Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash 99 tok/s
Gemini 2.5 Pro 48 tok/s Pro
GPT-5 Medium 40 tok/s
GPT-5 High 38 tok/s Pro
GPT-4o 101 tok/s
GPT OSS 120B 470 tok/s Pro
Kimi K2 161 tok/s Pro
2000 character limit reached

Collaborative Cybersecurity Using Blockchain: A Survey (2403.04410v1)

Published 7 Mar 2024 in cs.CR

Abstract: Collaborative cybersecurity relies on organizations sharing information to boost security, but trust management is a key concern. Decentralized solutions like distributed ledgers, particularly blockchain, are crucial for eliminating single points of failure. However, the existing literature on blockchain-based collaborative cybersecurity is limited, lacking comprehensive insights. This paper addresses this gap by surveying blockchain's role in collaborative cybersecurity from 2016 to 2023. It explores various applications, trends, and the evolution of blockchain technology, focusing on access control, data validation policies, underlying tech, and consensus mechanisms. A key finding is the fragmentation of the field with no dominant research group or venue. Many recent projects poorly select consensus protocols for their blockchain. To aid researchers and practitioners, this paper offers guidelines for choosing the right blockchain for specific purposes and highlights open research areas and lessons learned from past blockchain applications in collaborative cybersecurity, encouraging further exploration in this field.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (113)
  1. Privacy-Preserved Cyberattack Detection in Industrial Edge of Things (IEoT): A Blockchain-Orchestrated Federated Learning Approach. IEEE Transactions on Industrial Informatics 18, 11 (2022), 7920–7934.
  2. A lightweight blockchain based cybersecurity for IoT environments. In 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). IEEE, 139–144.
  3. Co-IoT: A collaborative DDoS mitigation scheme in IoT environment based on blockchain using SDN. In 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, 1–6.
  4. Brainchain-a machine learning approach for protecting blockchain applications using sdn. In ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 1–6.
  5. Cochain-SC: An intra-and inter-domain DDoS mitigation scheme based on blockchain using SDN and smart contract. IEEE Access 7 (2019), 98893–98907.
  6. Chainsecure-a scalable and proactive solution for protecting blockchain applications using sdn. In 2018 IEEE global communications conference (GLOBECOM). IEEE, 1–6.
  7. Bringing intelligence to software defined networks: Mitigating DDoS attacks. IEEE Transactions on Network and Service Management 17, 4 (2020), 2523–2535.
  8. Sam Adhikari and Chris Davis. 2020. Application of blockchain within aviation cybersecurity framework. In Aiaa Aviation 2020 Forum. 2931.
  9. Blockchain secured electronic health records: patient rights, privacy and cybersecurity. In 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT). IEEE, 108–111.
  10. Blockchain-Enabled Intrusion Detection and Prevention System of APTs Within Zero Trust Architecture. IEEE Access 10 (2022), 89270–89288.
  11. Towards blockchain-based collaborative intrusion detection systems. In Critical Information Infrastructures Security: 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers 12. Springer, 107–118.
  12. TRIDEnT: building decentralized incentives for collaborative security. arXiv preprint arXiv:1905.03571 (2019).
  13. TRIDEnT: towards a decentralized threat indicator marketplace. In Proceedings of the 35th Annual ACM Symposium on Applied Computing. 332–341.
  14. Ahamed Aljuhani. 2022. IDS-Chain: A Collaborative Intrusion Detection Framework Empowered Blockchain for Internet of Medical Things. In 2022 IEEE Cloud Summit. IEEE, 57–62.
  15. A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet of Things Journal 8, 12 (2020), 9463–9472.
  16. Fidchain: Federated intrusion detection system for blockchain-enabled iot healthcare applications. In Healthcare, Vol. 10. MDPI, 1110.
  17. Medrec: Using blockchain for medical data access and permission management. In 2016 2nd international conference on open and big data (OBD). IEEE, 25–30.
  18. Blockchain technology and its applications across multiple domains: a survey. Journal of International Technology and Information Management 29, 4 (2021), 78–119.
  19. A survey on business process view integration: past, present and future applications to blockchain. Business Process Management Journal (2022).
  20. Rob B Briner and David Denyer. 2012. Systematic review and evidence synthesis as a practice and scholarship tool. Oxford Handbook of Evidence-Based Management (2012).
  21. Blockchain solutions for forensic evidence preservation in IoT environments. In 2019 IEEE Conference on Network Softwarization (NetSoft). IEEE, 110–114.
  22. Vitalik Buterin et al. 2014. A next-generation smart contract and decentralized application platform. white paper 3, 37 (2014), 2–1.
  23. Cybersecurity of Renewable Energy Data and Applications Using Distributed Ledger Technology. arXiv preprint arXiv:2110.11354 (2021).
  24. On security analysis of proof-of-elapsed-time (poet). In Stabilization, Safety, and Security of Distributed Systems: 19th International Symposium, SSS 2017, Boston, MA, USA, November 5–8, 2017, Proceedings 19. Springer, 282–297.
  25. FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks. In Provable and Practical Security: 16th International Conference, ProvSec 2022, Nanjing, China, November 11–12, 2022, Proceedings. Springer, 210–227.
  26. Konstantinos Christidis and Michael Devetsikiotis. 2016. Blockchains and smart contracts for the internet of things. Ieee Access 4 (2016), 2292–2303.
  27. Suitability of blockchain for collaborative intrusion detection systems. In 2020 12th Annual Undergraduate Research Conference on Applied Computing (URC). IEEE, 1–6.
  28. PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain. In CEUR workshop proceedings, Vol. 2058. CEUR-WS, 1–11.
  29. Konstantinos Demertzis. 2021. Blockchained federated learning for threat defense. arXiv preprint arXiv:2102.12746 (2021).
  30. Blockchain technology in the future of business cyber security and accounting. Journal of Management Analytics 7, 2 (2020), 189–208.
  31. Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: A survey. IEEE Transactions on Intelligent Transportation Systems 23, 2 (2021), 683–700.
  32. A comprehensive study of anomaly detection schemes in IoT networks using machine learning algorithms. Sensors 21, 24 (2021), 8320.
  33. Blockchain technology for cybersecurity applications in the food supply chain: A systematic literature review. Proceedings of the XXIV Summer School “Francesco Turco”—Industrial Systems Engineering, Bergamo, Italy (2020), 9–11.
  34. Blockchain-enabled collaborative intrusion detection in software defined networks. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 967–974.
  35. FISCO BCOS. 2023. FISCO BCOS. http://www.fisco-bcos.org/ [Online; accessed 22-March-2023].
  36. Achieving cybersecurity in blockchain-based systems: A survey. Future Generation Computer Systems 124 (2021), 91–118.
  37. CIoTA: Collaborative Anomaly Detection via Blockchain. arXiv preprint arXiv:1803.03807 (2018).
  38. Gideon Greenspan. 2015. Avoiding the pointless blockchain project. https://www.multichain.com/blog/2015/11/avoiding-pointless-blockchain-project/
  39. LDBT: a lightweight DDoS attack tracing scheme based on blockchain. In 2021 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 1–6.
  40. A distributed collaborative entrance Defense framework against DDoS attacks on satellite internet. IEEE Internet of Things Journal 9, 17 (2022), 15497–15510.
  41. An industrial prototype of trusted energy performance contracts using blockchain technologies. In 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 1336–1343.
  42. CIDS: Collaborative Intrusion Detection System using Blockchain Technology. In 2022 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 125–130.
  43. Recent advances in blockchain technology: A survey on applications and challenges. International Journal of Ad Hoc and Ubiquitous Computing 38, 1-3 (2021), 82–100.
  44. How can incentive mechanisms and blockchain benefit with each other? a survey. Comput. Surveys 55, 7 (2022), 1–38.
  45. A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. International Journal of Network Management 29, 2 (2019), e2060.
  46. CGAN-Based Collaborative Intrusion Detection for UAV Networks: A Blockchain-Empowered Distributed Federated Learning Approach. IEEE Internet of Things Journal 10, 1 (2022), 120–132.
  47. A Contract Based User-Centric Computational Trust Towards E-Governance. In Web Services–ICWS 2020: 27th International Conference, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18–20, 2020, Proceedings 27. Springer, 133–149.
  48. Security Threat Mitigation For Smart Contracts: A Comprehensive Survey. Comput. Surveys (2023).
  49. Staffs Keele et al. 2007. Guidelines for performing systematic literature reviews in software engineering.
  50. On blockchain architectures for trust-based collaborative intrusion detection. In 2019 IEEE world congress on services (SERVICES), Vol. 2642. IEEE, 21–28.
  51. An Intelligent Platform for Threat Assessment and Cyber-Attack Mitigation in IoMT Ecosystems. In 2022 IEEE Globecom Workshops (GC Wkshps). IEEE, 541–546.
  52. Blockchain for modern applications: A survey. Sensors 22, 14 (2022), 5274.
  53. Manish Kumar and Ashish Kumar Singh. 2020. Distributed intrusion detection system using blockchain and cloud computing infrastructure. In 2020 4th international conference on trends in electronics and informatics (ICOEI)(48184). IEEE, 248–252.
  54. A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. J. Parallel and Distrib. Comput. 164 (2022), 55–68.
  55. A survey on the blockchain techniques for the Internet of Vehicles security. Transactions on Emerging Telecommunications Technologies (2021), e4317.
  56. W. Kumari and D. McPherson. 2009. Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF). RFC 5635. RFC Editor.
  57. The Evolution of Federated Learning-based Intrusion Detection and Mitigation: a Survey. IEEE Transactions on Network and Service Management (2022).
  58. JongHyup Lee and Taekyoung Kwon. 2021. Distributed watchdogs based on blockchain for securing industrial internet of things. Sensors 21, 13 (2021), 4393.
  59. Blockchain-secured smart manufacturing in industry 4.0: A survey. IEEE Transactions on Systems, Man, and Cybernetics: Systems 51, 1 (2020), 237–252.
  60. A scalable multi-layer PBFT consensus for blockchain. IEEE Transactions on Parallel and Distributed Systems 32, 5 (2020), 1146–1160.
  61. A framework of blockchain-based collaborative intrusion detection in software defined networking. In Network and System Security: 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, Proceedings 14. Springer, 261–276.
  62. Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Generation Computer Systems 96 (2019), 481–489.
  63. Towards blockchained challenge-based collaborative intrusion detection. In Applied Cryptography and Network Security Workshops: ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings 17. Springer, 122–139.
  64. Toward a blockchain-based framework for challenge-based collaborative intrusion detection. International Journal of Information Security 20 (2021), 127–139.
  65. BlockCSDN: towards blockchain-based collaborative intrusion detection in software defined networking. IEICE TRANSACTIONS on Information and Systems 105, 2 (2022), 272–279.
  66. Iuon-Chang Lin and Tzu-Chun Liao. 2017. A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19, 5 (2017), 653–659.
  67. SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation. Information Fusion 70 (2021), 100–114.
  68. Blockchain and federated learning for collaborative intrusion detection in vehicular edge computing. IEEE Transactions on Vehicular Technology 70, 6 (2021), 6073–6084.
  69. Blockchain-based identity management systems: A review. Journal of network and computer applications 166 (2020), 102731.
  70. Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey. Cluster Computing (2022), 1–21.
  71. Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain. International Journal of Information Security 19 (2020), 279–290.
  72. When intrusion detection meets blockchain technology: a review. Ieee Access 6 (2018), 10179–10188.
  73. Loïc Miller and Cristel Pelsser. 2019. A taxonomy of attacks using bgp blackholing. In Computer Security–ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I 24. Springer, 107–127.
  74. Michael Mylrea and Sri Nikhil Gupta Gourisetti. 2018. Blockchain for supply chain cybersecurity, optimization and compliance. In 2018 resilience week (RWS). IEEE, 70–76.
  75. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260.
  76. LegIoT: Ledgered trust management platform for IoT. In Computer Security–ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I 25. Springer, 377–396.
  77. Almotery Ossamah. 2020. Blockchain as a solution to Drone Cybersecurity. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT). IEEE, 1–9.
  78. Secure exchange of cyber threat intelligence using TAXII and distributed ledger technologies-application for electrical power and energy system. In Proceedings of the 16th International Conference on Availability, Reliability and Security. 1–8.
  79. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys (CSUR) 39, 1 (2007), 3–es.
  80. Chained anomaly detection models for federated learning: An intrusion detection case study. Applied Sciences 8, 12 (2018), 2663.
  81. Blockchain-based decentralized replay attack detection for large-scale power systems. IEEE Transactions on Systems, Man, and Cybernetics: Systems 52, 8 (2021), 4727–4739.
  82. BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network. Journal of Network and Computer Applications 143 (2019), 167–177.
  83. A blockchain-based architecture for collaborative DDoS mitigation with smart contracts. In Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings 11. Springer International Publishing, 16–29.
  84. Enabling a cooperative, multi-domain DDoS defense by a blockchain signaling system (BloSS). Semantic Scholar (2017).
  85. Evaluating a blockchain-based cooperative defense. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, 533–538.
  86. Bruno Rodrigues and Burkhard Stiller. 2019. Cooperative signaling of DDoS attacks in a blockchain-based network. In Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos. 39–41.
  87. SC-FLARE: Cooperative DDoS signaling based on smart contracts. In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 1–3.
  88. A Framework for Verifiable and Auditable Collaborative Anomaly Detection. IEEE Access 10 (2022), 82896–82909.
  89. D Saveetha and G Maragatham. 2022. Design of Blockchain enabled intrusion detection model for detecting security attacks using deep learning. Pattern Recognition Letters 153 (2022), 24–28.
  90. Scimago. 2022. Scimago Country Rank. https://www.scimagojr.com/countryrank.php [Online; accessed 22-March-2023].
  91. Dynamic distributed honeypot based on blockchain. IEEE Access 7 (2019), 72234–72246.
  92. FusionFedBlock: Fusion of blockchain and federated learning to preserve privacy in industry 5.0. Information Fusion 90 (2023), 233–240.
  93. Delegated proof of stake: features & tradeoffs. Multicoin Cap 19 (2018), 1–19.
  94. Blockchain-Based Trusted Traffic Offloading in Space-Air-Ground Integrated Networks (SAGIN): A Federated Reinforcement Learning Approach. IEEE Journal on Selected Areas in Communications 40, 12 (2022), 3501–3516.
  95. A systematic literature review of blockchain cyber security. Digital Communications and Networks 6, 2 (2020), 147–156.
  96. CBSigIDS: towards collaborative blockchained signature-based intrusion detection. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 1228–1235.
  97. Snort based collaborative intrusion detection system using blockchain in SDN. In 2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA). IEEE, 1–8.
  98. Taylor Rodriguez Vance and Andrew Vance. 2019. Cybersecurity in the blockchain era: a survey on examining critical infrastructure protection with blockchain-based technology. In 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T). IEEE, 107–112.
  99. Taxonomy and survey of collaborative intrusion detection. ACM Computing Surveys (CSUR) 47, 4 (2015), 1–33.
  100. Pavel Vasin. 2014. Blackcoin’s proof-of-stake protocol v2. URL: https://blackcoin. co/blackcoin-pos-protocol-v2-whitepaper. pdf 71 (2014).
  101. Sok: Dag-based blockchain systems. Comput. Surveys 55, 12 (2023), 1–38.
  102. A survey of blockchain-based cybersecurity for vehicular networks. 2020 International Wireless Communications and Mobile Computing (IWCMC) (2020), 740–745.
  103. Infedge: A blockchain-based incentive mechanism in hierarchical federated learning for end-edge-cloud communications. IEEE Journal on Selected Areas in Communications 40, 12 (2022), 3325–3342.
  104. Designing consensus algorithm for collaborative signature-based intrusion detection system. Indones J. Electron. Eng. Comput. Sci. 22, 1 (2021), 485–496.
  105. Karl Wüst and Arthur Gervais. 2018. Do you need a blockchain?. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 45–54.
  106. Cybersecurity, data privacy and blockchain: a review. SN Computer Science 3, 2 (2022), 1–12.
  107. A survey of blockchain consensus protocols. Comput. Surveys (2023).
  108. A collaborative DDoS defense platform based on blockchain technology. In 2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media). IEEE, 1–6.
  109. SOChain: A privacy-preserving DDoS data exchange service over soc consortium blockchain. IEEE Transactions on Engineering Management 67, 4 (2020), 1487–1500.
  110. Chandralekha Yenugunti and Stephen S Yau. 2020. A blockchain approach to identifying compromised nodes in collaborative intrusion detection systems. In 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). IEEE, 87–93.
  111. Blockchain-based federated learning for device failure detection in industrial IoT. IEEE Internet of Things Journal 8, 7 (2020), 5926–5937.
  112. Blockchain challenges and opportunities: A survey. International journal of web and grid services 14, 4 (2018), 352–375.
  113. Blockchain for cybersecurity in smart grid: A comprehensive survey. IEEE Transactions on Industrial Informatics 17, 1 (2020), 3–19.
List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Ai Generate Text Spark Streamline Icon: https://streamlinehq.com

Paper Prompts

Sign up for free to create and run prompts on this paper using GPT-5.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-up Questions

We haven't generated follow-up questions for this paper yet.