2022
DOI: 10.32604/csse.2022.017941
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges

Abstract: Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 63 publications
0
5
0
Order By: Relevance
“…DBIDS relies on the use of blockchain technology to create a decentralized and tamper‐proof ledger of all network activity, and this allows the system to maintain a complete and accurate record of all network traffic, including any unauthorized access or intrusion attempts. One of the key benefits of a DBIDS is that it can detect and respond to intrusions much faster than traditional centralized IDS because the system is designed to operate in real time and can quickly identify and respond to potential threats before they can cause damage or disruption to the network [14]. Additionally, it can provide a more robust and reliable security solution than traditional centralized systems because the distributed nature of the system means that there is no single point of failure and any attempts to compromise the network would require a coordinated attack on multiple nodes simultaneously.…”
Section: Proposed Research Methodologymentioning
confidence: 99%
“…DBIDS relies on the use of blockchain technology to create a decentralized and tamper‐proof ledger of all network activity, and this allows the system to maintain a complete and accurate record of all network traffic, including any unauthorized access or intrusion attempts. One of the key benefits of a DBIDS is that it can detect and respond to intrusions much faster than traditional centralized IDS because the system is designed to operate in real time and can quickly identify and respond to potential threats before they can cause damage or disruption to the network [14]. Additionally, it can provide a more robust and reliable security solution than traditional centralized systems because the distributed nature of the system means that there is no single point of failure and any attempts to compromise the network would require a coordinated attack on multiple nodes simultaneously.…”
Section: Proposed Research Methodologymentioning
confidence: 99%
“…Trung T. Nguyen et al utilized robot clusters to form a decentralized peer-topeer network and used blockchain technology to execute different transactions in their study, demonstrating that the performance of decision-making outperforms classical methods [27]. Anbar et al analyze the security of intrusion detection systems based on blockchain and made a conclusion about the background of integration of blockchain technology and intrusion detection along with future directions and trending topics in intrusion detection based on blockchain technology [28]. Baothman et al built an imperial example for a blockchain electronic voting (e-voting) application using digital identity management for fulfilling immutable, transparent, and secure distributed blockchain features which proves that it is time-saving and easy to use [29].…”
Section: Behavior Control and Optimization Of Robot Swarm Viamentioning
confidence: 99%
“…Related works Blockchain-based communication within a robot swarm [1,4,18,19] Secure information sharing through a blockchain network [20][21][22][23] Behavior control and optimization of robot swarm via blockchain technology [24][25][26][27][28][29] as increasing timestamp and message format Jason conversion. After the pretreatment is completed, the encryption module will call the message-converted message to the second encryption and the ciphertext is sent by the UDP client to the server underthe specified port.…”
Section: Focusmentioning
confidence: 99%
“…The host and network intrusion detection systems with blockchain technology in a detailed manner (Driss et al, 2022). The authors forecasted the usage of blockchain architecture in detecting the malicious nodes in huge CIDS networks and different categories of algorithms used in blockchain have been detailed and studied by Salam Al‐E'mari et al (2022). Decentralized blockchain network solved the cybersecurity issues through its transparency feature, traceability, efficiency, keyless signature infrastructure, and secure data storage.…”
Section: Related Workmentioning
confidence: 99%