Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop

As the field of cybersecurity has experienced continual changes, up-to-date techniques have become increasingly necessary to analyze and defend against threats. Furthermore, the current methods consistently produce false alarms and sometimes completely miss real threats. This paper proposes an appro...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, Heba M. Khater
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10870178/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:As the field of cybersecurity has experienced continual changes, up-to-date techniques have become increasingly necessary to analyze and defend against threats. Furthermore, the current methods consistently produce false alarms and sometimes completely miss real threats. This paper proposes an approach that integrates secure blockchain technology with data preprocessing, deep learning, and reinforcement learning to enhance threat detection and response capabilities. To secure the exchange of threat intelligence information, a safe blockchain network is used, which comprises Byzantine Fault Tolerance for high data integrity and Zero-Knowledge Proofs for access control. All relevant information is cleaned and standardized prior to analysis. Subsequently, graph convolutional neural networks with autoencoders are trained on large unlabeled sets of threat data to automatically label various types of threats, with the system employing fuzzy logic to rank and score possible threats. Furthermore, we implemented a feedback loop that incorporates reinforcement learning, thereby improving model performance over time according to guidance provided by cybersecurity specialists. The proposed system achieved high accuracy, precision, negative predictive value, and MCC, as well as notably low FPR and FNR values. The results establish that the proposed system is a reliable and effective measure for detecting cyberthreats.
ISSN:2169-3536