Skip to main content

A Collaborative Intrusion Detection System Using Deep Blockchain Framework for Securing Cloud Networks

  • Conference paper
  • First Online:
Intelligent Systems and Applications (IntelliSys 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1250))

Included in the following conference series:

Abstract

Security solutions, especially intrusion detection and blockchain, have been individually employed in the cloud for detecting cyber threats and preserving private data. Both solutions demand ensembled models-based learning that can alert the campaign of complex malicious events and concurrently accomplish data privacy. Such models would also provide additional security and privacy to the live migration of Virtual Machines (VMs) in the cloud. This would allow the secure transfer of one or more VMs between datacentres or cloud providers in real-time. This paper proposes a Deep Blockchain Framework (DBF) designed to offer security-based distributed intrusion detection and privacy-based blockchain with smart contracts in the cloud. The intrusion detection method is employed yet using a Bidirectional Long Short-Term Memory (BiLSTM) deep learning algorithm to deal with sequential network data and is assessed using the dataset of UNSW-NB15. The Privacy-based blockchain and smart contract methods are developed using the Ethereum library to provide privacy to the distributed intrusion detection engines. The DBF framework is compared with compelling privacy-preserving intrusion detection models, and the empirical results reveal that DBF outperforms the compelling models. The framework has the potential to be used as a decision support system that can assist users and cloud providers in securely and timely migrating their data in a fast and reliable manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Patel, A., Taghavi, M., Bakhtiyari, K., Júnior, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36(1), 25–41 (2013)

    Article  Google Scholar 

  2. Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)

    Article  Google Scholar 

  3. Alkadi, O.S., Moustafa, N., Turnbull, B., Choo, K.-K.R.: An ontological graph identification method for improving localisation of IP prefix Hijacking in network systems. IEEE Trans. Inf. Forensics Secur. 15, 1164–1174 (2019)

    Article  Google Scholar 

  4. Aitzhan, N.Z., Svetinovic, D.: Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Depend. Secure Comput. 15(5), 840–852 (2016)

    Article  Google Scholar 

  5. Sayeed, S., Marco-Gisbert, H.: Assessing blockchain consensus and security mechanism against the 51% attack. Appl. Sci. 9(9), 1788 (2019)

    Article  Google Scholar 

  6. Fraga-Lamas, P., Fernández-Caramés, T.M.: A review on blockchain technologies for an advanced and cyber-resilient automotive industry. IEEE Access 7, 17578–17598 (2019)

    Article  Google Scholar 

  7. Liu, J., Liu, Z.: A survey on security verification of blockchain smart contracts. IEEE Access 7, 77894–77904 (2019)

    Article  Google Scholar 

  8. Baldwin, C.: Bitcoin worth $72 million stolen from Bitfinex exchange in Hong Kong. https://www.reuters.com/article/us-bitfinex-hacked-hongkong-idUSKCN10E0KP. Accessed July 2019

  9. Peters, G.W., Panayi, E.: Understanding modern banking ledgers through blockchain technologies: future of transaction processing and smart contracts on the internet of money. In: Banking Beyond Banks and Money, pp. 239–278. Springer (2016)

    Google Scholar 

  10. Hardwick, F.S., Gioulis, A., Akram, R.N., Markantonakis, K.: E-voting with blockchain: an e-voting protocol with decentralisation and voter privacy. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1561–1567 (2018)

    Google Scholar 

  11. Knirsch, F., Unterweger, A., Eibl, G., Engel, D.: Privacy-preserving smart grid tariff decisions with blockchain-based smart contracts. In: Sustainable Cloud and Energy Services, pp. 85–116. Springer (2018)

    Google Scholar 

  12. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

  13. Fernández-Caramés, T.M., Fraga-Lamas, P.: A review on the use of blockchain for the internet of things. IEEE Access 6, 32979–33001 (2018)

    Article  Google Scholar 

  14. Tian, F.: A supply chain traceability system for food safety based on HACCP, blockchain & Internet of things. In: 2017 International Conference on Service Systems and Service Management, pp. 1–6 (2017)

    Google Scholar 

  15. Abeyratne, S.A., Monfared, R.P.: Blockchain ready manufacturing supply chain using distributed ledger. Int. J. Res. Eng. Technol. 5(9), 1–10 (2016)

    Article  Google Scholar 

  16. Yue, X., Wang, H., Jin, D., Li, M., Jiang, W.: Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10), 218 (2016)

    Google Scholar 

  17. Karafiloski, E., Mishev, A.: Blockchain solutions for big data challenges: a literature review. In: IEEE EUROCON 2017-17th International Conference on Smart Technologies, pp. 763–768 (2017)

    Google Scholar 

  18. Meng, W., Tischhauser, E.W., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access 6, 10179–10188 (2018)

    Google Scholar 

  19. Ølnes, S., Ubacht, J., Janssen, M.: Blockchain in government: Benefits and implications of distributed ledger technology for information sharing. Elsevier (2017)

    Google Scholar 

  20. Alketbi, A., Nasir, Q., Talib, M.A.: Blockchain for government services—use cases, security benefits and challenges. In: 2018 15th Learning and Technology Conference (L&T), pp. 112–119 (2018)

    Google Scholar 

  21. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)

    Article  Google Scholar 

  22. AlKadi, O., Moustafa, N., Turnbull, B., Choo, K.-K.R.: Mixture localization-based outliers models for securing data migration in cloud centers. IEEE Access 7, 114607–114618 (2019)

    Article  Google Scholar 

  23. Li, W., Meng, W., Kwok, L.-F., Horace, H.: Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77, 135–145 (2017)

    Article  Google Scholar 

  24. Bernabe, J.B., Canovas, J.L., Hernandez-Ramos, J.L., Moreno, R.T., Skarmeta, A.: Privacy-preserving solutions for Blockchain: review and challenges. IEEE Access 7, 164908–164940 (2019)

    Article  Google Scholar 

  25. Olleros, F.X., Zhegu, M.: Research Handbook on Digital Transformations. Edward Elgar Publishing, Cheltenham (2016)

    Google Scholar 

  26. Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084–2123 (2016)

    Article  Google Scholar 

  27. Wood, G.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, vol. 151, no. 2014, pp. 1–32 (2014)

    Google Scholar 

  28. Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 468–477. IEEE Press (2017)

    Google Scholar 

  29. Alexopoulos, N., Vasilomanolakis, E., Ivánkó, N.R., Mühlhäuser, M.: Towards blockchain-based collaborative intrusion detection systems. In: International Conference on Critical Information Infrastructures Security, pp. 107–118. Springer (2017)

    Google Scholar 

  30. Wan, C., et al.: Goshawk: a novel efficient, robust and flexible blockchain protocol. In: International Conference on Information Security and Cryptology, pp. 49–69. Springer (2018)

    Google Scholar 

  31. Liu, C.H., Lin, Q., Wen, S.: Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning. IEEE Trans. Ind. Inf. 15(6), 3516–3526 (2018)

    Google Scholar 

  32. Liang, G., Weller, S.R., Luo, F., Zhao, J., Dong, Z.Y.: Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Trans. Smart Grid 10(3), 3162–3173 (2018)

    Article  Google Scholar 

  33. Huebsch, R., Chun, B., Hellerstein, J., Loo, B., Maniatis, P., Roscoe, T., Shenker, S., Stoica, I., Yumerefendi, A.: The architecture of PIER: an Internet-scale query processor. In: Proceedings of 2nd Biennial Conference on Innovative Data System Research, pp. 28–43 (2005)

    Google Scholar 

  34. Dalbehera, P., Andersson, S., Varshney, R., Wallin, P.: Dynamic configuration of trusted executed environment resources. Google Patents (2016)

    Google Scholar 

  35. Mishra, P., Khurana, K., Gupta, S., Sharma, M.K.: VMAnalyzer: malware semantic analysis using integrated CNN and bi-directional LSTM for detecting VM-level attacks in cloud. In: 2019 Twelfth International Conference on Contemporary Computing (IC3), pp. 1–6. IEEE (2019)

    Google Scholar 

  36. Yadav, R.M.: Effective analysis of malware detection in cloud computing. Comput. Secur. 83, 14–21 (2019)

    Article  Google Scholar 

  37. Bengio, Y., Boulanger-Lewandowski, N., Pascanu, R.: Advances in optimizing recurrent networks. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 8624–8628. IEEE (2013)

    Google Scholar 

  38. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)

    Article  Google Scholar 

  39. Schuster, M., Paliwal, K.K.: Bidirectional recurrent neural networks. IEEE Trans. Signal Process. 45(11), 2673–2681 (1997)

    Article  Google Scholar 

  40. Graves, A., Schmidhuber, J.: Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural Netw. 18(5–6), 602–610 (2005)

    Article  Google Scholar 

  41. Cui, Z., Ke, R., Wang, Y.: Deep bidirectional and unidirectional LSTM recurrent neural network for network-wide traffic speed prediction. arXiv preprint arXiv:1801.02143 (2018)

  42. Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(6088), 533–536 (1986)

    Google Scholar 

  43. Google. Google Colaboratory. https://colab.research.google.com. Accessed May 2019

  44. Moustafa, N., Hu, J., Slay, J.: A holistic review of network anomaly detection systems: a comprehensive survey. J. Netw. Comput. Appl. 128, 33–55 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osama Alkadi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alkadi, O., Moustafa, N., Turnbull, B. (2021). A Collaborative Intrusion Detection System Using Deep Blockchain Framework for Securing Cloud Networks. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Systems and Applications. IntelliSys 2020. Advances in Intelligent Systems and Computing, vol 1250. Springer, Cham. https://doi.org/10.1007/978-3-030-55180-3_41

Download citation

Publish with us

Policies and ethics