IoT-based blockchain intrusion detection using optimized recurrent neural network

V. Saravanan 1
M. Madiajagan 2
Shaik Mohammad Rafee 3
P. Sanju 4
Tasneem Bano Rehman 5
Balachandra Pattanaik 6
1
 
Department of Computer Science, College of Engineering and Technolgy, Dambi Dollo University, Dambi Dollo, Ethiopia
3
 
Department of EEE, Sasi Institute of Technology & Engineering, Tadepalligudem, India
4
 
Computer Science and Engineering, University College of Engineering Tindivanam, UCET, Tindivanam, India
5
 
Department of Computer Science and Engineering, SAGE University Bhopal, Madhya Pradesh, India
6
 
Department of Electrical and Computer Engineering, College of Engineering and Technology, Wollega University, Nekemte, Ethiopia
Publication typeJournal Article
Publication date2023-09-16
scimago Q1
SJR0.777
CiteScore7.7
Impact factor
ISSN13807501, 15737721
Hardware and Architecture
Computer Networks and Communications
Software
Media Technology
Abstract
In recent years, Intrusion Detection Systems (IDS) monitor the computer network system by collecting and analyzing data or information by identifying the behavior of the user or predicting the attacks by the automatic response. So, in this paper, the Blockchain-based African Buffalo (BbAB) scheme with Recurrent Neural Network (RNN) model is proposed for detecting the intrusion by enhancing security. Furthermore, normal and malware user datasets are collected and trained in the system and the dataset is encrypted using Identity Based Encryption (IBE). The encrypted data are securely stored in the blockchain in the cloud. Hereafter, Recurrent Neural Network (RNN) was employed to detect the intrusion in a cloud environment. African buffalo optimization was used in the RNN prediction phase for continuous monitoring of intrusion. Finally, the performance results of the developed technique are compared with other conventional models in terms of accuracy, precision, recall, F1-score, and detection rate. The outperformance of the designed model attains better accuracy of 99.87% and high recall of 99.92%.it shows the efficiency of the designed model to protect data and security in cloud computing.
Found 
Found 

Top-30

Journals

1
2
Information Security Journal
2 publications, 3.85%
International Journal of Communication Systems
2 publications, 3.85%
Cluster Computing
2 publications, 3.85%
Scientific Reports
2 publications, 3.85%
Internet of Things
1 publication, 1.92%
International Journal of Network Management
1 publication, 1.92%
Public Service, Governance and Web 2.0 Technologies
1 publication, 1.92%
Artificial Intelligence Review
1 publication, 1.92%
International Journal of Information Security and Privacy
1 publication, 1.92%
AEJ - Alexandria Engineering Journal
1 publication, 1.92%
Knowledge-Based Systems
1 publication, 1.92%
International Journal of Information Security
1 publication, 1.92%
Lecture Notes in Electrical Engineering
1 publication, 1.92%
IEEE Access
1 publication, 1.92%
International Journal of Computational Intelligence Systems
1 publication, 1.92%
PeerJ Computer Science
1 publication, 1.92%
Evolving Systems
1 publication, 1.92%
Computer Standards and Interfaces
1 publication, 1.92%
Electronics (Switzerland)
1 publication, 1.92%
IEEE Internet of Things Journal
1 publication, 1.92%
Knowledge and Information Systems
1 publication, 1.92%
Cognitive Computation
1 publication, 1.92%
Communications in Computer and Information Science
1 publication, 1.92%
Lecture Notes in Networks and Systems
1 publication, 1.92%
Lecture Notes in Computer Science
1 publication, 1.92%
Journal of Information Security and Applications
1 publication, 1.92%
Ad Hoc Networks
1 publication, 1.92%
Applied Computational Intelligence and Soft Computing
1 publication, 1.92%
Journal of Information and Knowledge Management
1 publication, 1.92%
1
2

Publishers

5
10
15
20
Institute of Electrical and Electronics Engineers (IEEE)
20 publications, 38.46%
Springer Nature
14 publications, 26.92%
Elsevier
6 publications, 11.54%
Wiley
3 publications, 5.77%
IGI Global
2 publications, 3.85%
Taylor & Francis
2 publications, 3.85%
MDPI
2 publications, 3.85%
PeerJ
1 publication, 1.92%
Hindawi Limited
1 publication, 1.92%
World Scientific
1 publication, 1.92%
5
10
15
20
  • We do not take into account publications without a DOI.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
52
Share
Cite this
GOST |
Cite this
GOST Copy
Saravanan V. et al. IoT-based blockchain intrusion detection using optimized recurrent neural network // Multimedia Tools and Applications. 2023.
GOST all authors (up to 50) Copy
Saravanan V., Madiajagan M., Rafee S. M., Sanju P., Rehman T. B., Pattanaik B. IoT-based blockchain intrusion detection using optimized recurrent neural network // Multimedia Tools and Applications. 2023.
RIS |
Cite this
RIS Copy
TY - JOUR
DO - 10.1007/s11042-023-16662-6
UR - https://doi.org/10.1007/s11042-023-16662-6
TI - IoT-based blockchain intrusion detection using optimized recurrent neural network
T2 - Multimedia Tools and Applications
AU - Saravanan, V.
AU - Madiajagan, M.
AU - Rafee, Shaik Mohammad
AU - Sanju, P.
AU - Rehman, Tasneem Bano
AU - Pattanaik, Balachandra
PY - 2023
DA - 2023/09/16
PB - Springer Nature
SN - 1380-7501
SN - 1573-7721
ER -
BibTex
Cite this
BibTex (up to 50 authors) Copy
@article{2023_Saravanan,
author = {V. Saravanan and M. Madiajagan and Shaik Mohammad Rafee and P. Sanju and Tasneem Bano Rehman and Balachandra Pattanaik},
title = {IoT-based blockchain intrusion detection using optimized recurrent neural network},
journal = {Multimedia Tools and Applications},
year = {2023},
publisher = {Springer Nature},
month = {sep},
url = {https://doi.org/10.1007/s11042-023-16662-6},
doi = {10.1007/s11042-023-16662-6}
}