An AI-Enabled Blockchain Algorithm: A Novel Approach to Counteract Blockchain Network Security Attacks

Authors

  • Anand Singh Rajawat Sandip University
  • S B Goyal City University
  • Manoj Kumar University of Wollongong in Dubai image/svg+xml
  • Thipendra P Singh Bennett University image/svg+xml

DOI:

https://doi.org/10.4108/eetiot.5484

Keywords:

Blockchain, Deep Learning, AI, Security, Advanced Threats, Neural Networks, Cybersecurity

Abstract

INTRODUCTION: In this research, we present a novel method for strengthening the security of blockchain networks through the use of AI-driven technology. Blockchain has emerged as a game-changing technology across industries, but its security flaws, particularly in relation to Sybil and Distributed Denial of Service (DDoS) attacks, are a major cause for worry. To defend the blockchain from these sophisticated attacks, our research centres on creating a strong security solution that combines networks of Long Short-Term Memory (LSTM) and Self-Organizing Maps (SOM).

OBJECTIVES: The main goal of this project is to create and test an AI-driven blockchain algorithm that enhances blockchain security by utilising LSTM and SOM networks. These are the objectives that the research hopes to achieve: In order to assess the shortcomings and weaknesses of existing blockchain security mechanisms. The goal is to create a new approach that uses LSTM sequence learning and SOM pattern recognition to anticipate and stop security breaches. In order to see how well this integrated strategy works in a simulated blockchain setting against different types of security risks.

METHODS: The methods used in our study are based on social network analysis. A combination of support vector machines (SOM) for pattern recognition and long short-term memory (LSTM) networks for learning and event sequence prediction using historical data constitutes the methodology. The steps involved in conducting research are: The current state of blockchain security mechanisms is examined in detail. Creating a virtual blockchain and incorporating the SOM+LSTM algorithm.

Putting the algorithm through its paces in order to see how well it detects and defends against different security risks.

RESULTS: Significant enhancements to blockchain network security are the primary outcomes of this study. Important results consist of: Using the SOM+LSTM technique, we were able to increase the detection rates of possible security risks, such as Sybil and DDoS attacks. Enhanced reaction times when compared to conventional security techniques for attack prediction and prevention. Demonstrated ability of the algorithm to adapt and learn from new patterns of attacks, assuring long-term sustainability.

CONCLUSION: This paper's findings highlight the efficacy of enhancing blockchain security through the integration of artificial intelligence technologies such as LSTM and SOM networks. In addition to improving blockchain technology's detection and forecasting capabilities, the SOM+LSTM algorithm helps advance the platform toward greater security and reliability. This study provides a solid answer to the increasing worries about cyber dangers in the modern era and opens the door to more sophisticated AI uses in blockchain security.

Downloads

Download data is not yet available.
<br data-mce-bogus="1"> <br data-mce-bogus="1">

References

Kurri, V., Raja, V., Prakasam, P.: Cellular traffic prediction on blockchain-based mobile net- works using LSTM model in 4G LTE network. Peer-to-Peer Netw. Appl 14, 1088–1105 (2021) DOI: https://doi.org/10.1007/s12083-021-01085-7

Zhao, Z., Hao, Z., Wang, G., Mao, D., Zhang, B., Zuo, M., Yen, J., Tu, G.: Sentiment Anal- ysis of Review Data Using Blockchain and LSTM to Improve Regulation for a Sustainable Market. J. Theor. Appl. Electron. Commer. Res 17, 1–19 (2022) DOI: https://doi.org/10.3390/jtaer17010001

Kim, Y., Byun, Y.C.: Ultra-Short-Term Continuous Time Series Prediction of Blockchain- Based Cryptocurrency Using LSTM in the Big Data Era. Appl. Sci. 2022 12 (11080) DOI: https://doi.org/10.3390/app122111080

Li, L., Arab, A., Liu, J., Liu, J., Han, Z.: Bitcoin Options Pricing Using LSTM-Based Predic- tion Model and Blockchain Statistics. In: 2019 IEEE International Conference on Blockchain (Blockchain). pp. 67–74 (2019) DOI: https://doi.org/10.1109/Blockchain.2019.00018

Chien, I., Karthikeyan, P., Hsiung, P.A.: Peer to Peer Energy Transaction Market Prediction in Smart Grids using Blockchain and LSTM. In: 2023 IEEE International Conference on Consumer Electronics (ICCE). pp. 1–2 (2023) DOI: https://doi.org/10.1109/ICCE56470.2023.10043563

Li, Q., Zhao, J.: An Intrusion Detection Method for CBTC Systems Using Blockchain and LSTM. In: 2023 3rd Asia-Pacific Conference on Communications Technology and Computer Science (ACCTCS). pp. 609–612 (2023) DOI: https://doi.org/10.1109/ACCTCS58815.2023.00042

Boumaiza, A., Sanfilippo, A.: Blockchain-Enabled Energy Marketplace. In: 2023 XXIX International Conference on Information, Communication and Automation Technologies (ICAT). pp. 1–4 (2023) DOI: https://doi.org/10.1109/ICAT57854.2023.10171284

Boumaiza, A.: Solar Energy Profiles for a Blockchain-based Energy Market. In: 2022 25th International Conference on Mechatronics Technology (ICMT). pp. 1–5 DOI: https://doi.org/10.1109/ICMT56556.2022.9997618

Kumar, A., Das, D.: IntelligentChain: Blockchain and Machine Learning based Intelligent Security Application for Internet of Vehicles (IoV). In: 2022 IEEE 95th Vehicular Technol- ogy Conference: (VTC2022-Spring). pp. 1–5 DOI: https://doi.org/10.1109/VTC2022-Spring54318.2022.9860946

Wang, B., Zhu, X., He, Q., Gu, G.: The forecast on the customers of the member point platform built on the blockchain technology by ARIMA and LSTM. In: 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA). pp. 589– 593 (2018) DOI: https://doi.org/10.1109/ICCCBDA.2018.8386584

Liu, Z., Yin, X.: LSTM-CGAN: Towards Generating Low-Rate DDoS Adversarial Samples for Blockchain-Based Wireless Network Detection Models. IEEE Access 9, 22616–22625 (2021) DOI: https://doi.org/10.1109/ACCESS.2021.3056482

Zhou, Q., Ruan, Q., Huo, D., Lv, P., Wang, Y., Xu, Z.: The malicious resource consumption detection in permissioned blockchain based on traffic analysis. In: 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD). pp. 510–515 (2023) DOI: https://doi.org/10.1109/CSCWD57460.2023.10152585

Parab, L.J., Nitnaware, P.P.: Evaluation of Cryptocurrency coins with Machine Learning al- gorithms and Blockchain Technology. In: 2022 IEEE Region 10 Symposium (TENSYMP). pp. 1–5 DOI: https://doi.org/10.1109/TENSYMP54529.2022.9864430

Sekhar, P.C., Padmaja, M., Sarangi, B., Aditya: Prediction of Cryptocurrency using LSTM and XGBoost. In: 2022 IEEE International Conference on Blockchain and Distributed Sys- tems Security (ICBDS). pp. 1–5 (2022) DOI: https://doi.org/10.1109/ICBDS53701.2022.9935871

Chan, C.C., Kumar, V., Delaney, S., Gochoo, M.: Combating Deepfakes: Multi-LSTM and Blockchain as Proof of Authenticity for Digital Media. In: 2020 IEEE / ITU International Conference on Artificial Intelligence for Good (AI4G). pp. 55–62 (2020)

S, Y., P, S., Ks, S.: Blockchain based Roaming fraud prevention using LSTM model in 4G LTE Network. In: 2023 13th International Conference on Cloud Computing. pp. 222–229 (2023) DOI: https://doi.org/10.1109/Confluence56041.2023.10048873

Downloads

Published

20-03-2024

How to Cite

[1]
A. S. Rajawat, S. B. Goyal, M. Kumar, and T. P. Singh, “An AI-Enabled Blockchain Algorithm: A Novel Approach to Counteract Blockchain Network Security Attacks”, EAI Endorsed Trans IoT, vol. 10, Mar. 2024.