Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques

被引:12
|
作者
Venkatesan, K. [1 ,2 ]
Rahayu, Syarifah Bahiyah [1 ,2 ]
机构
[1] Natl Def Univ Malaysia UPNM, Cyber Secur & Digital Ind Revolut Ctr, Kuala Lumpur, Malaysia
[2] Natl Def Univ Malaysia UPNM, Fac Def Sci & Technol, Dept Sci Def, Kuala Lumpur, Malaysia
关键词
NETWORKS; CHALLENGES; MECHANISM; PROTOCOL; TRUST;
D O I
10.1038/s41598-024-51578-7
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, we propose hybrid consensus algorithms that combine machine learning (ML) techniques to address the challenges and vulnerabilities in blockchain networks. Consensus Protocols make ensuring agreement among the applicants in the distributed systems difficult. However, existing mechanisms are more vulnerable to cyber-attacks. Previous studies extensively explore the influence of cyber attacks and highlight the necessity for effective preventive measures. This research presents the integration of ML techniques with the proposed hybrid consensus algorithms and advantages over predicting cyber-attacks, anomaly detection, and feature extraction. Our hybrid approaches leverage and optimize the proposed consensus protocols' security, trust, and robustness. However, this research also explores the various ML techniques with hybrid consensus algorithms, such as Delegated Proof of Stake Work (DPoSW), Proof of Stake and Work (PoSW), Proof of CASBFT (PoCASBFT), Delegated Byzantine Proof of Stake (DBPoS) for security enhancement and intelligent decision making in consensus protocols. Here, we also demonstrate the effectiveness of the proposed methodology within the decentralized networks using the ProximaX blockchain platform. This study shows that the proposed research framework is an energy-efficient mechanism that maintains security and adapts to dynamic conditions. It also integrates privacy-enhancing features, robust consensus mechanisms, and ML approaches to detect and prevent security threats. Furthermore, the practical implementation of these ML-based hybrid consensus models faces significant challenges, such as scalability, latency, throughput, resource requirements, and potential adversarial attacks. These challenges must be addressed to ensure the successful implementation of the blockchain network for real-world scenarios.
引用
收藏
页数:24
相关论文
共 50 条
  • [41] A Review of Machine Learning Algorithms for Cloud Computing Security
    Butt, Umer Ahmed
    Mehmood, Muhammad
    Shah, Syed Bilal Hussain
    Amin, Rashid
    Shaukat, M. Waqas
    Raza, Syed Mohsan
    Suh, Doug Young
    Piran, Md. Jalil
    ELECTRONICS, 2020, 9 (09) : 1 - 25
  • [42] A Review on Cyber Security Datasets for Machine Learning Algorithms
    Yavanoglu, Ozlem
    Aydos, Murat
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 2186 - 2193
  • [43] Towards a Lightweight, Hybrid Approach for Detecting DOM XSS Vulnerabilities with Machine Learning
    Melicher, William
    Fung, Clement
    Bauer, Lujo
    Jia, Limin
    PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), 2021, : 2684 - 2695
  • [44] A Survey: Machine Learning Based Security Analytics Approaches and Applications of Blockchain in Network Security
    Chen, Lin
    Lv, Huahui
    Fan, Kai
    Yang, Hang
    Kuang, Xiaoyun
    Xu, Aidong
    Yang, Yiwei
    2020 3RD INTERNATIONAL CONFERENCE ON SMART BLOCKCHAIN (SMARTBLOCK), 2020, : 17 - 22
  • [45] Cloud data transmission based on security and improved routing through hybrid machine learning techniques
    Qamar, Shamimul
    Amaan, Mohd
    Rahman, Mohammed Inamur
    Aqeel, Ibrahim
    Shuaib, Mohammed
    Khormi, Ibrahim Mohsen
    Alam, Shadab
    SOFT COMPUTING, 2023,
  • [46] Security Enhancement in Healthcare Cloud using Machine Learning
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 : 388 - 397
  • [47] Automatically Detect Software Security Vulnerabilities Based on Natural Language Processing Techniques and Machine Learning Algorithms
    Cho Do Xuan
    Vu Ngoc Son
    Duong Duc
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2022, 16 (01) : 70 - 88
  • [48] A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing
    Pranav Shrivastava
    Bashir Alam
    Mansaf Alam
    Multimedia Tools and Applications, 2024, 83 : 2683 - 2702
  • [49] A Review on the Effectiveness of Machine Learning and Deep Learning Algorithms for Cyber Security
    Geetha, R.
    Thilagam, T.
    ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2021, 28 (04) : 2861 - 2879
  • [50] A Review on the Effectiveness of Machine Learning and Deep Learning Algorithms for Cyber Security
    R. Geetha
    T. Thilagam
    Archives of Computational Methods in Engineering, 2021, 28 : 2861 - 2879