Abstract
In recent years, Intrusion Detection Systems (IDS) monitor the computer network system by collecting and analyzing data or information by identifying the behavior of the user or predicting the attacks by the automatic response. So, in this paper, the Blockchain-based African Buffalo (BbAB) scheme with Recurrent Neural Network (RNN) model is proposed for detecting the intrusion by enhancing security. Furthermore, normal and malware user datasets are collected and trained in the system and the dataset is encrypted using Identity Based Encryption (IBE). The encrypted data are securely stored in the blockchain in the cloud. Hereafter, Recurrent Neural Network (RNN) was employed to detect the intrusion in a cloud environment. African buffalo optimization was used in the RNN prediction phase for continuous monitoring of intrusion. Finally, the performance results of the developed technique are compared with other conventional models in terms of accuracy, precision, recall, F1-score, and detection rate. The outperformance of the designed model attains better accuracy of 99.87% and high recall of 99.92%.it shows the efficiency of the designed model to protect data and security in cloud computing.
Similar content being viewed by others
References
Perwej Y et al (2019) The internet of things (IoT) and its application domains. Int J Comput Appl 182(49):36–49
Rath M, Pattanayak B (2018) Technological improvement in modern health care applications using Internet of Things (IoT) and proposal of novel health care approach. International Journal of Human Rights in Healthcare
Khoa TA et al (2020) Designing efficient smart home management with IoT smart lighting: a case study. Wireless Communications and Mobile Computing 2020
Al Makdi K, Sheldon FT, Hussein AA (2020) Trusted Security Model for IDS Using Deep Learning. 2020 3rd International Conference on Signal Processing and Information Security (ICSPIS). IEEE
Anthi E et al (2019) A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J 6(5):9042–9053
Nathiya T, Suseendran G (2019) An effective hybrid intrusion detection system for use in security monitoring in the virtual network layer of cloud computing technology. Data management, analytics and innovation. Springer, Singapore, pp. 483-497
Brown IL (2018) An appropriate technology system for emergent beekeepers: Field testing and development towards implementation. Diss. University of Johannesburg (South Africa)
Sharafaldin I et al (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. 2019 International Carnahan Conference on Security Technology (ICCST). IEEE
Jayasinghe U et al (2019) TrustChain: A privacy preserving blockchain with edge computing." Wireless Communications and Mobile Computing 2019
Borangiu T et al (2019) Digital transformation of manufacturing through cloud services and resource virtualization. Comput Ind 108:150–162
Alashhab ZR et al (2021) "Impact of coronavirus pandemic crisis on technologies and cloud computing applications." Journal of Electronic. Sci Technol 19(1):100059
Nguyen DC et al (2021) Federated learning meets blockchain in edge computing: Opportunities and challenges. IEEE Internet of Things Journal
Zhang K, Jacobsen H-A (2018) Towards Dependable, Scalable, and Pervasive Distributed Ledgers with Blockchains (Technical Report)
Velmurugadass P et al (2021) Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm. Materials Today: Proc 37:2653–2659
Datta P et al (2020) A secured smart national identity card management design using blockchain. 2020 2nd international conference on advanced information and communication technology (ICAICT). IEEE
Kumar R, Bhalaji N (2021) Blockchain based chameleon hashing technique for privacy preservation in E-governance system. Wirel Pers Commun 117(2):987–1006
Kerr M, Han F, van Schyndel R (2018) A blockchain implementation for the cataloguing of cctv video evidence. 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE
Das S, Namasudra S (2022) A Novel Hybrid Encryption Method to Secure Healthcare Data in IoT-enabled Healthcare Infrastructure. Comput Electr Eng 101:107991
Arif YM et al (2020) Blockchain-based data sharing for decentralized tourism destinations recommendation system. Int J Intel Eng Syst 13(6):472–486
Firdaus M, Rhee K-H (2021) On blockchain-enhanced secure data storage and sharing in vehicular edge computing networks. Appl Sci 11(1):414
Lee JY (2019) A decentralized token economy: How blockchain and cryptocurrency can revolutionize business. Bus Horiz 62(6):773–784
Albanese G et al (2020) "Dynamic consent management for clinical trials via private blockchain technology." Journal of Ambient Intelligence and Humanized. Computing 11(11):4909–4926
Swetha MS et al (2020) Blockchain enabled secure healthcare Systems. 2020 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT). IEEE
Khraisat A et al (2019) A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics 8(11):1210
Liang C et al (2020) Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics 9(7):1120
Alkadi O et al (2020) A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J 8(12):9463–9472
Thilagam T, Aruna R (2021) Intrusion detection for network based cloud computing by custom RC-NN and optimization. ICT Express 7(4):512–520
Derhab A et al (2020) Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering.Wireless Communications and Mobile Computing 2020.
HaddadPajouh H et al (2018) A deep recurrent neural network based approach for internet of things malware threat hunting. Futur Gener Comput Syst 85:88–96
Mansour RF (2022) Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment. Sci Rep 12(1):12937
Belhadi A et al (2023) Group intrusion detection in the Internet of Things using a hybrid recurrent neural network. Clust Comput 26(2):1147–1158
Code availability
Not applicable
Funding
Not applicable
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Human and Animal Rights
This article does not contain any studies with human or animal subjects performed by any of the authors.
Informed Consent
Informed consent does not apply as this was a retrospective review with no identifying patient information.
Consent to participate
Not applicable
Consent for publication
Not applicable
Conflicts of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Saravanan, V., Madiajagan, M., Rafee, S.M. et al. IoT-based blockchain intrusion detection using optimized recurrent neural network. Multimed Tools Appl 83, 31505–31526 (2024). https://doi.org/10.1007/s11042-023-16662-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16662-6