2022
DOI: 10.48550/arxiv.2204.09829
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks

Abbas Yazdinejad,
Ali Dehghantanha,
Reza M. Parizi
et al.

Abstract: Nowadays, blockchain-based technologies are being developed in various industries to improve data security. In the context of the Industrial Internet of Things (IIoT), a chain-based network is one of the most notable applications of blockchain technology. IIoT devices have become increasingly prevalent in our digital world, especially in support of developing smart factories. Although blockchain is a powerful tool, it is vulnerable to cyber attacks. Detecting anomalies in blockchain-based IIoT networks in smar… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…Federated Learning (FL) is used by Yazdinejad, A., and colleagues [32] to create a threat hunting system named Block Hunter, which can autonomously scour blockchain-based IoT networks for signs of intrusion. The anomaly detection in Block Hunter is performed using a federated, multi-machine learning model cluster-based architecture.…”
Section: Related Workmentioning
confidence: 99%
“…Federated Learning (FL) is used by Yazdinejad, A., and colleagues [32] to create a threat hunting system named Block Hunter, which can autonomously scour blockchain-based IoT networks for signs of intrusion. The anomaly detection in Block Hunter is performed using a federated, multi-machine learning model cluster-based architecture.…”
Section: Related Workmentioning
confidence: 99%
“…A number of research projects have been conducted using this architecture, which consists of layers called "Cloud", "Network Communication", "Edge," and "Physical". Through this architecture, IoT devices, such as sensors and actuators, as well as heterogeneous Cyber-Physical Systems (CPS), are connected and integrated with each other and with the internet [14]. In Figure 1, data is collected from IoT devices, processed and controlled, and users have access to a variety of applications.…”
Section: Introductionmentioning
confidence: 99%