A Deep Learning–Enhanced Blockchain Architecture for Intrusion Detection and Classification
Received: 13 October 2025 | Revised: 28 October 2025, 10 November 2025, and 27 November 2025 | Accepted: 29 November 2025 | Online: 27 December 2025
Corresponding author: S. Sathiyarani
Abstract
An Intrusion Detection System (IDS) is a significant cybersecurity process that comprises network traffic monitoring for malicious activity and taking appropriate protective actions. However, inadequate training data or inappropriately selected thresholds often restrict the performance of these systems, leading to low detection rates. Blockchain (BC) technology can offer a secure, decentralized, and immutable ledger to monitor suspicious activities over time and classify intrusions globally. Integrating advanced Deep Learning (DL) and BC improves detection and overall security. The decentralized nature of BC eliminates single points of failure. DL can efficiently detect patterns and anomalies, mitigating false alerts, and when integrated with public BC, it ensures secure, transparent, and tamper-proof storage of intrusion data. This study presents a BC-assisted Coati Optimization Algorithm (COA) with DL for Intrusion Detection and Classification (BCOADL-IDC) method, using the BC architecture to ensure data integrity and immutability. Initially, min-max normalization is applied to scale the input data. Then, an Attention-based Bidirectional Recurrent Neural Network (ABiRNN) model is utilized for intrusion detection. COA is used to fine-tune the crucial parameters of the ABiRNN model to improve detection performance. Finally, the integration of BC helps to ensure the integrity of the detection results, prevent tampering, and provide a transparent and secure record of network actions. The comparative study of the BCOADL-IDC approach showed a higher accuracy of 98.79% over existing models on the ToN_IoT dataset.
Keywords:
blockchain, deep learning, security, coati optimization algorithm, intrusion detection, cybersecurityDownloads
References
A. A. Aliyu, M. Ibrahim, and S. Abdulkadir, "A Blockchain Enhanced Deep Learning Approach for Intrusion Detection in Trusted Execution Environments," Digital Technologies Research and Applications, vol. 4, no. 1, pp. 135–157, June 2025. DOI: https://doi.org/10.54963/dtra.v4i1.962
M. Mounir, S. G. Sayed, and M. M. E. El-Dakroury, "Securing the Future: Real-Time intrusion Detection in IIoT Smart Grids through Innovative AI Solutions," Journal of Cybersecurity and Information Management, vol. 15, no. 2, pp. 208–244, 2025. DOI: https://doi.org/10.54216/JCIM.150216
S. R. Addula, A. K. Tyagi, K. Naithani, and S. Kumari, "Blockchain-Empowered Internet of Things (IoTs) Platforms for Automation in Various Sectors," in Artificial Intelligence-Enabled Digital Twin for Smart Manufacturing, John Wiley & Sons, 2024, pp. 443–477. DOI: https://doi.org/10.1002/9781394303601.ch20
Z. Wang, J. Wang, Y. Liu, X. Yang, F. Qi, and W. Song, "Privacy-Preserving Attribute-Based Access Control Scheme With Intrusion Detection and Policy Hiding for Data Sharing in VANET," IEEE Internet of Things Journal, vol. 11, no. 13, pp. 23348–23369, July 2024. DOI: https://doi.org/10.1109/JIOT.2024.3384753
R. K. Mahendran, A. Khan, F. Ullah, F. Ali, and A. A. AlZubi, "PRISM-IIoT: A holistic approach for privacy preservation in industrial IoT using advanced cryptography and blockchain-enabled auditability framework," Alexandria Engineering Journal, vol. 128, pp. 816–832, Sept. 2025. DOI: https://doi.org/10.1016/j.aej.2025.07.027
S. R. Khonde and V. Ulagamuthalvi, "Hybrid intrusion detection system using blockchain framework," EURASIP Journal on Wireless Communications and Networking, vol. 2022, no. 1, June 2022, Art. no. 58. DOI: https://doi.org/10.1186/s13638-022-02089-4
N. Kumaran and S. J. S. Mohan, "BRDO: Blockchain Assisted Intrusion Detection Using Optimized Deep Stacked Network," Cybernetics and Systems, vol. 55, no. 8, pp. 2071–2092, Nov. 2024. DOI: https://doi.org/10.1080/01969722.2023.2175153
M. K. Nayak, K. Dehury, and D. Gountia, "A Hybrid Deep Learning and Blockchain Framework for Real-Time IoT DDoS Resilience," SN Computer Science, vol. 6, no. 7, Sept. 2025, Art. no. 863. DOI: https://doi.org/10.1007/s42979-025-04417-z
S. Hossain, S. M. Senouci, B. Brik, and A. Boualouache, "A privacy-preserving Self-Supervised Learning-based intrusion detection system for 5G-V2X networks," Ad Hoc Networks, vol. 166, Jan. 2025, Art. no. 103674. DOI: https://doi.org/10.1016/j.adhoc.2024.103674
J. Li et al., "A Lightweight Intrusion Detection System with Dynamic Feature Fusion Federated Learning for Vehicular Network Security," Sensors, vol. 25, no. 15, July 2025. DOI: https://doi.org/10.3390/s25154622
V. Saravanan, M. Madiajagan, S. M. Rafee, P. Sanju, T. B. Rehman, and B. Pattanaik, "IoT-based blockchain intrusion detection using optimized recurrent neural network," Multimedia Tools and Applications, vol. 83, no. 11, pp. 31505–31526, Mar. 2024. DOI: https://doi.org/10.1007/s11042-023-16662-6
S. A. Alzakari et al., "Heuristically enhanced multi-head attention based recurrent neural network for denial of wallet attacks detection on serverless computing environment," Scientific Reports, vol. 15, no. 1, Apr. 2025, Art. no. 13538. DOI: https://doi.org/10.1038/s41598-025-87636-x
A. A. Aliyu, J. Liu, and E. Gilliard, "A Decentralized and Self-Adaptive Intrusion Detection Approach Using Continuous Learning and Blockchain Technology," Journal of Data Science and Intelligent Systems, Oct. 2024. DOI: https://doi.org/10.47852/bonviewJDSIS42023803
N. Sharma and P. G. Shambharkar, "Multi-attention DeepCRNN: an efficient and explainable intrusion detection framework for Internet of Medical Things environments," Knowledge and Information Systems, vol. 67, no. 7, pp. 5783–5849, July 2025. DOI: https://doi.org/10.1007/s10115-025-02402-9
M. S. Alshehri, O. Saidani, F. S. Alrayes, S. F. Abbasi, and J. Ahmad, "A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection," IEEE Access, vol. 12, pp. 45762–45772, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3380816
A. Al Mazroa, F. R. Albogamy, M. Khairi Ishak, and S. M. Mostafa, "Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment," IEEE Access, vol. 13, pp. 11280–11294, 2025. DOI: https://doi.org/10.1109/ACCESS.2025.3526258
M. Anoop, L. W. Mary, A. J. Wilson, and W. S. Kiran, "Optimized graph transformer with molecule attention network based multi class attack detection framework for enhancing privacy and security in WSN," Multimedia Tools and Applications, vol. 84, no. 15, pp. 14273–14304, May 2025. DOI: https://doi.org/10.1007/s11042-024-19516-x
R. Shanmugavelu and V. Ravi, "Enhancing Security in Healthcare Frameworks using Optimal Deep Learning-based Attack Detection and Classification for Medical Wireless Sensor Networks," Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21197–21202, Apr. 2025. DOI: https://doi.org/10.48084/etasr.9741
D. Torre, A. Chennamaneni, J. Jo, G. Vyas, and B. Sabrsula, "Toward Enhancing Privacy Preservation of a Federated Learning CNN Intrusion Detection System in IoT: Method and Empirical Study," ACM Transactions on Software Engineering and Methodology, vol. 34, no. 2, Jan. 2025, Art. no. 53. DOI: https://doi.org/10.1145/3695998
N. Sun, W. Wang, Y. Tong, and K. Liu, "Blockchain based federated learning for intrusion detection for Internet of Things," Frontiers of Computer Science, vol. 18, no. 5, Dec. 2023, Art. no. 185328. DOI: https://doi.org/10.1007/s11704-023-3026-8
S. Jiao et al., "Foundation-Model-Based Federated Learning for Intrusion Detection in Drone-Aided Industrial IoT," IEEE Internet of Things Journal, vol. 12, no. 22, Aug. 2025, Art. no. 46889–46901. DOI: https://doi.org/10.1109/JIOT.2025.3597349
J. A. Alzubi, O. A. Alzubi, I. Qiqieh, and A. Singh, "A Blended Deep Learning Intrusion Detection Framework for Consumable Edge-Centric IoMT Industry," IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 2049–2057, Oct. 2024. DOI: https://doi.org/10.1109/TCE.2024.3350231
K. S. Sarin, R. E. Kolomnikov, M. O. Svetlakov, and I. A. Hodashinsky, "Fuzzy Min-Max Classifier in Cybersecurity Applications," Automatic Documentation and Mathematical Linguistics, vol. 58, no. 5, pp. 299–309, Oct. 2024. DOI: https://doi.org/10.3103/S0005105524700250
N. Girubagari and T. N. Ravi, "Parallel ABILSTM and CBIGRU Ensemble Network Intrusion Detection System," International Journal of Intelligent Engineering and Systems, vol. 17, no. 1, pp. 93–107, Feb. 2024. DOI: https://doi.org/10.22266/ijies2024.0229.10
K. Sarathkumar, P. Sudhakar, and A. C. Kanmani, "Enhancing intrusion detection using coati optimization algorithm with deep learning on vehicular Adhoc networks," International Journal of Information Technology, vol. 16, no. 5, pp. 3009–3018, June 2024. DOI: https://doi.org/10.1007/s41870-024-01827-9
S. R. Khonde and V. Ulagamuthalvi, "Blockchain: Secured Solution for Signature Transfer in Distributed Intrusion Detection System," Computer Systems Science and Engineering, vol. 40, no. 1, pp. 37–51, 2022. DOI: https://doi.org/10.32604/csse.2022.017130
H. Alamro et al., "Modeling of Blockchain Assisted Intrusion Detection on IoT Healthcare System Using Ant Lion Optimizer With Hybrid Deep Learning," IEEE Access, vol. 11, pp. 82199–82207, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3299589
N. Moustafa, M. Keshky, E. Debiez, and H. Janicke, "Federated TON_IoT Windows Datasets for Evaluating AI-Based Security Applications," in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, Dec. 2020, pp. 848–855. DOI: https://doi.org/10.1109/TrustCom50675.2020.00114
S. Jia et al., "CAA-RF: An Anomaly Detection Algorithm for Computing Power Blockchain Networks," Applied Sciences, vol. 15, no. 11, May 2025. DOI: https://doi.org/10.3390/app15115804
Downloads
How to Cite
License
Copyright (c) 2025 C. Ananth, S. Sathiyarani, N. Mohananthini

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
