Optimization Scheme of Collaborative Intrusion Detection System Based on Blockchain Technology
Abstract
:1. Introduction
- A Blockchain-Based Collaborative Intrusion Detection System (BCIDF): We introduce a hierarchical and distributed CIDS architecture, where nodes are logically allocated to different secondary regions based on geographical and functional criteria. A mapping set of leader nodes is established in the core primary region to facilitate data synchronization and sharing across sub-regions.
- An Alternating Random Assignment Selection Mechanism: We propose a mechanism that includes a Random Assignment Strategy and a periodic inspection function to select leader nodes in secondary regions. Nodes with higher importance are given favorable configurations to be elected as leaders in the next cycle, reducing the risk of single-point failures and improving alert-sharing efficiency.
- A Weighted Random Forest (WRF) Algorithm: Unlike other approaches, we improve forest prediction ability by introducing purity scores to measure node confidence. This algorithm adjusts the weight of individual decision trees based on their performance during training and validation, enhancing detection rates.
2. Background and Related Work
2.1. Background
2.1.1. Collaborative Intrusion Detection Systems (CIDSs)
- Multiple independent IDS nodes that collaborate to achieve a common goal [12].
2.1.2. Random Forest
2.2. Related Work
2.2.1. Boosting CIDS Performance via Blockchain
2.2.2. Application of Intrusion Detection Systems in the Internet of Things (IoT)
3. Blockchain-Based Collaborative Intrusion Detection System Framework
3.1. System Model
- System Manager (SM): Responsible for initiating and configuring the entire BCIDF system. Sets up the initial framework, divides the system into distinct functional areas, and ensures the system operates in a secure and stable environment.
- Regional Service Providers (RSPs): Receive potential intrusion data from Normal Nodes and verify these data. Convert verified data into alerts and upload them to the InterPlanetary File System (IPFS) for cross-validation by other RSPs. Act as full nodes on the blockchain, providing collaborative intrusion detection services to NNs.
- Normal Nodes (NNs): Collect and forward detection information to the appropriate RSPs. Serve as light nodes on the blockchain, utilizing the collaborative intrusion detection services provided by RSPs. May become regional leader nodes through a selection mechanism.
- Sub-Region Partitioning: We adjust security configurations according to the specific threat landscape of each region, enabling better resource management and load balancing within localized areas.
- Selection of Regional Security Providers: The System Manager employs an Alternating Random Assignment Selection Mechanism (ARASM) to select RSPs from each sub-region. These selected nodes not only act as leaders within their respective sub-regions but also serve as full nodes in the main region.
- Alarm Verification: Regular nodes gather and forward various detection reports. Upon identifying potential attack indicators, these nodes broadcast requests for collaborative detection to the RSPs within their region, disseminating suspicious activity information to relevant nodes for further scrutiny. Each regular node independently matches this information against its internal database of attack signatures and integrates the feedback from other nodes to generate alarms that assist the RSP in making accurate judgments and decisions.
- Alarm upload: RSPs will upload these alarms to the InterPlanetary File System (IPFS), and the RSP in the main area will download and analyze the alarm data. Through blockchain consensus, the decision results verified by different RSPs are recorded in the blockchain ledger using unique identifiers.
Sub-Region Partitioning
3.2. Selection of Sub-Regional Leader Nodes
3.2.1. A Random Assignment Strategy
3.2.2. A Periodic Inspection Function
3.3. Alert Verification in BCIDF
3.3.1. Confidence Calculation
Algorithm 1: Generation of Weighted Random Forest. |
3.3.2. Prediction
Algorithm 2: Testing of Weighted Random Forest. |
4. Experiments and Analysis
4.1. Experimental Setup
4.2. Implementation Details
4.2.1. Experimental Datasets
- Denial of Service: This attack aims to disrupt the normal traffic of a targeted system by overwhelming it with an excessive volume of requests that the system cannot handle. The intention is to exhaust the resources or bandwidth of the target network or service, thereby preventing legitimate users from accessing it. For instance, during a major sales event, an online retailer might be subjected to an overwhelming number of order requests that its network infrastructure cannot support, leading to a situation where paying customers are unable to complete their purchases. DoS attacks represent the most frequent type of attack in this dataset.
- Probing: Also referred to as reconnaissance, these attacks involve gathering information about a target network or system without actively compromising it. The attacker’s objective is to stealthily collect valuable data, such as personal details of customers or financial information, which could later facilitate more invasive attacks. Probes are a critical first step in many sophisticated cyber campaigns, allowing attackers to identify potential vulnerabilities and defenses within the target environment.
- User-to-Root Privilege Escalation: U2R attacks start from a compromised user account and attempt to escalate privileges to achieve root or administrative access over the system or network. By exploiting vulnerabilities within the operating system or applications, attackers can gain unauthorized control, enabling them to perform actions that are typically restricted to system administrators. This type of attack poses a significant threat because it can lead to full compromise of the affected systems.
- Remote-to-Local Access: An R2L attack seeks to obtain local access to a machine from a remote location. In this scenario, the attacker does not have initial local access to the target system but attempts to breach the network perimeter and establish a foothold inside the network. This often involves exploiting software vulnerabilities or misconfigurations that allow external entities to execute commands on the target machine. Once inside, the attacker may further explore the network to expand their control.
4.2.2. Evaluation Parameters
- True Positives (TPs): These are instances where the classifier correctly identifies an attack (anomaly) as such.
- False Negatives (FNs): These occur when the classifier incorrectly labels an actual attack as normal behavior, failing to detect the anomaly.
- True Negatives (TNs): These are cases where the classifier accurately identifies normal behavior as not being an attack.
- False Positives (FPs): These arise when the classifier incorrectly flags normal behavior as an attack.
4.3. Comparative Analysis in Tree-Based Models
- Extra-Trees (ET): The extreme random tree algorithm proposed by Pierre Geurts et al. further enhances randomness. In the process of node splitting, not only is the selection of features random, but the cutting points are also completely randomly determined without relying on output values. This method can generate a completely randomized tree with a structure independent of the output values of the training samples. In this study, three parameters are crucial, with the parameter max features representing the maximum number of features considered when constructing the optimal Extra-Trees model. The second parameter of the Extra-Trees method is the required number of samples (Min Samples Leaf) for segmenting nodes. The larger the value of Min Samples Leaf, the smaller the tree, the greater the deviation, and the smaller the variance. Therefore, its optimal value generally depends on the level of output noise in the dataset. The parameter number of trees represents the number of trees in the collection, and specific parameter settings can be obtained from the literature [33].
- Optimizing tree (OT): In this study, researchers used a genetic algorithm to optimize the RF model, and we configured the following special parameters when using this algorithm: Iteration times: We set the termination condition of the genetic algorithm to 100 generations. This setting ensures that the population has sufficient iterations to fully evolve towards convergence, avoiding premature convergence due to insufficient generations. Population size: 20. This size strikes a balance between maintaining population diversity and controlling computational complexity, helping to prevent early convergence to local optima. Selection mechanism: We adopt the roulette wheel selection method, which assigns selection probabilities proportional to individual fitness to ensure the effective transmission of excellent genes to the next generation. Mutation rate: 0.1. An appropriate mutation rate can maintain population diversity while preventing the rapid loss of beneficial genes that may occur when the mutation rate is too low, thereby ensuring a stable and effective search process. The configuration of relevant parameters can refer to the literature [35,37].
4.4. Spend Time Comparison Test
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Yost, J.R. The march of ides: Early history of intrusion-detection expert systems. IEEE Ann. Hist. Comput. 2015, 38, 42–54. [Google Scholar]
- Kemmerer, R.A.; Vigna, G. Intrusion detection: A brief history and overview. Computer 2002, 35, 27–30. [Google Scholar] [CrossRef]
- Garcia-Teodoro, P.; Diaz-Verdejo, J.; Maciá-Fernández, G.; Vázquez, E. Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur. 2009, 28, 18–28. [Google Scholar] [CrossRef]
- Alserhani, F. Hasbullah I. Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges. Appl. Artif. Intell. 2024, 38, 2381882. [Google Scholar] [CrossRef]
- Alserhani, F.; Adele, G.; Borah, A.; Paranjothi, A.; Khan, M.S.; Poulkov, V.K. A Comprehensive Systematic Review of Blockchain-based Intrusion Detection Systems. In Proceedings of the 2024 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 29–31 May 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 605–611. [Google Scholar] [CrossRef]
- Gurung, G.; Bendiab, G.; Shiaele, M.; Shiaeles, S. Cids: Collaborative intrusion detection system using blockchain technology. In Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Virtual, 27–29 July 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 125–130. [Google Scholar]
- Li, W.; Tug, S.; Meng, W.; Wang, Y. Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gener. Comput. Syst. 2019, 96, 481–489. [Google Scholar] [CrossRef]
- Laufenberg, D.; Li, L.; Shahriar, H.; Han, M. An architecture for blockchain-enabled collaborative signature-based intrusion detection system. In Proceedings of the 20th Annual SIG Conference on Information Technology Education, Tacoma, WA, USA, 3–5 October 2019; p. 169. [Google Scholar]
- Ujjan, R.M.A.; Pervez, Z.; Dahal, K. Snort based collaborative intrusion detection system using blockchain in SDN. In Proceedings of the 2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), Island of Ulkulhas, Maldives, 26–28 August 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–8. [Google Scholar]
- Xuan, C.D.; Nguyen, T.T. A novel approach for APT attack detection based on an advanced computing. Sci. Rep. 2024, 14, 22223. [Google Scholar] [CrossRef]
- Wu, Y.S.; Foo, B.; Mei, Y.; Bagchi, S. Collaborative intrusion detection system (CIDS): A framework for accurate and efficient IDS. In Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, NV, USA, 8–12 December 2003; Proceedings. IEEE: Piscataway, NJ, USA, 2003; pp. 234–244. [Google Scholar]
- Liao, H.J.; Lin, C.H.R.; Lin, Y.C.; Tung, K.Y. Intrusion detection system: A comprehensive review. J. Netw. Comput. Appl. 2013, 36, 16–24. [Google Scholar] [CrossRef]
- Ahmed, M.; Mahmood, A.N.; Hu, J. A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 2016, 60, 19–31. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, 25–30 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 557–564. [Google Scholar]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar] [CrossRef]
- Al-E’mari, S.; Anbar, M.; Sanjalawe, Y.; Manickam, S.; Hasbullah, I. Intrusion detection systems using blockchain technology: A review, issues and challenges. Comput. Syst. Sci. Eng. 2022, 40, 87–112. [Google Scholar] [CrossRef]
- Alexopoulos, N.; Vasilomanolakis, E.; Ivánkó, N.R.; Mühlhäuser, M. Towards blockchain-based collaborative intrusion detection systems. In Proceedings of the Critical Information Infrastructures Security: 12th International Conference, CRITIS 2017, Lucca, Italy, 8–13 October 2017; Revised Selected Papers 12. Springer: Berlin/Heidelberg, Germany, 2018; pp. 107–118. [Google Scholar]
- Meng, W.; Tischhauser, E.W.; Wang, Q.; Wang, Y.; Han, J. When intrusion detection meets blockchain technology: A review. IEEE Access 2018, 6, 10179–10188. [Google Scholar] [CrossRef]
- Hızal, S.; Akhter, A.S.; Çavuşoğlu, Ü.; Akgün, D. Blockchain-based IoT security solutions for IDS research centers. Internet Things 2024, 27, 101307. [Google Scholar] [CrossRef]
- Jiang, D.; Wang, Z.; Wang, Y.; Tan, L.; Wang, J.; Zhang, P. A Blockchain-Reinforced Federated Intrusion Detection Architecture for IIoT. IEEE Internet Things J. 2024, 11, 26793–26805. [Google Scholar] [CrossRef]
- Hu, B.; Zhou, C.; Tian, Y.C.; Qin, Y.; Junping, X. A collaborative intrusion detection approach using blockchain for multimicrogrid systems. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1720–1730. [Google Scholar] [CrossRef]
- Liang, H.; Wu, J.; Mumtaz, S.; Li, J.; Lin, X.; Wen, M. MBID: Micro-blockchain-based geographical dynamic intrusion detection for V2X. IEEE Commun. Mag. 2019, 57, 77–83. [Google Scholar] [CrossRef]
- Mirzaee, P.H.; Shojafar, M.; Bagheri, H.; Chan, T.H.; Cruickshank, H.; Tafazolli, R. A two-layer collaborative vehicle-edge intrusion detection system for vehicular communications. In Proceedings of the 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall), Virtual, 27 September–28 October 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–6. [Google Scholar]
- He, X.; Chen, Q.; Tang, L.; Wang, W.; Liu, T. Cgan-based collaborative intrusion detection for uav networks: A blockchain-empowered distributed federated learning approach. IEEE Internet Things J. 2022, 10, 120–132. [Google Scholar] [CrossRef]
- Alkhpor, H.K.; Alserhani, F.M. Collaborative Federated Learning-Based Model for Alert Correlation and Attack Scenario Recognition. Electronics 2023, 12, 4509. [Google Scholar] [CrossRef]
- Zohourian, A.; Dadkhah, S.; Molyneaux, H.; Neto, E.C.P.; Ghorbani, A.A. IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks. Comput. Secur. 2024, 146, 104034. [Google Scholar] [CrossRef]
- Kalaria, R.; Kayes, A.; Rahayu, W.; Pardede, E.; Salehi, S.A. IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks. Comput. Secur. 2024, 146, 104037. [Google Scholar] [CrossRef]
- Malathi, S.; Begum, S.R. Enhancing trustworthiness among iot network nodes with ensemble deep learning-based cyber attack detection. Expert Syst. Appl. 2024, 255, 124528. [Google Scholar] [CrossRef]
- Salim, M.M.; Camacho, D.; Park, J.H. Digital Twin and federated learning enabled cyberthreat detection system for IoT networks. Future Gener. Comput. Syst. 2024, 161, 701–713. [Google Scholar] [CrossRef]
- da Silva Ruffo, V.G.; Lent, D.M.B.; Komarchesqui, M.; Schiavon, V.F.; de Assis, M.V.O.; Carvalho, L.F.; Proença, M.L., Jr. Anomaly and intrusion detection using deep learning for software-defined networks: A survey. Expert Syst. Appl. 2024, 256, 124982. [Google Scholar] [CrossRef]
- Alserhani, F. Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments. Appl. Artif. Intell. 2024, 38, 2381882. [Google Scholar] [CrossRef]
- Breiman, L. Random forests. Mach. Learn. 2001, 45, 5–32. [Google Scholar] [CrossRef]
- Geurts, P.; Ernst, D.; Wehenkel, L. Extremely randomized trees. Mach. Learn. 2006, 63, 3–42. [Google Scholar] [CrossRef]
- Ren, S.; Cao, X.; Wei, Y.; Sun, J. Global refinement of random forest. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA, 7–12 June 2015; pp. 723–730. [Google Scholar]
- Rahman, M.; Kamal, N.; Abdullah, N.F. EDT-STACK: A stacking ensemble-based decision trees algorithm for tire tread depth condition classification. Results Eng. 2024, 22, 102218. [Google Scholar] [CrossRef]
- Chen, M.; Liu, Z. Predicting performance of students by optimizing tree components of random forest using genetic algorithm. Heliyon 2024, 10, e32570. [Google Scholar] [CrossRef]
- Norouzi, M.; Gürkaş-Aydın, Z.; Turna, Ö.C.; Yağci, M.Y.; Aydin, M.A.; Souri, A. A Hybrid Genetic Algorithm-Based Random Forest Model for Intrusion Detection Approach in Internet of Medical Things. Appl. Sci. 2023, 13, 11145. [Google Scholar] [CrossRef]
Schemes | Algorithm | Blockchain | Reliable Data Sharing | Collaborative IDS |
---|---|---|---|---|
Hızal et al. [19] | ML | ✓ | ✕ | ✓ |
Jiang et al. [20] | FL | ✓ | ✓ | ✕ |
Salim et al. [29] | FL | ✕ | ✓ | ✕ |
Ruffo et al. [30] | DL | ✕ | ✕ | ✕ |
Alserhani et al. [31] | DL | ✕ | ✓ | ✕ |
Proposed system | WRF | ✓ | ✓ | ✓ |
Parameter | Type | |
---|---|---|
Node parameters | term | int 64 |
leaderId | string | |
prevlogIndex | int 64 | |
prevlogTerm | int 64 | |
leaderCommit | int 64 | |
timerPeriod | time.Duration | |
priority | int 64 | |
confClock | int 64 | |
Reply messages parameters | term | int 64 |
success | bool | |
logindex | int 64 | |
timerPeriod | time.Duration |
Parameter | Value |
---|---|
Max Tree Depth | 10 |
Number of Trees | 100 |
Max Features | sqrt |
Min Samples Leaf | 5 |
Criterion | Gini, Entrop |
Predictor categories | normal (0), anomaly (1) |
Algorithm | Accuracy | FPR | F1-Score | Precision |
---|---|---|---|---|
RRF | 64.5 | 18.4 | 82.3 | 79.8 |
ET | 73.8 | 19.2 | 80.2 | 82.5 |
RF | 74.1 | 20.1 | 81.4 | 84.3 |
BCIDF | 78.4 | 17.3 | 83.5 | 86.8 |
EDT | 75.6 | 17.6 | 81.5 | 79.9 |
OT | 73.2 | 18.3 | 80.2 | 80.1 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Huang, J.; Chen, Y.; Wang, X.; Ouyang, Z.; Du, N. Optimization Scheme of Collaborative Intrusion Detection System Based on Blockchain Technology. Electronics 2025, 14, 261. https://doi.org/10.3390/electronics14020261
Huang J, Chen Y, Wang X, Ouyang Z, Du N. Optimization Scheme of Collaborative Intrusion Detection System Based on Blockchain Technology. Electronics. 2025; 14(2):261. https://doi.org/10.3390/electronics14020261
Chicago/Turabian StyleHuang, Jiachen, Yuling Chen, Xuewei Wang, Zhi Ouyang, and Nisuo Du. 2025. "Optimization Scheme of Collaborative Intrusion Detection System Based on Blockchain Technology" Electronics 14, no. 2: 261. https://doi.org/10.3390/electronics14020261
APA StyleHuang, J., Chen, Y., Wang, X., Ouyang, Z., & Du, N. (2025). Optimization Scheme of Collaborative Intrusion Detection System Based on Blockchain Technology. Electronics, 14(2), 261. https://doi.org/10.3390/electronics14020261