Block Hunter: Federated Learning for Cyber Threat Hunting in
Blockchain-based IIoT Networks
- URL: http://arxiv.org/abs/2204.09829v1
- Date: Thu, 21 Apr 2022 00:45:30 GMT
- Title: Block Hunter: Federated Learning for Cyber Threat Hunting in
Blockchain-based IIoT Networks
- Authors: Abbas Yazdinejad (Cyber Science Lab, School of Computer science,
University of Guelph, ON, Canada), Ali Dehghantanha (Cyber Science Lab,
School of Computer science, University of Guelph, ON, Canada), Reza M. Parizi
(College of Computing and Software Engineering, Kennesaw State University,
GA, USA), Mohammad Hammoudeh (Information & Computer Science Department, King
Fahd University of Petroleum & Minerals, Saudi Arabia), Hadis Karimipour
(School of Engineering, Department of Electrical and Software Engineering at
the University of Calgary, Alberta, Canada) and Gautam Srivastava (Department
of Math and Computer Science, Brandon University, Manitoba, Canada as well as
with the Research Centre for Interneural Computing, China Medical University,
Taichung)
- Abstract summary: We use Federated Learning (FL) to build a threat hunting framework called Block Hunter to automatically hunt for attacks in IIoT networks.
Our results prove the efficiency of the Block Hunter in detecting anomalous activities with high accuracy and minimum required bandwidth.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Nowadays, blockchain-based technologies are being developed in various
industries to improve data security. In the context of the Industrial Internet
of Things (IIoT), a chain-based network is one of the most notable applications
of blockchain technology. IIoT devices have become increasingly prevalent in
our digital world, especially in support of developing smart factories.
Although blockchain is a powerful tool, it is vulnerable to cyber attacks.
Detecting anomalies in blockchain-based IIoT networks in smart factories is
crucial in protecting networks and systems from unexpected attacks. In this
paper, we use Federated Learning (FL) to build a threat hunting framework
called Block Hunter to automatically hunt for attacks in blockchain-based IIoT
networks. Block Hunter utilizes a cluster-based architecture for anomaly
detection combined with several machine learning models in a federated
environment. To the best of our knowledge, Block Hunter is the first federated
threat hunting model in IIoT networks that identifies anomalous behavior while
preserving privacy. Our results prove the efficiency of the Block Hunter in
detecting anomalous activities with high accuracy and minimum required
bandwidth.
Related papers
- BlockFound: Customized blockchain foundation model for anomaly detection [47.04595143348698]
BlockFound is a customized foundation model for anomaly blockchain transaction detection.
We introduce a series of customized designs to model the unique data structure of blockchain transactions.
BlockFound is the only method that successfully detects anomalous transactions on Solana with high accuracy.
arXiv Detail & Related papers (2024-10-05T05:11:34Z) - Real-time Cyberattack Detection with Collaborative Learning for Blockchain Networks [29.481124078876032]
We propose an efficient collaborative cyberattack detection model to protect blockchain networks.
Our proposed detection model can detect attacks in the blockchain network with an accuracy of up to 97%.
arXiv Detail & Related papers (2024-07-04T15:39:49Z) - A Novel Classification of Attacks on Blockchain Layers: Vulnerabilities, Attacks, Mitigations, and Research Directions [0.8540657305162735]
This survey proposes a novel classification of blockchain attacks and an in-depth investigation of blockchain data security.
We reveal the deep dynamics of these security concerns by closely investigating the fundamental causes of attacks at various blockchain tiers.
We also discuss the implications of quantum computing in blockchain and the weaknesses in the current technology that can be exploited in the future.
arXiv Detail & Related papers (2024-04-28T06:40:50Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Graph Attention Network-based Block Propagation with Optimal AoI and Reputation in Web 3.0 [59.94605620983965]
We design a Graph Attention Network (GAT)-based reliable block propagation optimization framework for blockchain-enabled Web 3.0.
To achieve the reliability of block propagation, we introduce a reputation mechanism based on the subjective logic model.
Considering that the GAT possesses the excellent ability to process graph-structured data, we utilize the GAT with reinforcement learning to obtain the optimal block propagation trajectory.
arXiv Detail & Related papers (2024-03-20T01:58:38Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - Architectural Design for Secure Smart Contract Development [0.0]
Several attacks on blockchain infrastructures have resulted in hundreds of millions of dollars lost and sensitive information compromised.
I identify common software vulnerabilities and attacks on blockchain infrastructures.
I propose a model for ensuring a stronger security standard for future systems leveraging smart contracts.
arXiv Detail & Related papers (2024-01-03T18:59:17Z) - SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems [43.80265187232706]
Cross-chain bridges are used to facilitate token and data exchanges across blockchains.
Although bridges are becoming increasingly popular, they are still in their infancy and have been attacked multiple times recently.
This paper analyzes the security landscape of cross-chain bridges in a holistic manner.
arXiv Detail & Related papers (2023-12-19T20:13:21Z) - Tikuna: An Ethereum Blockchain Network Security Monitoring System [0.0]
This paper focuses on protecting the lowest level layer in the blockchain, particularly the P2P network that allows the nodes to communicate and share information.
The P2P network layer may be vulnerable to several families of attacks, such as Distributed Denial of Service (DDoS), eclipse attacks, or Sybil attacks.
We introduce Tikuna, an open-source tool for monitoring and detecting potential attacks on the blockchain P2P network, at an early stage.
arXiv Detail & Related papers (2023-10-13T15:39:50Z) - Collaborative Learning for Cyberattack Detection in Blockchain Networks [29.481124078876032]
This article aims to study intrusion attacks and then develop a novel cyberattack detection framework to detect cyberattacks at the network layer of a blockchain network.
We propose a novel collaborative learning model that allows efficient deployment in the blockchain network to detect attacks.
Both intensive simulations and real-time experiments clearly show that our proposed intrusion detection framework can achieve an accuracy of up to 98.6% in detecting attacks.
arXiv Detail & Related papers (2022-03-21T15:55:41Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.