Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques

被引:12
|
作者
Venkatesan, K. [1 ,2 ]
Rahayu, Syarifah Bahiyah [1 ,2 ]
机构
[1] Natl Def Univ Malaysia UPNM, Cyber Secur & Digital Ind Revolut Ctr, Kuala Lumpur, Malaysia
[2] Natl Def Univ Malaysia UPNM, Fac Def Sci & Technol, Dept Sci Def, Kuala Lumpur, Malaysia
关键词
NETWORKS; CHALLENGES; MECHANISM; PROTOCOL; TRUST;
D O I
10.1038/s41598-024-51578-7
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, we propose hybrid consensus algorithms that combine machine learning (ML) techniques to address the challenges and vulnerabilities in blockchain networks. Consensus Protocols make ensuring agreement among the applicants in the distributed systems difficult. However, existing mechanisms are more vulnerable to cyber-attacks. Previous studies extensively explore the influence of cyber attacks and highlight the necessity for effective preventive measures. This research presents the integration of ML techniques with the proposed hybrid consensus algorithms and advantages over predicting cyber-attacks, anomaly detection, and feature extraction. Our hybrid approaches leverage and optimize the proposed consensus protocols' security, trust, and robustness. However, this research also explores the various ML techniques with hybrid consensus algorithms, such as Delegated Proof of Stake Work (DPoSW), Proof of Stake and Work (PoSW), Proof of CASBFT (PoCASBFT), Delegated Byzantine Proof of Stake (DBPoS) for security enhancement and intelligent decision making in consensus protocols. Here, we also demonstrate the effectiveness of the proposed methodology within the decentralized networks using the ProximaX blockchain platform. This study shows that the proposed research framework is an energy-efficient mechanism that maintains security and adapts to dynamic conditions. It also integrates privacy-enhancing features, robust consensus mechanisms, and ML approaches to detect and prevent security threats. Furthermore, the practical implementation of these ML-based hybrid consensus models faces significant challenges, such as scalability, latency, throughput, resource requirements, and potential adversarial attacks. These challenges must be addressed to ensure the successful implementation of the blockchain network for real-world scenarios.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques
    K. Venkatesan
    Syarifah Bahiyah Rahayu
    Scientific Reports, 14
  • [2] Towards decentralized IoT security enhancement: A blockchain approach
    Qian, Yongfeng
    Jiang, Yingying
    Chen, Jing
    Zhang, Yu
    Song, Jeungeun
    Zhou, Ming
    Pustisek, Matevz
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 72 : 266 - 273
  • [3] Security for the Metaverse: Blockchain and Machine Learning Techniques for Intrusion Detection
    Truong, Vu Tuan
    Le, Long Bao
    IEEE NETWORK, 2024, 38 (05): : 204 - 212
  • [4] Towards a lightweight security framework using blockchain and machine learning
    Ismail, Shereen
    Nouman, Muhammad
    Dawoud, Diana W.
    Reza, Hassan
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2024, 5 (01):
  • [5] Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach
    Mishra, Kamta Nath
    Bhattacharjee, Vandana
    Saket, Shashwat
    Mishra, Shivam Prakash
    Cluster Computing, 2024, 27 (01) : 27 - 52
  • [6] Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach
    Kamta Nath Mishra
    Vandana Bhattacharjee
    Shashwat Saket
    Shivam Prakash Mishra
    Cluster Computing, 2024, 27 : 27 - 52
  • [7] Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach
    Mishra, Kamta Nath
    Bhattacharjee, Vandana
    Saket, Shashwat
    Mishra, Shivam Prakash
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (01): : 27 - 52
  • [8] Enhancing Network Security using Hybrid Machine Learning Techniques
    Sirenjeevi, P.
    Dhanakoti, V.
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [9] Integrating Machine Learning Techniques to Constitute a Hybrid Security System
    Singh, Nikita
    Chandra, Nidhi
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 1082 - 1087
  • [10] An approach to the correlation of security events based on machine learning techniques
    Stroeh, Kleber
    Roberto Mauro Madeira, Edmundo
    Goldenstein, Siome Klein
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) : 1 - 16