A Deep Learning–Enhanced Blockchain Architecture for Intrusion Detection and Classification

Authors

  • C. Ananth Department of Computer and Information Science, Annamalai University, Annamalainagar, Tamil Nadu, India
  • S. Sathiyarani Department of Computer and Information Science, Annamalai University, Annamalainagar, Tamil Nadu, India
  • N. Mohananthini Department of Electrical and Electronics Engineering, Muthayammal Engineering College, Rasipuram, Tamil Nadu, India
Volume: 16 | Issue: 1 | Pages: 32009-32014 | February 2026 | https://doi.org/10.48084/etasr.15481

Abstract

An Intrusion Detection System (IDS) is a significant cybersecurity process that comprises network traffic monitoring for malicious activity and taking appropriate protective actions. However, inadequate training data or inappropriately selected thresholds often restrict the performance of these systems, leading to low detection rates. Blockchain (BC) technology can offer a secure, decentralized, and immutable ledger to monitor suspicious activities over time and classify intrusions globally. Integrating advanced Deep Learning (DL) and BC improves detection and overall security. The decentralized nature of BC eliminates single points of failure. DL can efficiently detect patterns and anomalies, mitigating false alerts, and when integrated with public BC, it ensures secure, transparent, and tamper-proof storage of intrusion data. This study presents a BC-assisted Coati Optimization Algorithm (COA) with DL for Intrusion Detection and Classification (BCOADL-IDC) method, using the BC architecture to ensure data integrity and immutability. Initially, min-max normalization is applied to scale the input data. Then, an Attention-based Bidirectional Recurrent Neural Network (ABiRNN) model is utilized for intrusion detection. COA is used to fine-tune the crucial parameters of the ABiRNN model to improve detection performance. Finally, the integration of BC helps to ensure the integrity of the detection results, prevent tampering, and provide a transparent and secure record of network actions. The comparative study of the BCOADL-IDC approach showed a higher accuracy of 98.79% over existing models on the ToN_IoT dataset.

Keywords:

blockchain, deep learning, security, coati optimization algorithm, intrusion detection, cybersecurity

Downloads

Download data is not yet available.

References

A. A. Aliyu, M. Ibrahim, and S. Abdulkadir, "A Blockchain Enhanced Deep Learning Approach for Intrusion Detection in Trusted Execution Environments," Digital Technologies Research and Applications, vol. 4, no. 1, pp. 135–157, June 2025. DOI: https://doi.org/10.54963/dtra.v4i1.962

M. Mounir, S. G. Sayed, and M. M. E. El-Dakroury, "Securing the Future: Real-Time intrusion Detection in IIoT Smart Grids through Innovative AI Solutions," Journal of Cybersecurity and Information Management, vol. 15, no. 2, pp. 208–244, 2025. DOI: https://doi.org/10.54216/JCIM.150216

S. R. Addula, A. K. Tyagi, K. Naithani, and S. Kumari, "Blockchain-Empowered Internet of Things (IoTs) Platforms for Automation in Various Sectors," in Artificial Intelligence-Enabled Digital Twin for Smart Manufacturing, John Wiley & Sons, 2024, pp. 443–477. DOI: https://doi.org/10.1002/9781394303601.ch20

Z. Wang, J. Wang, Y. Liu, X. Yang, F. Qi, and W. Song, "Privacy-Preserving Attribute-Based Access Control Scheme With Intrusion Detection and Policy Hiding for Data Sharing in VANET," IEEE Internet of Things Journal, vol. 11, no. 13, pp. 23348–23369, July 2024. DOI: https://doi.org/10.1109/JIOT.2024.3384753

R. K. Mahendran, A. Khan, F. Ullah, F. Ali, and A. A. AlZubi, "PRISM-IIoT: A holistic approach for privacy preservation in industrial IoT using advanced cryptography and blockchain-enabled auditability framework," Alexandria Engineering Journal, vol. 128, pp. 816–832, Sept. 2025. DOI: https://doi.org/10.1016/j.aej.2025.07.027

S. R. Khonde and V. Ulagamuthalvi, "Hybrid intrusion detection system using blockchain framework," EURASIP Journal on Wireless Communications and Networking, vol. 2022, no. 1, June 2022, Art. no. 58. DOI: https://doi.org/10.1186/s13638-022-02089-4

N. Kumaran and S. J. S. Mohan, "BRDO: Blockchain Assisted Intrusion Detection Using Optimized Deep Stacked Network," Cybernetics and Systems, vol. 55, no. 8, pp. 2071–2092, Nov. 2024. DOI: https://doi.org/10.1080/01969722.2023.2175153

M. K. Nayak, K. Dehury, and D. Gountia, "A Hybrid Deep Learning and Blockchain Framework for Real-Time IoT DDoS Resilience," SN Computer Science, vol. 6, no. 7, Sept. 2025, Art. no. 863. DOI: https://doi.org/10.1007/s42979-025-04417-z

S. Hossain, S. M. Senouci, B. Brik, and A. Boualouache, "A privacy-preserving Self-Supervised Learning-based intrusion detection system for 5G-V2X networks," Ad Hoc Networks, vol. 166, Jan. 2025, Art. no. 103674. DOI: https://doi.org/10.1016/j.adhoc.2024.103674

J. Li et al., "A Lightweight Intrusion Detection System with Dynamic Feature Fusion Federated Learning for Vehicular Network Security," Sensors, vol. 25, no. 15, July 2025. DOI: https://doi.org/10.3390/s25154622

V. Saravanan, M. Madiajagan, S. M. Rafee, P. Sanju, T. B. Rehman, and B. Pattanaik, "IoT-based blockchain intrusion detection using optimized recurrent neural network," Multimedia Tools and Applications, vol. 83, no. 11, pp. 31505–31526, Mar. 2024. DOI: https://doi.org/10.1007/s11042-023-16662-6

S. A. Alzakari et al., "Heuristically enhanced multi-head attention based recurrent neural network for denial of wallet attacks detection on serverless computing environment," Scientific Reports, vol. 15, no. 1, Apr. 2025, Art. no. 13538. DOI: https://doi.org/10.1038/s41598-025-87636-x

A. A. Aliyu, J. Liu, and E. Gilliard, "A Decentralized and Self-Adaptive Intrusion Detection Approach Using Continuous Learning and Blockchain Technology," Journal of Data Science and Intelligent Systems, Oct. 2024. DOI: https://doi.org/10.47852/bonviewJDSIS42023803

N. Sharma and P. G. Shambharkar, "Multi-attention DeepCRNN: an efficient and explainable intrusion detection framework for Internet of Medical Things environments," Knowledge and Information Systems, vol. 67, no. 7, pp. 5783–5849, July 2025. DOI: https://doi.org/10.1007/s10115-025-02402-9

M. S. Alshehri, O. Saidani, F. S. Alrayes, S. F. Abbasi, and J. Ahmad, "A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection," IEEE Access, vol. 12, pp. 45762–45772, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3380816

A. Al Mazroa, F. R. Albogamy, M. Khairi Ishak, and S. M. Mostafa, "Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment," IEEE Access, vol. 13, pp. 11280–11294, 2025. DOI: https://doi.org/10.1109/ACCESS.2025.3526258

M. Anoop, L. W. Mary, A. J. Wilson, and W. S. Kiran, "Optimized graph transformer with molecule attention network based multi class attack detection framework for enhancing privacy and security in WSN," Multimedia Tools and Applications, vol. 84, no. 15, pp. 14273–14304, May 2025. DOI: https://doi.org/10.1007/s11042-024-19516-x

R. Shanmugavelu and V. Ravi, "Enhancing Security in Healthcare Frameworks using Optimal Deep Learning-based Attack Detection and Classification for Medical Wireless Sensor Networks," Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21197–21202, Apr. 2025. DOI: https://doi.org/10.48084/etasr.9741

D. Torre, A. Chennamaneni, J. Jo, G. Vyas, and B. Sabrsula, "Toward Enhancing Privacy Preservation of a Federated Learning CNN Intrusion Detection System in IoT: Method and Empirical Study," ACM Transactions on Software Engineering and Methodology, vol. 34, no. 2, Jan. 2025, Art. no. 53. DOI: https://doi.org/10.1145/3695998

N. Sun, W. Wang, Y. Tong, and K. Liu, "Blockchain based federated learning for intrusion detection for Internet of Things," Frontiers of Computer Science, vol. 18, no. 5, Dec. 2023, Art. no. 185328. DOI: https://doi.org/10.1007/s11704-023-3026-8

S. Jiao et al., "Foundation-Model-Based Federated Learning for Intrusion Detection in Drone-Aided Industrial IoT," IEEE Internet of Things Journal, vol. 12, no. 22, Aug. 2025, Art. no. 46889–46901. DOI: https://doi.org/10.1109/JIOT.2025.3597349

J. A. Alzubi, O. A. Alzubi, I. Qiqieh, and A. Singh, "A Blended Deep Learning Intrusion Detection Framework for Consumable Edge-Centric IoMT Industry," IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 2049–2057, Oct. 2024. DOI: https://doi.org/10.1109/TCE.2024.3350231

K. S. Sarin, R. E. Kolomnikov, M. O. Svetlakov, and I. A. Hodashinsky, "Fuzzy Min-Max Classifier in Cybersecurity Applications," Automatic Documentation and Mathematical Linguistics, vol. 58, no. 5, pp. 299–309, Oct. 2024. DOI: https://doi.org/10.3103/S0005105524700250

N. Girubagari and T. N. Ravi, "Parallel ABILSTM and CBIGRU Ensemble Network Intrusion Detection System," International Journal of Intelligent Engineering and Systems, vol. 17, no. 1, pp. 93–107, Feb. 2024. DOI: https://doi.org/10.22266/ijies2024.0229.10

K. Sarathkumar, P. Sudhakar, and A. C. Kanmani, "Enhancing intrusion detection using coati optimization algorithm with deep learning on vehicular Adhoc networks," International Journal of Information Technology, vol. 16, no. 5, pp. 3009–3018, June 2024. DOI: https://doi.org/10.1007/s41870-024-01827-9

S. R. Khonde and V. Ulagamuthalvi, "Blockchain: Secured Solution for Signature Transfer in Distributed Intrusion Detection System," Computer Systems Science and Engineering, vol. 40, no. 1, pp. 37–51, 2022. DOI: https://doi.org/10.32604/csse.2022.017130

H. Alamro et al., "Modeling of Blockchain Assisted Intrusion Detection on IoT Healthcare System Using Ant Lion Optimizer With Hybrid Deep Learning," IEEE Access, vol. 11, pp. 82199–82207, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3299589

N. Moustafa, M. Keshky, E. Debiez, and H. Janicke, "Federated TON_IoT Windows Datasets for Evaluating AI-Based Security Applications," in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, Dec. 2020, pp. 848–855. DOI: https://doi.org/10.1109/TrustCom50675.2020.00114

S. Jia et al., "CAA-RF: An Anomaly Detection Algorithm for Computing Power Blockchain Networks," Applied Sciences, vol. 15, no. 11, May 2025. DOI: https://doi.org/10.3390/app15115804

Downloads

How to Cite

[1]
C. Ananth, S. Sathiyarani, and N. Mohananthini, “A Deep Learning–Enhanced Blockchain Architecture for Intrusion Detection and Classification”, Eng. Technol. Appl. Sci. Res., vol. 16, no. 1, pp. 32009–32014, Feb. 2026.

Metrics

Abstract Views: 172
PDF Downloads: 107

Metrics Information