Research Article
An AI-Enabled Blockchain Algorithm: A Novel Approach to Counteract Blockchain Network Security Attacks
@ARTICLE{10.4108/eetiot.5484, author={Anand Singh Rajawat and S B Goyal and Manoj Kumar and Thipendra P Singh}, title={An AI-Enabled Blockchain Algorithm: A Novel Approach to Counteract Blockchain Network Security Attacks}, journal={EAI Endorsed Transactions on Internet of Things}, volume={10}, number={1}, publisher={EAI}, journal_a={IOT}, year={2024}, month={3}, keywords={Blockchain, Deep Learning, AI, Security, Advanced Threats, Neural Networks, Cybersecurity}, doi={10.4108/eetiot.5484} }
- Anand Singh Rajawat
S B Goyal
Manoj Kumar
Thipendra P Singh
Year: 2024
An AI-Enabled Blockchain Algorithm: A Novel Approach to Counteract Blockchain Network Security Attacks
IOT
EAI
DOI: 10.4108/eetiot.5484
Abstract
INTRODUCTION: In this research, we present a novel method for strengthening the security of blockchain networks through the use of AI-driven technology. Blockchain has emerged as a game-changing technology across industries, but its security flaws, particularly in relation to Sybil and Distributed Denial of Service (DDoS) attacks, are a major cause for worry. To defend the blockchain from these sophisticated attacks, our research centres on creating a strong security solution that combines networks of Long Short-Term Memory (LSTM) and Self-Organizing Maps (SOM). OBJECTIVES: The main goal of this project is to create and test an AI-driven blockchain algorithm that enhances blockchain security by utilising LSTM and SOM networks. These are the objectives that the research hopes to achieve: In order to assess the shortcomings and weaknesses of existing blockchain security mechanisms. The goal is to create a new approach that uses LSTM sequence learning and SOM pattern recognition to anticipate and stop security breaches. In order to see how well this integrated strategy works in a simulated blockchain setting against different types of security risks. METHODS: The methods used in our study are based on social network analysis. A combination of support vector machines (SOM) for pattern recognition and long short-term memory (LSTM) networks for learning and event sequence prediction using historical data constitutes the methodology. The steps involved in conducting research are: The current state of blockchain security mechanisms is examined in detail. Creating a virtual blockchain and incorporating the SOM+LSTM algorithm. Putting the algorithm through its paces in order to see how well it detects and defends against different security risks. RESULTS: Significant enhancements to blockchain network security are the primary outcomes of this study. Important results consist of: Using the SOM+LSTM technique, we were able to increase the detection rates of possible security risks, such as Sybil and DDoS attacks. Enhanced reaction times when compared to conventional security techniques for attack prediction and prevention. Demonstrated ability of the algorithm to adapt and learn from new patterns of attacks, assuring long-term sustainability. CONCLUSION: This paper's findings highlight the efficacy of enhancing blockchain security through the integration of artificial intelligence technologies such as LSTM and SOM networks. In addition to improving blockchain technology's detection and forecasting capabilities, the SOM+LSTM algorithm helps advance the platform toward greater security and reliability. This study provides a solid answer to the increasing worries about cyber dangers in the modern era and opens the door to more sophisticated AI uses in blockchain security.
Copyright © 2024 A. S. Rajawat et al., licensed to EAI. This is an open access article distributed under the terms of the CC BY-NCSA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.