{"title":"Optimizing Blockchain Communication Systems Security With Deep Logic Sparse Autoencoder and Kookaburra Search–Based Intrusion Detection","authors":"Rakan A. Alsowail","doi":"10.1002/dac.70071","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Recently, the rapid expansion of blockchain technology has sparked a transformative wave across various sectors, prominently impacting cybersecurity. This paper introduces a pioneering intrusion detection model, the deep logic sparse autoencoder–based kookaburra search (DLSA-KS) algorithm. This innovative approach amalgamates advanced deep learning capabilities with an efficient initial search strategy, significantly enhancing the identification and mitigation of malicious activities within digital environments. The initial phase involves gathering input data from diverse datasets, including the Malware Executable Detection dataset, KDD Cup 1999 dataset, NSL-KDD dataset, Bot-IoT dataset, and UNSW-NB15 dataset. These datasets serve as foundational resources for training and evaluating the DLSA-KS model, ensuring its efficacy across varied cyber threat scenarios. This integration not only bolsters security but also enhances scalability and real-time detection capabilities, crucial for managing the voluminous data dynamics inherent in blockchain ecosystems. Moreover, the DLSA-KS model exhibits remarkable flexibility and optimization abilities, adapting proficiently to diverse network conditions. This adaptability contributes significantly to its overall performance, enabling robust intrusion detection across a spectrum of operational environments. In addition to this, the proposed DLSA-KS approach is evaluated across multiple performance metrics, including accuracy rate, detection rate, error rate, precision, and F-measure. The findings unequivocally demonstrate the model's superiority over existing methodologies, achieving exceptional metrics such as an accuracy rate of 98.7%, detection rate of 99.2%, error rate of 3%, precision of 97.8%, and F-measure of 98.7%. Thus, the results underscore the efficacy of the DLSA-KS algorithm in effectively detecting and mitigating intrusions, thereby affirming its potential as a pivotal advancement in cybersecurity defenses.</p>\n </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/dac.70071","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Recently, the rapid expansion of blockchain technology has sparked a transformative wave across various sectors, prominently impacting cybersecurity. This paper introduces a pioneering intrusion detection model, the deep logic sparse autoencoder–based kookaburra search (DLSA-KS) algorithm. This innovative approach amalgamates advanced deep learning capabilities with an efficient initial search strategy, significantly enhancing the identification and mitigation of malicious activities within digital environments. The initial phase involves gathering input data from diverse datasets, including the Malware Executable Detection dataset, KDD Cup 1999 dataset, NSL-KDD dataset, Bot-IoT dataset, and UNSW-NB15 dataset. These datasets serve as foundational resources for training and evaluating the DLSA-KS model, ensuring its efficacy across varied cyber threat scenarios. This integration not only bolsters security but also enhances scalability and real-time detection capabilities, crucial for managing the voluminous data dynamics inherent in blockchain ecosystems. Moreover, the DLSA-KS model exhibits remarkable flexibility and optimization abilities, adapting proficiently to diverse network conditions. This adaptability contributes significantly to its overall performance, enabling robust intrusion detection across a spectrum of operational environments. In addition to this, the proposed DLSA-KS approach is evaluated across multiple performance metrics, including accuracy rate, detection rate, error rate, precision, and F-measure. The findings unequivocally demonstrate the model's superiority over existing methodologies, achieving exceptional metrics such as an accuracy rate of 98.7%, detection rate of 99.2%, error rate of 3%, precision of 97.8%, and F-measure of 98.7%. Thus, the results underscore the efficacy of the DLSA-KS algorithm in effectively detecting and mitigating intrusions, thereby affirming its potential as a pivotal advancement in cybersecurity defenses.
期刊介绍:
The International Journal of Communication Systems provides a forum for R&D, open to researchers from all types of institutions and organisations worldwide, aimed at the increasingly important area of communication technology. The Journal''s emphasis is particularly on the issues impacting behaviour at the system, service and management levels. Published twelve times a year, it provides coverage of advances that have a significant potential to impact the immense technical and commercial opportunities in the communications sector. The International Journal of Communication Systems strives to select a balance of contributions that promotes technical innovation allied to practical relevance across the range of system types and issues.
The Journal addresses both public communication systems (Telecommunication, mobile, Internet, and Cable TV) and private systems (Intranets, enterprise networks, LANs, MANs, WANs). The following key areas and issues are regularly covered:
-Transmission/Switching/Distribution technologies (ATM, SDH, TCP/IP, routers, DSL, cable modems, VoD, VoIP, WDM, etc.)
-System control, network/service management
-Network and Internet protocols and standards
-Client-server, distributed and Web-based communication systems
-Broadband and multimedia systems and applications, with a focus on increased service variety and interactivity
-Trials of advanced systems and services; their implementation and evaluation
-Novel concepts and improvements in technique; their theoretical basis and performance analysis using measurement/testing, modelling and simulation
-Performance evaluation issues and methods.