fall behind the rapid evolution of attacks. This can result in delayed detection and devastating consequences. The proposed system leverages continuous learning and self-adaptive neural networks to transcend the limitations of traditional IDS. It takes a proactive approach by continuously analyzing intrusion logs, using a Long Short-Term Memory (LSTM) core to identify emerging patterns and refine its understanding of threats in real time. This eliminates the static limitations of traditional models and encourages continuous improvement. The system's neural network is distributed across each block of the blockchain, creating a decentralized 'brain' that develops defenses against advanced adversaries. Secure enclaves are located within Trusted Execution Environments (TEEs), ensuring tamper-proof operation and reliable threat detection. The system's superior performance is demonstrated through rigorous evaluations of established datasets, such as NSL-KDD. The model demonstrates a high level of accuracy of 0.9994 with a minimal false positive rate of 0.06, indicating its ability to differentiate between legitimate network activity and malicious intrusions. Embracing continuous learning and a decentralized architecture creates a dynamic and resilient system that proactively adapts to the ever-changing threat landscape. This approach has several advantages over traditional solutions, including enhanced precision, increased security, and real-time adaptability.

 

Received: 9 July 2024 | Revised: 4 September 2024 | Accepted: 10 October 2024

 

Conflicts of Interest

The authors declare that they have no conflicts of interest to this work.

 

Data Availability Statement

Data available on request from the corresponding author upon reasonable request.

 

Author Contribution Statement

Ahmed Abubakar Aliyu: Conceptualization, Methodology, Investigation, Data curation, Writing - original draft, Project administration. Jinshuo Liu: Validation, Resources, Visualization, Supervision, Funding acquisition. Ezekia Gilliard: Software, Formal analysis, Writing - review & editing.


Downloads

Published

2024-10-15

Issue

Section

Research Articles

How to Cite

Aliyu, A. A., Liu, J., & Gilliard, E. (2024). A Decentralized and Self-Adaptive Intrusion Detection Approach Using Continuous Learning and Blockchain Technology. Journal of Data Science and Intelligent Systems. https://doi.org/10.47852/bonviewJDSIS42023803