Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks

Abbas Yazdinejad, Ali Dehghantanha*, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

110 Scopus citations

Abstract

Nowadays, blockchain-based technologies are being developed in various industries to improve data security. In the context of the Industrial Internet of Things (IIoT), a chain-based network is one of the most notable applications of blockchain technology. IIoT devices have become increasingly prevalent in our digital world, especially in support of developing smart factories. Although blockchain is a powerful tool, it is vulnerable to cyberattacks. Detecting anomalies in blockchain-based IIoT networks in smart factories is crucial in protecting networks and systems from unexpected attacks. In this article, we use federated learning to build a threat hunting framework called block hunter to automatically hunt for attacks in blockchain-based IIoT networks. Block hunter utilizes a cluster-based architecture for anomaly detection combined with several machine learning models in a federated environment. To the best of our knowledge, block hunter is the first federated threat hunting model in IIoT networks that identifies anomalous behavior while preserving privacy. Our results prove the efficiency of the block hunter in detecting anomalous activities with high accuracy and minimum required bandwidth.

Original languageEnglish
Pages (from-to)8356-8366
Number of pages11
JournalIEEE Transactions on Industrial Informatics
Volume18
Issue number11
DOIs
StatePublished - 1 Nov 2022

Bibliographical note

Publisher Copyright:
© 2005-2012 IEEE.

Keywords

  • Anomaly detection
  • Internet of Thing (IoT)
  • blockchain
  • federated learning (FL)
  • industrial Internet of Things (IIoT)
  • threat hunting

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Information Systems
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks'. Together they form a unique fingerprint.

Cite this