CyberNFTs: Conceptualizing a decentralized and reward-driven intrusion detection system with ML

Synim Selimi,Blerim Rexha,Kamer Vishi
DOI: https://doi.org/10.1504/IJICS.2023.133385
2024-09-01
Abstract:The rapid evolution of the Internet, particularly the emergence of Web3, has transformed the ways people interact and share data. Web3, although still not well defined, is thought to be a return to the decentralization of corporations' power over user data. Despite the obsolescence of the idea of building systems to detect and prevent cyber intrusions, this is still a topic of interest. This paper proposes a novel conceptual approach for implementing decentralized collaborative intrusion detection networks (CIDN) through a proof-of-concept. The study employs an analytical and comparative methodology, examining the synergy between cutting-edge Web3 technologies and information security. The proposed model incorporates blockchain concepts, cyber non-fungible token (cyberNFT) rewards, machine learning algorithms, and publish/subscribe architectures. Finally, the paper discusses the strengths and limitations of the proposed system, offering insights into the potential of decentralized cybersecurity models.
Cryptography and Security,Artificial Intelligence,Machine Learning
What problem does this paper attempt to address?
### Problems Addressed by the Paper This paper aims to address the following issues: 1. **Decentralization and Collaboration of Network Intrusion Detection Systems (IDS)**: - Although current intrusion detection systems are continuously evolving, their complexity makes research insufficient, especially in behavior pattern recognition, automated detection, and prevention. Therefore, this paper proposes a new conceptual approach that utilizes blockchain technology and machine learning algorithms to achieve a decentralized collaborative intrusion detection network (CIDN). 2. **Application of Web3 Technology**: - With the development of Web3 technology, especially the emergence of decentralized finance (DeFi) and non-fungible tokens (NFTs), how these technologies can be applied in the field of network security is a topic worth exploring. The paper attempts to integrate these Web3 technologies into modern intrusion detection systems and explore their potential and limitations. 3. **Challenges of Automation Capabilities and Autonomous Systems**: - By simulating an autonomous system, identifying its applicability challenges, and its differences from existing outdated or traditional systems. This simulation helps to understand the advantages and limitations of decentralized systems in practical applications. ### Research Methods and Discussion The research methods of the paper are divided into four main parts: 1. **Analyzing the Working Principles of Current IDS**: Focusing on its integration with blockchain and machine learning. 2. **Developing and Integrating Software Solutions**: Integrating these solutions into CIDN. 3. **Testing and Evaluating the Working of CIDN**: Conducting case studies. 4. **Analyzing and Comparing the System and Its Features**: Comparing with existing systems. ### Main Contributions - Proposed a decentralized intrusion detection system architecture based on blockchain and machine learning. - Utilized the CyberNFT reward mechanism to incentivize the discovery of intrusions. - Explored the potential application of decentralized technology in the field of network security.