<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="review-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CSSE</journal-id>
<journal-id journal-id-type="nlm-ta">CSSE</journal-id>
<journal-id journal-id-type="publisher-id">CSSE</journal-id>
<journal-title-group>
<journal-title>Computer Systems Science &#x0026; Engineering</journal-title>
</journal-title-group><issn pub-type="ppub">0267-6192</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">17941</article-id>
<article-id pub-id-type="doi">10.32604/csse.2022.017941</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Review</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges</article-title>
<alt-title alt-title-type="left-running-head">Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges</alt-title>
<alt-title alt-title-type="right-running-head">Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author">
<name name-style="western">
<surname>Al-E&#x2019;mari</surname>
<given-names>Salam</given-names>
</name>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
<contrib id="author-2" contrib-type="author" corresp="yes">
<name name-style="western">
<surname>Anbar</surname>
<given-names>Mohammed</given-names>
</name>
<xref ref-type="aff" rid="aff-1">1</xref>
<email>Anbar@usm.my</email>
</contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western">
<surname>Sanjalawe</surname>
<given-names>Yousef</given-names>
</name>
<xref ref-type="aff" rid="aff-1">1</xref>
<xref ref-type="aff" rid="aff-2">2</xref>
</contrib>
<contrib id="author-4" contrib-type="author">
<name name-style="western">
<surname>Manickam</surname>
<given-names>Selvakumar</given-names>
</name>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
<contrib id="author-5" contrib-type="author">
<name name-style="western">
<surname>Hasbullah</surname>
<given-names>Iznan</given-names>
</name>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
<aff id="aff-1">
<label>1</label><institution>National Advanced IPv6 Centre of Excellence (NAv6), Universiti Sains Malaysia</institution>, <addr-line>11800 USM, Penang</addr-line>, <country>Malaysia</country></aff>
<aff id="aff-2">
<label>2</label><institution>Computer Sciences Department, Northern Border University (NBU)</institution>, <addr-line>9280 NBU, Ar&#x2019;ar</addr-line>, <country>the Kingdom of Saudi Arabia</country></aff>
</contrib-group><author-notes><corresp id="cor1">&#x002A;Corresponding Author: Mohammed Anbar. Email: <email>Anbar@usm.my</email></corresp></author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2021-08-12">
<day>12</day>
<month>8</month>
<year>2021</year>
</pub-date>
<volume>40</volume>
<issue>1</issue>
<fpage>87</fpage>
<lpage>112</lpage>
<history>
<date date-type="received">
<day>18</day>
<month>2</month>
<year>2021</year>
</date>
<date date-type="accepted">
<day>18</day>
<month>4</month>
<year>2021</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2022 Al-E&#x2019;mari et al.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Al-E&#x2019;mari et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CSSE_17941.pdf"></self-uri>
<abstract>
<p>Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security&#x2019;s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Blockchain</kwd>
<kwd>intrusion detection system</kwd>
<kwd>network security</kwd>
<kwd>malicious attacks</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>Blockchain is an emerging technology that underlies the infrastructure of Bitcoin. In 2008, Nakamoto discovered blockchain&#x2019;s potential to be used in other domains, thus making Bitcoin the first of blockchain&#x2019;s many implementations. Blockchain technology has been increasingly used in different fields, especially in the security field, which has an important presence in different network environments, such as traditional networks, the Internet of Things (IoT), and cloud computing. Blockchain technology has many features that may enhance network security. Its most important feature is that it works with decentralized and distributed environments; therefore, it does not need a trusted third party to manage the network. Blockchain technology has been applied to cryptocurrency networks, wherein the blockchain provides cryptocurrency its basic infrastructure, which allows financial operations to be performed in a secure manner and be distributed within networks.</p>
<p>Currently, there are many different types of digital currencies, such as Bitcoin, Litecoin, Ethereum, and Ripple, which have been built into a new durable ecosystem and may be integrated with different network types. Recently, these network environments have been suffering from a critical challenge related to detecting attacks because different types of cyberattacks rely on the complexity of the networks&#x2019; infrastructure. Therefore, traditional intrusion detection systems (IDSs) are unable to detect blockchain-related attacks. Researchers thus intend to use blockchain technology to enhance IDSs and improve attack detection.</p>
<p>The main contribution of this paper is to provide a comprehensive analysis of blockchain-based IDSs. This review will accomplish the following:<list list-type="bullet"><list-item>
<p>Present an overview of blockchain technology and its importance, and introduce the advantages of and threats to blockchain;</p></list-item><list-item>
<p>Discuss and analyze existing blockchain-based IDSs to provide a clear analysis of the current works conducted in this field;</p></list-item><list-item>
<p>Compare and analyze the proposed techniques to highlight current research gaps;</p></list-item><list-item>
<p>Provide future research directions and open research issues concerning IDSs based on blockchain.</p></list-item></list></p>
<p>This review is scientifically significant because it allows researchers to analyze blockchain&#x2019;s role in IDSs by providing them with a clear view of the advantages, threats, and opportunities that result from using blockchain in IDSs.</p>
<p>This review is organized as follows. Section 2 provides a comparison with existing reviews in the same field, Section 3 presents an overview of the structure, basic applications, and characteristics of blockchain, Section 4 presents an overview of IDS types, techniques, performance measurements of IDS, Related models of IDSs based on blockchain are discussed in Section 5; Future research directions are presented in Section 6, and Section 7 concludes this review.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Comparison with Exiting Reviews</title>
<p>Some reviews have been conducted to address security issues in IDSs using blockchain technology. For instance, Kolekar et al. [<xref ref-type="bibr" rid="ref-1">1</xref>] conducted an overview of blockchain technology and IDS showing the integration between blockchain and IDS. Meanwhile, Shreevyas et al. [<xref ref-type="bibr" rid="ref-2">2</xref>] discussed the usage of blockchain in IDSs as a trusted technique used to detect cyberattacks. In addition, Meng et al. [<xref ref-type="bibr" rid="ref-3">3</xref>] discussed the usage of blockchain technology in a collaborative IDS. This review presented a general background of blockchain technology and IDSs and discussed the challenges of using blockchain-based IDS. Lastly, this review concluded that blockchain technology cannot handle all IDS issues.</p>
<p>Furthermore, Wang et al. [<xref ref-type="bibr" rid="ref-4">4</xref>] conducted a review to discuss the role of blockchain technology in IoT applications; they focused on blockchain-based IoT applications, and compared them. Khan et al. [<xref ref-type="bibr" rid="ref-5">5</xref>] reviewed IoT security limitations and discussed blockchain technology as a potential emerging for solving security issues in IoT architecture. Other similar surveys have investigated the impact of using blockchain-based IDS in the IoT [<xref ref-type="bibr" rid="ref-6">6</xref>,<xref ref-type="bibr" rid="ref-7">7</xref>]; they summarized existing research security challenges that IoT architecture and blockchain-based Internet services suffer from. A more elaborate survey was presented by Sengupta et al. [<xref ref-type="bibr" rid="ref-8">8</xref>] to determine how blockchain technology handles security challenges effectively in the IoT and Industrial Internet of Things. Ultimately, the majority of existing reviews focus on the challenges or advantages of using blockchain technology in the security field [<xref ref-type="bibr" rid="ref-9">9</xref>].</p>
<p>To summarize and illustrate how the present review is different from the existing reviews, <xref ref-type="table" rid="table-1">Tab. 1</xref> presents a comparison of discussed topics. At the time of writing this review and according to the comparative analysis conducted in <xref ref-type="table" rid="table-1">Tab. 1</xref>, there is no comprehensive review highlighting a taxonomy of blockchain-based IDS, challenges, results, applications, and research trends. We can also find that the present review is more universal than former related reviews conducted in the same area.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Comparison with several existing reviews</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Ref. ofreview</th>
<th>Blockchainreview</th>
<th>IDS review</th>
<th>Criteria-basedtaxonomy</th>
<th>Analysis ofmodels</th>
<th>Researchissues</th>
<th>Comparison withprior reviews</th>
</tr>
</thead>
<tbody>
<tr>
<td>[<xref ref-type="bibr" rid="ref-2">2</xref>]</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x2713;</td>
<td>&#x00D7;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-3">3</xref>]</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x2713;</td>
<td>&#x00D7;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-4">4</xref>]</td>
<td>&#x2713;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x2713;</td>
<td>&#x00D7;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-5">5</xref>]</td>
<td>&#x2713;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x2713;</td>
<td>&#x00D7;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-6">6</xref>]</td>
<td>&#x2713;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x2713;</td>
<td>&#x00D7;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-7">7</xref>]</td>
<td>&#x2713;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x2713;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-8">8</xref>]</td>
<td>&#x2713;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-9">9</xref>]</td>
<td>&#x2713;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
<td>&#x00D7;</td>
</tr>
<tr>
<td>Proposed review</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
<td>&#x2713;</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s3">
<label>3</label>
<title>Overview of Blockchain</title>
<p>As aforementioned, blockchain technology was introduced by Nakamoto in 2008 as an underlying technology for Bitcoin to record all transactions of Bitcoin and to create security against potential attacks [<xref ref-type="bibr" rid="ref-10">10</xref>]. <xref ref-type="fig" rid="fig-1">Fig. 1</xref> presents blockchain&#x2019;s roadmap from 2008 to 2019. Bitcoin&#x2019;s initial infrastructure based on blockchain technology appeared in 2009 over a peer-to-peer (P2P) network, which is called the Bitcoin network. Since then, cryptocurrencies have gained worldwide attention, and researchers have harnessed and applied blockchain technology to domains, such as smart contracts and supply chain management. This evolution has occurred because blockchain is autonomous, distributed, immutable, and contractual [<xref ref-type="bibr" rid="ref-11">11</xref>,<xref ref-type="bibr" rid="ref-12">12</xref>].</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Roadmap of blockchain technology</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_17941-fig-1.png"/>
</fig>
<sec id="s3_1">
<label>3.1</label>
<title>Blockchain Structure</title>
<p>A blockchain is a linked-data structure wherein each block has two main sections: a header and body. The header section consists of a nonce, a previous hash, a Merkle root hash, a timestamp, and a difficulty target. The body section contains a list of transactions. <xref ref-type="fig" rid="fig-2">Fig. 2</xref> presents the structure of a blockchain. The first block is always called a genesis, all blocks are linked together via cryptography, and blocks are distributed between nodes over a network [<xref ref-type="bibr" rid="ref-12">12</xref>].</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Blockchain structure</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_17941-fig-2.png"/>
</fig>
<p>Furthermore, to adhere to the rules of blockchain technology, all nodes in the blockchain network must have the same block list, which is presented in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>. When a new block is added, it broadcasts to all nodes in the network. Each node verifies the new block through a consensus mechanism that confirms a transaction in the block. There are various consensus algorithms to ensure that all nodes have the same blockchain list, such as proof of work and proof of stake [<xref ref-type="bibr" rid="ref-13">13</xref>,<xref ref-type="bibr" rid="ref-14">14</xref>].</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Over P2P network</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_17941-fig-3.png"/>
</fig>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Basic Principles of Blockchain Technology</title>
<p>There are many principles of blockchain technology that are applied to three main layers: the network, data, and application layers. First, the network layer is compatible with the P2P network architecture, which supports decentralized connections and distributed network mechanisms. The network layer is responsible for forwarding and verifying data between nodes. In addition, blockchain technology stores the same chain in all nodes over a network; thus, all nodes are synchronized. Therefore, when a new block is generated, it is then verified by a consensus algorithm. If the new block is valid, then it broadcasts to all other nodes. Otherwise, it is discarded. In addition, there are several types of consensus algorithms that all operate on two principles: (i) the freshness principle achieves fair competition through fresh resources for each new block that is added, and (ii) the unpredictability principle prevents any participant from predicting which node will create a new block. <xref ref-type="table" rid="table-2">Tab. 2</xref> illustrates some of the consensus algorithms that are used in blockchain networks [<xref ref-type="bibr" rid="ref-15">15</xref>,<xref ref-type="bibr" rid="ref-16">16</xref>].</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Examples of consensus algorithms</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Algorithm</th>
<th>Description</th>
<th>Advantage</th>
<th>Disadvantage</th>
</tr>
</thead>
<tbody>
<tr>
<td>Proof-of-Work (PoW)</td>
<td>PoW is widely used in blockchain verification to validate data in complex mathematical computation. The first node solves the crypto puzzle, then it adds a new block that will be verified later, by using existing-verified nodes in the network.</td>
<td>Verification technique for PoW is extremely efficient</td>
<td>High power consumption</td>
</tr>
<tr>
<td>Proof-of-Stake(PoS)</td>
<td>PoS selects participants based on their stake cryptocurrency</td>
<td>It reduces energy consumption in PoW, and it is efficient for large-scale networks.</td>
<td>It suffers from DoS attack, and there is a lack of synchronization between participants.</td>
</tr>
<tr>
<td>Proof-of-Elapsed time (PoET)</td>
<td>Randomly, it generates waiting time slots for each participant, while user who has a less waiting time will be added into a new block.</td>
<td>It consumes less energy than PoW. Also, it ensures freshness and unpredictability principles.</td>
<td>It does not indicate how the algorithm can solve the conflict. Also, its voting approach is very complicated.</td>
</tr>
<tr>
<td>Proof-of-Space (PoSp)</td>
<td>A verifier requests from the prover to reserves a disk-space to store necessary information, then a prover sends to the verifier to ensure reserving that disk-space.</td>
<td>It reduces power consumption, which makes it more difficult for malicious participants to join network.</td>
<td>Producing a new block is difficult; therefore, it is challenging in solving the distributed consensus problem.</td>
</tr>
<tr>
<td>Practical Byzantine Fault Tolerance (PBFT)</td>
<td>There are three sequential steps required to add a new block to chain successfully, namely: (i) new round, (ii) prepare, and (iii) commit, where each step is executed after getting two- thirds voting from nodes in the network.</td>
<td>It can handle a third pernicious network.<break/>No need for the miner; thus, it reduces energy consumption efficiently.</td>
<td>The node cannot join network before verifying it by the whole network.</td>
</tr>
<tr>
<td>Ripple</td>
<td>Participants either server or clients in the network. Client transfers transaction, where the server has a unique node list that calculates the percentage of agreement, if it reaches 80% then the transaction will be added into a ledger.</td>
<td>If value of unique node list is less than 20%, then it maintains the network from invalid nodes. It has no miner; therefore, it reduces energy consumption efficiently.</td>
<td>It does not deal with transactional anonymity.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Second, the data layer presents the data structure of the block. Blocks contain data or transactions that do not exceed several megabytes in size. Each block is linked together by a previous hash field through a miner. When a block solves a cryptographic puzzle and obtains the previous hash, a new block is appended to the end of the chain. Furthermore, each block has several fields, which are described in <xref ref-type="table" rid="table-3">Tab. 3</xref>. The data layer also concerns user authentication and transaction encryption. Each user has a public key to validate authentications, and this key is visible to anyone in the blockchain network. Digital signatures are used to verify miners&#x2019; transactions, and all validated transactions are kept in a public ledger [<xref ref-type="bibr" rid="ref-12">12</xref>,<xref ref-type="bibr" rid="ref-17">17</xref>].</p>
<p>Finally, the application layer is responsible for interacting with users, whether they are programmers or end-users. The application layer can be classified into two different layers. The first layer is meant for developers to build and test the application&#x2019;s code and is called the fabric layer. The second layer is the application layer, which allows end-users who use applications as a black box to perform specific tasks without knowing the details of the code [<xref ref-type="bibr" rid="ref-18">18</xref>].</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Fields of block structure in blockchain</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Field</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Version</td>
<td>It is the identification rules used by the protocol.</td>
</tr>
<tr>
<td>Timestamp</td>
<td>It records the time required for creating a block, and it is used for ensuring the traceability. </td>
</tr>
<tr>
<td>Previous Hash</td>
<td>It indicates the previous block used for linking the current block with the chain.</td>
</tr>
<tr>
<td>Target (nBit)</td>
<td>It is used by consensus algorithms to define the difficulty level of their mechanism.</td>
</tr>
<tr>
<td>Nonce</td>
<td>It is calculated by the miner to generate a hash block, while it should be a unique number and leading by zeros.</td>
</tr>
<tr>
<td>Merkle Root</td>
<td>It includes all hashes values of legitimate transactions.</td>
</tr>
<tr>
<td>Hash</td>
<td>Hashing transaction occurs by Merkel tree, where each node is related with its parent node; therefore, if the transaction is modified, then it will affect all hash tree from the leaf node to the Merkle root, respectively.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>Blockchain&#x2019;s Applications</title>
<p>As shown in <xref ref-type="fig" rid="fig-4">Fig. 4</xref>, numerous industry sectors have used blockchain technology: the financial, healthcare, and cybersecurity sectors, and more [<xref ref-type="bibr" rid="ref-19">19</xref>,<xref ref-type="bibr" rid="ref-20">20</xref>]. Blockchain&#x2019;s features are what make blockchain a charming technology for industries and researchers. Initially, blockchain was applied in the financial field to manage transactions directly between financial institutions without any intermediaries. Therefore, blockchain can enhance business interactions and operational procedures.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Blockchain applications<xref ref-type="fn" rid="fn-1"><sup>1</sup></xref></title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_17941-fig-4.png"/>
</fig>
<p><italic>Financial Applications:</italic> The initial use for blockchain was in cryptocurrency to provide cheaper, faster, more flexible, and more secure payment services than existing international payment methods [<xref ref-type="bibr" rid="ref-21">21</xref>]. In 2016, Bitcoin&#x2019;s capital market reached 10 billion dollars without the need for third parties, and all of its transactions were stored in a secure manner [<xref ref-type="bibr" rid="ref-15">15</xref>]. Therefore, there are several applications for blockchain to develop financial services and support digital currency investments.</p>
<p><italic>Healthcare Applications:</italic> Blockchain technology offers the healthcare management system a way to store and process medical records over a network without disclosing patients&#x2019; privacy or being modified by cyberattacks. Furthermore, it ensures data integrity and medical record accountability [<xref ref-type="bibr" rid="ref-22">22</xref>]. Blockchain technology provides several other potential benefits for healthcare systems, such as decentralization, health data ownership, and robustness. However, a blockchain-based healthcare management system would need to be developed. For instance, developing blockchain-based electronic medical records means that health or personal records would need to be shared over a network. Smart contracts have been found to be suitable for storing and managing medical records as they ensure security and privacy features. Other challenges include the fact that electronic medical records have no standards, and that the healthcare system has an enormous volume of data [<xref ref-type="bibr" rid="ref-23">23</xref>].</p>
<p><italic>Business and Industry Applications:</italic> Blockchain technology has been applied to the business and industry sectors, which has led to the term &#x201C;smart manufacturing.&#x201D; This means that industries can share goods over a network in a secure, decentralized, and self-regulating way [<xref ref-type="bibr" rid="ref-19">19</xref>]. Moreover, IoT ecosystem-based blockchain technology has been applied to IoT devices (smartphones, vehicular networks, smart cities, and so forth), and has led users to solve issues such as managing data and keeping it private [<xref ref-type="bibr" rid="ref-24">24</xref>].</p>
<p><italic>Cybersecurity Applications:</italic> Cybersecurity encompasses various aspects of online security, such as applications, networks, and information. In addition, cybersecurity deals with different architectures, such as the IoT and cloud. The main goal of cybersecurity is to detect and protect systems from cyber-attacks. Blockchain&#x2019;s characteristics allow the implementation of cybersecurity systems, thus solving key issues such as decentralized distributed domain name services, keyless signature infrastructure, and secure data storage. Recently, numerous applications have begun to adopt and rely on blockchain-based cybersecurity [<xref ref-type="bibr" rid="ref-20">20</xref>].</p>
<p><italic>Education Applications:</italic> Blockchain technology has been applied to online education, which has several advantages for teachers, students, and institutions. A teacher can add a block of student information to the chain, or institutions can manage certification in a secure way through digital infrastructures. Furthermore, blockchain technology offers features that can collect and analyze data and generate reports about all entities in a given institution. Blockchain technology provides security in education because it achieves confidentiality, integrity, and availability, and it enables controlled access to students&#x2019; information. In addition, it has enhanced accountability, authentication, performance, trust, and interoperability. However, it suffers from several limitations, such as scalability, type of security, and privacy issues [<xref ref-type="bibr" rid="ref-25">25</xref>,<xref ref-type="bibr" rid="ref-26">26</xref>].</p>
<p><italic>Other Fields:</italic> Several additional fields have integrated blockchain technology into their systems. For instance, e-governments allow governments and citizens to interact, and smart contracts implemented on blockchain infrastructure can increase level of Quality-of-Services (QoS). Moreover, these fields established a decentralization-based blockchain database to ensure transparency, accessibility, and other important QoS features. Blockchain technology has also been applied to the energy field. There are many applications for blockchain technology that support energy management, such as increasing the security of the energy grid and supporting the energy trade [<xref ref-type="bibr" rid="ref-27">27</xref>].</p>
<p>In summary, blockchain is useful for decentralized applications in P2P networks. Furthermore, the trust and security that blockchain technology solves some main problems of cybersecurity. However, blockchain technology is not an optimal solution for all industries because it still has some challenges. For instance, traditional databases are at the core of some industries and provide fast and robust tools for many applications [<xref ref-type="bibr" rid="ref-28">28</xref>]. Therefore, the next section discusses the benefits of blockchain as well as the main challenges and threats it faces. <xref ref-type="fig" rid="fig-5">Fig. 5</xref> presents the percentage of the use of blockchain technology in different sectors&#x2019; operations.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Percentage of different domains using blockchain</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_17941-fig-5.png"/>
</fig>
</sec>
<sec id="s3_4">
<label>3.4</label>
<title>Blockchain&#x2019;s Benefits, Challenges, and Threats</title>
<p>Blockchain technology provides several benefits to its users. Some of these benefits are summarized below in <xref ref-type="table" rid="table-4">Tab. 4</xref>. The main advantage of blockchain is its decentralization feature. Decentralization means that there is no need for third parties and that all participants make decisions about the information contained in a network [<xref ref-type="bibr" rid="ref-29">29</xref>].</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Benefits of blockchain</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Benefit</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Decentralization</td>
<td>The nodes might share transactions between themselves without the need for central point.</td>
</tr>
<tr>
<td>Empowered Users</td>
<td>Users have a full privilege and permission to manage their transactions before adding them into a blockchain list, while those users can only read their transactions after adding them into a blockchain list.</td>
</tr>
<tr>
<td>High-quality data</td>
<td>Data in a blockchain is available over different nodes consistently. It is characterized by its accurateness and freshness.</td>
</tr>
<tr>
<td>Reliability and Robustness</td>
<td>Blockchain&#x2019;s nodes resist against any malicious attack since it is a decentralized network.</td>
</tr>
<tr>
<td>Trust</td>
<td>No need for a third-party in blockchain to allow users to share their transactions in a trusted manner.</td>
</tr>
<tr>
<td>Immutable</td>
<td>No one can modify transactions in a blockchain once they were added into a blockchain list.</td>
</tr>
<tr>
<td>Simple Ecosystem</td>
<td>Only one ledger is required for each blockchain network.</td>
</tr>
<tr>
<td>Availability</td>
<td>The user can create transactions anytime.</td>
</tr>
<tr>
<td>Few Fees</td>
<td>Blockchain reduces the cost of transactions by avoiding third parties.</td>
</tr>
<tr>
<td>Efficiency</td>
<td>Transactions occur quickly and automatically.</td>
</tr>
<tr>
<td>Auditability</td>
<td>Authorized participants can audit transactions in a blockchain.</td>
</tr>
<tr>
<td>Traceability</td>
<td>Authorized participants can track any transaction easily.</td>
</tr>
<tr>
<td>Transparency</td>
<td>Blockchain provides transparent transactions to ensure a consistent relationship between parties instead of doing a negotiation.</td>
</tr>
<tr>
<td>Security</td>
<td>Blockchain uses a complex cryptographic for each transaction and block.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Despite the benefits gained from using blockchain technology, it still suffers from several challenges. Some of these challenges are presented below in <xref ref-type="table" rid="table-5">Tab. 5</xref> [<xref ref-type="bibr" rid="ref-30">30</xref>].</p>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>Fields of block structure in blockchain</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Challenge</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Energy Consumption</td>
<td>The miner is responsible for adding any new block in a blockchain; thus, it consumes power to validate the expanding volume of transactions.</td>
</tr>
<tr>
<td>Signature Verification</td>
<td>Signature transaction requires a complex cryptographic calculation in a blockchain.</td>
</tr>
<tr>
<td>Slow</td>
<td>Any Blockchain&#x2019;s block must be encrypted and verified, then it should be broadcasted over networks.</td>
</tr>
<tr>
<td>High Cost</td>
<td>While the cost of initial capital in Blockchain is extremely high, holding a huge volume of transactions also consumes energy; therefore, the overall cost of maintaining each transaction will be increased.</td>
</tr>
<tr>
<td>Scalability</td>
<td>Because of the Blockchain has an immutable nature, nodes cannot delete any block from the chain; therefore, the blockchain size is increased over time incrementally.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Although blockchain technology provides reliable and comfortable services for transactions executed over a network, the blockchain list itself faces different security issues. Therefore, it is important to take these issues into consideration. <xref ref-type="table" rid="table-6">Tab. 6</xref> outlines the main threats that blockchains may face [<xref ref-type="bibr" rid="ref-31">31</xref>&#x2013;<xref ref-type="bibr" rid="ref-33">33</xref>].</p>
<table-wrap id="table-6">
<label>Table 6</label>
<caption>
<title>Main threats in Blockchain</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Threat</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>51% Attack</td>
<td>One or group of miners consumes more than the half of available computational power.</td>
</tr>
<tr>
<td>Fork Problem</td>
<td>Multiple new blocks are added to the old blocks in the chain; therefore, transactions processing capability might be affected negatively.</td>
</tr>
<tr>
<td>Consensus Delay</td>
<td>Inserting false block or DDoS attacks into a blockchain to make a consensus delay.</td>
</tr>
<tr>
<td>Identity Theft</td>
<td>Unauthorized participant stoles the private key, while no third-party can recover it. As a result, blockchain network goes down.</td>
</tr>
<tr>
<td>Selsh Mining</td>
<td>Attacker generates invalid block, then a miner cannot publish a valid block into the rest of network.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>This comprehensive overview of blockchain technology shows that it will revolutionize numerous fields in the future. Although it has some challenges, blockchain has various advantages, such as enhancing IDS performance.</p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Intrusion Detection System</title>
<p>The IDS is a device or software that, through the use of different detection approaches, can detect an attack on a system and then send a notification or report to the system&#x2019;s administrator when it detects such an attack. The IDS may be a single device that observes a stand-alone system or a network system that performs local analysis to detect attacks. Furthermore, IDSs provide the three most important security services: (i) data confidentiality, which checks if the data is stored in a secure place in the system; (ii) data availability, which checks if data are available for an authorized user; and (iii) data integrity, which checks if data are correct and consistent with other data in the system [<xref ref-type="bibr" rid="ref-34">34</xref>].</p>
<sec id="s4_1">
<label>4.1</label>
<title>IDS Types</title>
<p>Network-based intrusion detection system (NIDS) and the host-based intrusion detection system (HIDS) are stand-alone IDSs. To enhance the performance of IDSs in large IT ecosystems, multiple detectors have been used to correlate alerts and exchange knowledge; these detectors are called collaborative intrusion detection systems (CIDSs). CIDSs come in three different network architectures: centralized, hierarchical, and distributed [<xref ref-type="bibr" rid="ref-35">35</xref>]. <xref ref-type="fig" rid="fig-4">Fig. 4</xref> presents the IDS classifications. A centralized CIDS uses several IDSs to monitor the network, wherein each IDS connects and shares data with a single analysis unit. Hierarchical and decentralized CIDSs also use several IDSs, but analysis units connect in a heretical structure to monitor multiple points in the network. A decentralized CIDS can overcome the single point of failure problem. Meanwhile, a distributed CIDS is a P2P network architecture in which each participant has an analysis unit and shares information with others in a distributed manner [<xref ref-type="bibr" rid="ref-36">36</xref>,<xref ref-type="bibr" rid="ref-37">37</xref>].</p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>IDS Detection Techniques</title>
<p>The most well-known IDS approaches are signature and anomaly. The signature approach tries to detect attacks through the mapping between signatures (i.e., patterns or rules) in the database. Although it can detect known attacks easily, this approach suffers because it cannot detect a new attack with no known patterns or rules. Conversely, the anomaly approach can detect unknown attacks by monitoring the system&#x2019;s behavior. The anomaly approach finds abnormal activities and generates an alarm for the network administrator. Although this approach can detect unknown attacks, it may send false positive alarms. Each approach employs several techniques, as shown in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>.</p>
<p><italic>Pattern Matching:</italic> Pattern matching compares new strings that enter the system with strings in the system&#x2019;s database to verify that there is no malicious attack occurring. If there is any matching pattern, then the system detects an attack and will generate an alarm; if there is no matching pattern, then no attack is detected. There are two kinds of pattern matching algorithms: single and multiple. Single pattern matching algorithms are simple because they search for one pattern at a time. Multiple pattern matching algorithms search for all patterns at the same time, require more time and resources [<xref ref-type="bibr" rid="ref-38">38</xref>,<xref ref-type="bibr" rid="ref-39">39</xref>]. A popular pattern matching algorithm applied to IDSs is the Boyer&#x2013;Moore single pattern algorithm compares strings from the rightmost character. Although it has achieved the best performance in searching operations, the Boyer&#x2013;Moore algorithm does not have feature scalability. Meanwhile, the Aho&#x2013;Corasick and Wu&#x2013;Manber algorithms are multiple pattern matching algorithms that search for more than one pattern simultaneously; however, the Aho&#x2013;Corasick algorithm requires more memory than the Wu&#x2013;Manber algorithm [<xref ref-type="bibr" rid="ref-40">40</xref>]. Pattern matching algorithms have a trade-off between their search speed and consumed memory. Some researchers have proposed ways to optimize these algorithms, while others have proposed new algorithms to enhance the performance of detection techniques in IDSs [<xref ref-type="bibr" rid="ref-38">38</xref>&#x2013;<xref ref-type="bibr" rid="ref-40">40</xref>].</p>
<p><italic>Rule-based:</italic> This technique is used in both signature and anomaly approaches. Signature detection diagnoses packets and detects malicious attacks through rules that are predefined in the system, whereas anomaly detection diagnoses the behavior of the system and detects differences between normal and abnormal behavior depending on predefined rules in the system, such as programmers&#x2019; sequence of system calls. Both detection methods must update a network&#x2019;s rules to acquire more security. Updating the rules using the signature approach is simple, easy, and automatic; updating the rules using anomaly detection, however, is more complex because it needs time to record new training rules [<xref ref-type="bibr" rid="ref-41">41</xref>,<xref ref-type="bibr" rid="ref-42">42</xref>].</p>
<p><italic>State-based</italic>: Signature detection uses the state transition analysis technique to describe attack scenarios. This technique contains two main elements, namely, state, and arc. The state represents the user or process, and the arc represents an action; if the user or process reaches the final state, then an attack occurs and the system detects it. The first tool to implement the state transition analysis technique was the Unix State Transition Analysis Tool, which executes host-based intrusion detection. The Unix State Transition Analysis Tool is a rule-based expert system that looks for known attacks in the audit traces of multi-user computer systems. However, it suffers from some limitations, such as its features being difficult to extend or adapt to different operating systems [<xref ref-type="bibr" rid="ref-43">43</xref>].</p>
<p><italic>Data Mining:</italic> The signature detection approach can use data mining techniques to discover new patterns for IDSs and to overcome its main disadvantage. Although data mining is used mainly in the signature approach, much research has also applied data mining to anomaly detection. However, data mining requires data from various machine learning techniques, such as rule-based, classification, and clustering, to gather knowledge for network intrusion detection [<xref ref-type="bibr" rid="ref-44">44</xref>,<xref ref-type="bibr" rid="ref-45">45</xref>]. Some of the existing data mining algorithms are shown in <xref ref-type="table" rid="table-7">Tab. 7</xref> [<xref ref-type="bibr" rid="ref-46">46</xref>,<xref ref-type="bibr" rid="ref-47">47</xref>].</p>
<table-wrap id="table-7">
<label>Table 7</label>
<caption>
<title>Data mining techniques</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Methodology</th>
<th>Algorithm</th>
</tr>
</thead>
<tbody>
<tr>
<td>Classification</td>
<td>Decision tree (DT), Support Vector Machin (SVM), Bayesian Networks (BN) K-Nearest Neighbors (K-NN), Artificial Neural Network (ANN) and Kstar.</td>
</tr>
<tr>
<td>Clustering</td>
<td>K-Means, Expectation Maximization (EM) and Hierarchical Clustering (HC).</td>
</tr>
<tr>
<td>Rule System</td>
<td>OneR, RIPPER Rule (RR), Association Rule (AR), Conjunctive Rule (CR) and Fuzzy.</td>
</tr>
<tr>
<td>Optimization</td>
<td>Linear Programming (LP) and Genetic Algorithm (GA).</td>
</tr>
<tr>
<td>Regression</td>
<td>Regression Trees (RT) Reinforcement Learning Automata (LA).</td>
</tr>
<tr>
<td>Ensemble</td>
<td>AdaBoost.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><italic>Statistical-based Intrusion Detection</italic>: This technique deals with two profiles in anomaly detection: one for observing current network traffic, and the other for statistical training. When an event occurs, the anomaly detection system evaluates it by comparing two behaviors. If the anomaly score exceeds the threshold, then the intrusion detection system generates an alarm [<xref ref-type="bibr" rid="ref-48">48</xref>]. Most model-based statistics assume multivariate statistical techniques, such as the chi-square statistic, Canberra technique, and Hotelling&#x2019;s T-squared distribution. Numerous anomaly detection mechanisms find outliers in the dataset by analyzing behavior, as each element in the dataset has specific features and a local outlier factor that could be used to detect the abnormal behavior [<xref ref-type="bibr" rid="ref-49">49</xref>,<xref ref-type="bibr" rid="ref-50">50</xref>].</p>
<p><italic>Biological Models:</italic> Prior works have proven that the human immune system and computer network security are similar in nature. Both systems have a complex network and aim to protect its nodes from any malicious attack. In addition, both systems have security policies and security levels. The human immune system sets its policies to depend on natural selection phenomena, and its security levels should meet disposability, correction, integrity, and accountability requirements. Meanwhile, computer network systems establish a set of rules to defend against attacks and detect illegal actions that may occur in the network that break specific security levels [<xref ref-type="bibr" rid="ref-51">51</xref>&#x2013;<xref ref-type="bibr" rid="ref-53">53</xref>]. In recent years, several algorithms inspired by biological processes, such as genetic algorithms and artificial neural network algorithms [<xref ref-type="bibr" rid="ref-54">54</xref>,<xref ref-type="bibr" rid="ref-55">55</xref>], have been widely applied to the anomaly detection approach to enhance the performance of intrusion detection.</p>
<p><italic>Learning Models:</italic> Artificial learning techniques have increased the effectiveness of the anomaly detection approach. Anomaly detection can be supervised or unsupervised. Supervised anomaly detection is taught by a labelled dataset that distinguishes between normal and abnormal behavior. Supervised learning algorithms include support vector machines and the k-nearest neighbor. Unsupervised anomaly detection is taught by unlabeled training data; therefore, it uses several techniques to distinguish between normal and abnormal behavior in the system. One of these techniques is clustering, which has been used in anomaly intrusion detection to find outliers exhibiting anomalous behavior. The k-mean clustering algorithm is the most popular such algorithm, and has been applied to intrusion detection [<xref ref-type="bibr" rid="ref-56">56</xref>&#x2013;<xref ref-type="bibr" rid="ref-58">58</xref>].</p>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>IDS Performance Measures</title>
<p>To ensure that an IDS&#x2019;s security service works efficiently, there are several evaluation metrics that might be used to measure the performance of any IDS. Researchers often use accuracy, false positive rates, and false negative rates. The equations below are used to measure the performance of IDSs [<xref ref-type="bibr" rid="ref-34">34</xref>].</p>
<p><italic>Accuracy (AC)</italic> measures the IDS&#x2019;s accuracy in detecting an attack [<xref ref-type="bibr" rid="ref-59">59</xref>,<xref ref-type="bibr" rid="ref-60">60</xref>]:</p>
<p><disp-formula id="eqn-1">
<label>(1)</label>
<!--<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-1.png"/><tex-math id="tex-eqn-1"><![CDATA[$$AC = \; \displaystyle{{TP + TN} \over {TP + TN + FP + FN}}$$]]></tex-math>--><mml:math id="mml-eqn-1" display="block"><mml:mi>A</mml:mi><mml:mi>C</mml:mi><mml:mo>&#x003D;</mml:mo><mml:mspace width="thickmathspace"></mml:mspace><mml:mstyle scriptlevel="0" displaystyle="true"><mml:mrow><mml:mfrac><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>&#x002B;</mml:mo><mml:mi>T</mml:mi><mml:mi>N</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>&#x002B;</mml:mo><mml:mi>T</mml:mi><mml:mi>N</mml:mi><mml:mo>&#x002B;</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mo>&#x002B;</mml:mo><mml:mi>F</mml:mi><mml:mi>N</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:math>
<!--</alternatives>--></disp-formula></p>
<p>The <italic>detection rate (DR)</italic> is the ratio between intrusions detected to total attacks on the system [<xref ref-type="bibr" rid="ref-61">61</xref>]:</p>
<p><disp-formula id="eqn-2">
<label>(2)</label>
<!--<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-2.png"/><tex-math id="tex-eqn-2"><![CDATA[$$DR = {\rm \; }\displaystyle{{TP} \over {TP + TN}}$$]]></tex-math>--><mml:math id="mml-eqn-2" display="block"><mml:mi>D</mml:mi><mml:mi>R</mml:mi><mml:mo>&#x003D;</mml:mo><mml:mrow><mml:mspace width="thickmathspace"></mml:mspace></mml:mrow><mml:mstyle scriptlevel="0" displaystyle="true"><mml:mrow><mml:mfrac><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>&#x002B;</mml:mo><mml:mi>T</mml:mi><mml:mi>N</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:math>
<!--</alternatives>--></disp-formula></p>
<p><italic>Precision (P)</italic> measures the ratio of attacks that were predicted correctly to the total attacks in the system, and is calculated as follows [<xref ref-type="bibr" rid="ref-62">62</xref>]:</p>
<p><disp-formula id="eqn-3">
<label>(3)</label>
<!--<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-3.png"/><tex-math id="tex-eqn-3"><![CDATA[$$P = {\rm \; }\displaystyle{{TP} \over {TP + FP}}$$]]></tex-math>--><mml:math id="mml-eqn-3" display="block"><mml:mi>P</mml:mi><mml:mo>&#x003D;</mml:mo><mml:mrow><mml:mspace width="thickmathspace"></mml:mspace></mml:mrow><mml:mstyle scriptlevel="0" displaystyle="true"><mml:mrow><mml:mfrac><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>&#x002B;</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:math>
<!--</alternatives>--></disp-formula></p>
<p>The <italic>true negative rate (or specification) (TNR)</italic> measures the ratio of normal values to the values that were successfully detected as legitimate in the system [<xref ref-type="bibr" rid="ref-63">63</xref>]:</p>
<p><disp-formula id="eqn-4">
<label>(4)</label>
<!--<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-4.png"/><tex-math id="tex-eqn-4"><![CDATA[$$TNR = {\rm \; }\displaystyle{{TN} \over {TN + FP}}$$]]></tex-math>--><mml:math id="mml-eqn-4" display="block"><mml:mi>T</mml:mi><mml:mi>N</mml:mi><mml:mi>R</mml:mi><mml:mo>&#x003D;</mml:mo><mml:mrow><mml:mspace width="thickmathspace"></mml:mspace></mml:mrow><mml:mstyle scriptlevel="0" displaystyle="true"><mml:mrow><mml:mfrac><mml:mrow><mml:mi>T</mml:mi><mml:mi>N</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mi>N</mml:mi><mml:mo>&#x002B;</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:math>
<!--</alternatives>--></disp-formula></p>
<p>The <italic>false positive rate (FPR)</italic> measures the ratio of normal points that were detected as attacks and is calculated by <xref ref-type="disp-formula" rid="eqn-5">Eq. (5)</xref> [<xref ref-type="bibr" rid="ref-64">64</xref>]. If the FPR is high, then the performance of the IDS is low.</p>
<p><disp-formula id="eqn-5">
<label>(5)</label>
<!--<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-5.png"/><tex-math id="tex-eqn-5"><![CDATA[$$FPR = {\rm \; }\displaystyle{{FP} \over {FP + TN}}$$]]></tex-math>--><mml:math id="mml-eqn-5" display="block"><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mi>R</mml:mi><mml:mo>&#x003D;</mml:mo><mml:mrow><mml:mspace width="thickmathspace"></mml:mspace></mml:mrow><mml:mstyle scriptlevel="0" displaystyle="true"><mml:mrow><mml:mfrac><mml:mrow><mml:mi>F</mml:mi><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mo>&#x002B;</mml:mo><mml:mi>T</mml:mi><mml:mi>N</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:math>
<!--</alternatives>--></disp-formula></p>
<p>The <italic>false negative rate (FNR)</italic> measures the ratio of attacks that were not detected in the system [<xref ref-type="bibr" rid="ref-64">64</xref>]:</p>
<p><disp-formula id="eqn-6">
<label>(6)</label>
<!--<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-6.png"/><tex-math id="tex-eqn-6"><![CDATA[$$FNR = {\rm \; }\displaystyle{{FN} \over {FN + TP}}{\rm \; }$$]]></tex-math>--><mml:math id="mml-eqn-6" display="block"><mml:mi>F</mml:mi><mml:mi>N</mml:mi><mml:mi>R</mml:mi><mml:mo>&#x003D;</mml:mo><mml:mrow><mml:mspace width="thickmathspace"></mml:mspace></mml:mrow><mml:mstyle scriptlevel="0" displaystyle="true"><mml:mrow><mml:mfrac><mml:mrow><mml:mi>F</mml:mi><mml:mi>N</mml:mi></mml:mrow><mml:mrow><mml:mi>F</mml:mi><mml:mi>N</mml:mi><mml:mo>&#x002B;</mml:mo><mml:mi>T</mml:mi><mml:mi>P</mml:mi></mml:mrow></mml:mfrac></mml:mrow><mml:mrow><mml:mspace width="thickmathspace"></mml:mspace></mml:mrow></mml:mstyle></mml:math>
<!--</alternatives>--></disp-formula></p>
<p>The <italic>true positive rate (or recall) (TPR)</italic> measures the ratio of predicted attacks to the actual number of attacks on the system, and is determined by the following equation [<xref ref-type="bibr" rid="ref-62">62</xref>]:</p>
<p><disp-formula id="eqn-7">
<label>(7)</label>
<!--<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-7.png"/><tex-math id="tex-eqn-7"><![CDATA[$$TPR = {\rm \; }\displaystyle{{TP} \over {TP + FN}}$$]]></tex-math>--><mml:math id="mml-eqn-7" display="block"><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mi>R</mml:mi><mml:mo>&#x003D;</mml:mo><mml:mrow><mml:mspace width="thickmathspace"></mml:mspace></mml:mrow><mml:mstyle scriptlevel="0" displaystyle="true"><mml:mrow><mml:mfrac><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>&#x002B;</mml:mo><mml:mi>F</mml:mi><mml:mi>N</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:math>
<!--</alternatives>--></disp-formula></p>
<p>In the above equations, TP denotes the number of true positives, FN denotes the number of false negatives, TN denotes the number of true negatives, and FP denotes the number of false negatives. <xref ref-type="table" rid="table-8">Tab. 8</xref> presents the related confusion matrix [<xref ref-type="bibr" rid="ref-65">65</xref>,<xref ref-type="bibr" rid="ref-66">66</xref>].</p>
<table-wrap id="table-8">
<label>Table 8</label>
<caption>
<title>Confusion matrix</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th></th>
<th>Positive</th>
<th>Negative</th>
</tr>
</thead>
<tbody>
<tr>
<td>True</td>
<td>Attack present<break/>Alarms are generated</td>
<td>No attack<break/>No alarms</td>
</tr>
<tr>
<td>False</td>
<td>No Attack<break/>Alarms are generated</td>
<td>Attack present<break/>No alarms</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>IDSs based on Blockchain Technology</title>
<p>Several works have used blockchain technology in IDSs to detect malicious attacks. These works can mainly be classified into two main categories: those that rely on the anomaly detection approach, and those that rely on the signature approach. <xref ref-type="fig" rid="fig-6">Fig. 6</xref>, <xref ref-type="fig" rid="fig-7">Fig. 7</xref> and <xref ref-type="fig" rid="fig-8">Fig. 8</xref> illustrate different taxonomies of IDSs based on blockchain models for the detection approach. The following subsections discuss in detail IDSs based on blockchain models that use anomaly and signature detection techniques. Note that blockchain technology is more commonly adopted for anomaly detection than for signature detection.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>IDS classification-based location</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_17941-fig-6.png"/>
</fig>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>Detection approaches</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_17941-fig-7.png"/>
</fig>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Taxonomy of IDS based on Blockchain models</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_17941-fig-8.png"/>
</fig>
<sec id="s5_1">
<label>5.1</label>
<title>Anomaly Detection Approach</title>
<p>The anomaly detection technique monitors a system&#x2019;s behavior by constructing a profile over a given period of time; this profile contains all activities of the system. However, there are different models for creating a profile file for the system, such as time series and threshold models [<xref ref-type="bibr" rid="ref-67">67</xref>]. The present review discusses three models that researchers have used to adopt blockchain technology, namely, machine learning, rule-based, and statistical models. Details about each model are presented in the following subsections.</p>
<sec id="s5_1_1">
<label>5.1.1</label>
<title>Machine Learning Models</title>
<p>Machine learning can assist IDSs in detecting new and current attacks automatically and without human intervention by optimizing the system&#x2019;s feature selection. Recently, there have been many machine learning algorithms adopted into IDSs to enhance system security, such as support vector machines, artificial neural networks, and genetic algorithms [<xref ref-type="bibr" rid="ref-67">67</xref>]. This subsection presents the related works on IDS-based machine learning and how blockchain has been integrated into such learning.</p>
<p>Golomb et al. [<xref ref-type="bibr" rid="ref-68">68</xref>] introduced a blockchain protocol (called CIoTA) based on a distributed and collaborative anomaly detection framework used in the IoT. Each device contains a local model to detect malicious behavior, and new detection frameworks are shared by adding new blocks to the chain that are then propagated to all neighboring nodes. Experimental results revealed that CIoTA improves device and network security by detecting different types of attacks in the network. However, because CIoTA is designed for limited resources, it may increase overhead when many devices are available in the network.</p>
<p>Moreover, Id&#x00E9; [<xref ref-type="bibr" rid="ref-69">69</xref>] introduced a novel blockchain protocol, called CollabDict, for collaborative anomaly detection in the IoT network; this protocol learns collaboratively in blockchain platforms. CollabDict addresses three issues commonly faced by statistical machine learning algorithms: consensus-building, data privacy, and validation. CollabDict accomplishes consensus building by using a proof-of-vote mechanism-based statistical generalization and realizes data privacy by only sharing the client&#x2019;s aggregated statistics. However, validation remains a challenge for the CollabDict protocol. Thus, validation and its consequences need to be reviewed carefully in future research. Kumari et al. [<xref ref-type="bibr" rid="ref-70">70</xref>] protected blockchain networks from attacks using a modified k-means algorithm, which detects malicious nodes by classifying the nodes in the network based on their behavior patterns. Each pattern is built based on two parameters: (i) the time consumed for one transaction and (ii) the number of transactions from one node to another.</p>
<p>Finally, Dey [<xref ref-type="bibr" rid="ref-71">71</xref>] introduced an intelligent software agent based on game theory algorithms and machine learning techniques. This agent runs on an application layer and has two objectives: (i) determining old transactions of participants that are likely to be malicious and (ii) calculating the value of current transactions and their probability of attacking.</p>
</sec>
<sec id="s5_1_2">
<label>5.1.2</label>
<title>Rule-based Models</title>
<p>Rule-based models observe the events of a system that has rules stored in a database to determine if an event is normal or abnormal. The model has one drawback: its failure to detect abnormal events if there are not many rules in the database.</p>
<p>Signoriniet et al. [<xref ref-type="bibr" rid="ref-72">72</xref>] proposed a model called BAD, which is a blockchain anomaly detection approach for the Bitcoin network. This model saves malicious transactions in an attack log at the first injection in the network; it then uses this log to prevent the attacks from spreading throughout the network. The BAD model takes blockchain&#x2019;s features (i.e., distributed, decentralized, and no need for third parties) to manage sensitive information. In addition, the BAD model is trusted because data behavior is verified by all of the nodes in the network, and it has a tamperproof feature that prevents malicious software from modifying the blockchain. However, the BAD model only works efficiently if the attacker repeats the same malicious transaction every time.</p>
<p>Signorini et al. [<xref ref-type="bibr" rid="ref-73">73</xref>] also proposed the ADvISE anomaly detection tool for blockchain systems; it collects and analyses blockchains&#x2019; meta-data (forks), and then records malicious forks at the first attack in the database. Afterward, all peers in the blockchain network share the database to prevent attacks from being executed, thus protecting the network. Despite ADvISE being a tool designed for any type of attack, it works efficiently only when the attack has replicated itself more than once. Kanth et al. [<xref ref-type="bibr" rid="ref-74">74</xref>] presented a blockchain-based CIDS to detect doorknob rattling attacks through pluggable authentication modules (PAM) based on the private Ethereum blockchain. This PAM model can detect doorknob-rattling attacks more rapidly than previous models, but it lacks scalability.</p>
<p>Steichen et al. [<xref ref-type="bibr" rid="ref-75">75</xref>] introduced the ChainGuard model based on software-defined networking to detect and prevent abnormal behavior. The ChainGuard model uses software-defined networking functions to filter the traffic of the network through a firewall of blockchain applications. As a result, it minimizes denial-of-service and distributed denial-of-service attacks on the network because it prevents malicious packets from influencing the blockchain.</p>
<p>Moreover, Zhu et al. [<xref ref-type="bibr" rid="ref-76">76</xref>] proposed a novel model for managing storage in cloud computing based on blockchain technology. Their model reduces the risk of attacks on the blockchain and is called controllable blockchain data management. This model increases a network&#x2019;s security level by submitting trusted authority nodes, which have higher voting authorization compared to other nodes in the network. The model also has the authority to terminate any malicious node, and thus it has controllability. In addition, controllable blockchain data management provides a privacy-preserving feature because it grants public keys, private keys, and permissions to each user who joins a network in which users are unknown to each other. Furthermore, users&#x2019; votes are signed, and users must pay fees to vote, which decreases the risk of malicious voting. This model also has openness and transparency because it publishes modifications and voting records over the network; moreover, the network is not affected if a single node crashes.</p>
</sec>
<sec id="s5_1_3">
<label>5.1.3</label>
<title>Statistical Models</title>
<p>A statistical model-based IDS relies on analyzing and correlating data, then applying statistical theories on such data to detect attacks. Users also define the threshold for each statistical variable. However, current statistical models suffer from insufficiency in genetic architecture because confidentiality, integrity, and availability have not been considered within the current statistical models&#x2019; principles. At the time of the present review, there is no literature on adopting a blockchain technology-based statistical model [<xref ref-type="bibr" rid="ref-77">77</xref>].</p>
<p>Pham et al. [<xref ref-type="bibr" rid="ref-78">78</xref>] proposed an anomaly detection technique in the Bitcoin network that uses two approaches, namely, the LOF and the densification power law. Their findings showed that the proposed technique achieves high anomaly detection rates, and that the technique can be applied in different networks. However, the main challenge of this technique is that it is has difficulty measuring the accuracy of the LOF method.</p>
</sec>
</sec>
<sec id="s5_2">
<label>5.2</label>
<title>Signature Detection Approach</title>
<p>There have been several works conducted to detect attacks using blockchain technology based on the signature detection approach. This section presents two signature models based on blockchain.</p>
<sec id="s5_2_1">
<label>5.2.1</label>
<title>Pattern Matching Models</title>
<p>Although the pattern matching model is the most widely used model by the signature detection approach, limited research has been conducted on it regarding blockchain technology. Pattern or string-matching models use single or multiple patterns matching algorithms to detect malware. The single pattern approach compares only one pattern at a time to detect malware, whereas the multiple-patterns approach compares more than one pattern at a time [<xref ref-type="bibr" rid="ref-39">39</xref>].</p>
<p>Hu et al. [<xref ref-type="bibr" rid="ref-79">79</xref>] presented an approach to collaborative intrusion detection based on blockchain for multi-microgrid systems. The approach has three aspects: (i) it integrates the consensus mechanisms of blockchain with multi-microgrid systems to enhance the accuracy of CIDSs; (ii) it uses periodic and time-triggered patterns to reduce false positive rates; and (iii) it enhances delegated proof of stake (DPoS) consensus algorithms to solve the single richest member problem.</p>
</sec>
<sec id="s5_2_2">
<label>5.2.2</label>
<title>Rule-based Models</title>
<p>Rule-based models have a set of rules that match against network traffic or audit data. They can detect any attack if the rules match. However, since using a rule-based model alone is insufficient for malware detection, it needs to be integrated with another technique [<xref ref-type="bibr" rid="ref-80">80</xref>]. This subsection discusses how researchers have started to integrate the rule-based model with blockchain technology.</p>
<p>Alexopoulos et al. [<xref ref-type="bibr" rid="ref-81">81</xref>] proposed a blockchain framework based on CIDSs to enhance malicious detection. The proposed framework tries to archive accountability, integrity, resilience, consensus, scalability, and privacy, while reducing overhead requirements by exchanging alerts between nodes based on secure ledger distribution. The framework considers each alert message as a transaction produced by an IDS node, and then all collaborating nodes utilize consensus mechanisms to validate the alert. Thus, it prevents storing malicious alert. However, Alexopoulos&#x2019; proposed framework has not been implemented or evaluated in a real or virtual environment.</p>
<p>Li et al. [<xref ref-type="bibr" rid="ref-82">82</xref>] extended a generic framework to improve the signature detection approach based on blockchain technology and thus increase the IoT network&#x2019;s security level. The improved framework is called CBSigIDS. It builds a trusted signature database and shares it between all nodes in the network; moreover, each record is signed by a private key. CBSigIDS is effective and robust in detection because a malicious node cannot add a signature to the database; however, this approach faces the limitations of blockchain technology, such as energy, cost, and scalability.</p>
<p>The database, but it faces the limitations of blockchain technology, such as energy, cost, and scalability.</p>
</sec>
</sec>
<sec id="s5_3">
<label>5.3</label>
<title>Analysis of Blockchain-IDS Models</title>
<p>As mentioned earlier, blockchain-based IDS models are based on anomaly and signature approaches, both of which have various challenges that may be solved via blockchain technology. This subsection presents the challenges of IDS in both approaches. In addition, it provides an analysis of and comparisons between the existing blockchain-based IDS models.</p>
<p>The anomaly detection approach suffers from a high number of false alarms, and it is unable to detect encrypted packet that occurs by cyberattacks. Moreover, it has difficulty constructing a normal profile for dynamic systems, its alarms are not classified, and initial training is required. In contrast, the main limitation in the signature detection approach is that it is unable to detect a new cyberattack in the system. Therefore, this approach needs to be updated frequently, and it is an inappropriate choice for detecting a multi-step attack [<xref ref-type="bibr" rid="ref-83">83</xref>].</p>
<p>The existing blockchain-based IDS models also suffer from different issues. <xref ref-type="table" rid="table-9">Tab. 9</xref> provides a description of each model along with their strengths and weaknesses. As aforementioned, the common challenge between all models is that they have no standard design.</p>
<table-wrap id="table-9">
<label>Table 9</label>
<caption>
<title>Summary of the blockchain-based IDS models</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Ref</th>
<th>Description</th>
<th>Strengths</th>
<th>Weaknesses</th>
</tr>
</thead>
<tbody>
<tr>
<td>[<xref ref-type="bibr" rid="ref-68">68</xref>]</td>
<td>It proposes blockchain protocol (CIoTA) based on a distributed and collaborative mechanism for anomaly detection in IoT network.</td>
<td>It improves security of IoT devices and the whole network as well.</td>
<td>It is not efficient security protocol for many IoT devices.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-69">69</xref>]</td>
<td>It proposes a protocol (CollabDict) for a collaborative anomaly detection based on blockchain and Gaussian mixture learning algorithm.</td>
<td>Performance of CollabDict is better than fuses multitask learning algorithm.</td>
<td>Collaborative learning has three main challenges, namely: (i) validation, (ii) consensus building, and (iii) data security.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-70">70</xref>]</td>
<td>It relies on the use of the k-means algorithm to distinguish between malicious nodes and normal nodes through the analysis of pattern behavior for each node in a blockchain network.</td>
<td>It manages nodes and transactions in the network efficiently, also, it classifies nodes correctly.</td>
<td>It uses mean value for each cluster; thus, inaccurate cluster head might be selected, besides, it uses a static distance measure rather than a dynamic one.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-71">71</xref>]</td>
<td>It detects anomaly behaviours of participates in a blockchain network based on a game theory and a supervised machine learning algorithms.</td>
<td>It provides probability for each attack based on value of the transaction.</td>
<td>It requires improvements to strengthen its defense mechanism.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-72">72</xref>]</td>
<td>It builds BAD model to detect malicious transactions and prevent spreading them over the network.</td>
<td>It prevents malicious software from modifying the transactions&#x2019; trace. Furthermore, data behavior should be verified from all participants in the network; thus, network security is increased.</td>
<td>It cannot detect the malicious transactions efficiently.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-73">73</xref>]</td>
<td>It provides a tool used to detect anomaly behaviours in a blockchain network.</td>
<td>It is a flexible tool that can detect several types of malicious transactions in a blockchain network.</td>
<td>It works efficiently in case of having repeating attacks in the network.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-74">74</xref>]</td>
<td>It proposes PAM model for addressing two challenges are trusting participants and aggregating data in CIDS.</td>
<td>It prevents doorknob rattling attacks from modifying records in the system instantly before occurring any activity.</td>
<td>PAM model detects one type of attack, and there is no scalability feature.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-75">75</xref>]</td>
<td>It is used for securing Software Defined Network (SDN), by detecting and preventing abnormal behaviors at network level through a firewall of blockchain applications.</td>
<td>ChainGuard reduces the effect of DoS and DDoS attacks on SDN network.</td>
<td>The effectiveness of the proposed model is not evaluated in the real environment.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-76">76</xref>]</td>
<td>It introduces Controllable Blockchain Data Management (CBDM) model, it is a novel model-based blockchain used to obtain storage efficiency in the cloud computing network and minimize risk resulting from malicious attacks in blockchain.</td>
<td>It ensures providing a sufficient storage in cloud computing, and it increases the security level in the whole network.</td>
<td>It is not evaluated in real environment.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-78">78</xref>]</td>
<td>It utilized LOF method and densification power law to detect malicious users and transactions in a Bitcoin network.</td>
<td>It achieves high anomaly detection rate, and it can be adapted in different networks types.</td>
<td>It is difficult to measure accuracy of LOF method; so, it is not efficient in detecting anomaly behaviours.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-79">79</xref>]</td>
<td>It produces a collaborative intrusion detection (CID) model-based on blockchain technology for Multi- microgrid system. It records the target of CID in a blockchain and builds a correlation model of Multi- microgrid system, by a consensus algorithm.</td>
<td>It reduces the false-negative rate by using multiple patterns, and it improves DPoS consensus algorithm. Also, no need for a trusted authority in MMGs.</td>
<td>It is limited to few types of attacks. Also, it does not provide a high level of true positive rate compared to other approaches.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-81">81</xref>]</td>
<td>It uses a blockchain technology to improve CIDS. In addition, it provides a combined architecture based on blockchain and CIDs.</td>
<td>It reduces the overhead and volume of the blockchain construct considerably.</td>
<td>The approach is not assessed in the real environment, and it is not sup- porting scalability feature.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-82">82</xref>]</td>
<td>It introduces a generic framework (CBSigIDS) to enhance signature IDS based on a blockchain technology in IoT environment, where it uses consortium blockchain to build trusted rules (signature) database and share it with other nodes in network.</td>
<td>It improves effectiveness and robustness of signature based IDSs.</td>
<td>It suffers from some of challenges such as: vulnerability to the advanced attacks&#x2019; types and the need for verification and the frequent update in blockchain, which, in result causes a delay and diminishes the overall network performance.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Most existing models leverage the anomaly technique instead of the signature technique due to its benefits. Besides, machine learning methods are receiving more attention from researchers because they have proven their worthiness in detection tasks.</p>
<p>As shown in <xref ref-type="fig" rid="fig-6">Fig. 6</xref>, IDSs have different architectures. Among them, the CIDS architecture is appropriate for blockchain. The distributed IDS is the most compatible because the blockchain technology builds over a P2P architecture and it is a distributed model. Therefore, the existing models have been proposed for various network architectures. Lastly, we note that the distributed system has four main architectures: (i) client&#x2013;server, (ii) three-tier, (iii) n-tier, and (iv) peer-to-peer [<xref ref-type="bibr" rid="ref-83">83</xref>&#x2013;<xref ref-type="bibr" rid="ref-85">85</xref>].</p>
<p><xref ref-type="table" rid="table-10">Tab. 10</xref> compares between related works categories based on approach detection, network type, attack type detection and type of blockchain, as well as the simulation and platform that was used in each model. While most IDS models were proposed for different networks architectures, which adopted blockchain technology are assessed in a virtual environment by different simulators. However, there was one real model (CIoTA) applied in the IoT environment, but it also has its own limitations.</p>
<table-wrap id="table-10">
<label>Table 10</label>
<caption>
<title>A Summary of the blockchain-based IDS models</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Detection Approach</th>
<th>Network Type</th>
<th>Model Name</th>
<th>Attack Type</th>
<th>Simulator</th>
<th>Platform</th>
<th>Ref</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="9">Anomaly</td>
<td rowspan="3">Blockchain network</td>
<td>NA&#x002A;</td>
<td>Trojan keylogger</td>
<td>BTC</td>
<td>CS 224W course website</td>
<td>[<xref ref-type="bibr" rid="ref-78">78</xref>]</td>
</tr>
<tr>
<td>BAD</td>
<td>Eclipse</td>
<td>Bitcoin Testnet</td>
<td>Virtual Machine</td>
<td>[<xref ref-type="bibr" rid="ref-72">72</xref>]</td>
</tr>
<tr>
<td>PAM</td>
<td>Doorknob rattling</td>
<td>Go-Ethereum</td>
<td>Ubuntu</td>
<td>[<xref ref-type="bibr" rid="ref-74">74</xref>]</td>
</tr>
<tr>
<td rowspan="2">IoT</td>
<td>CIoTA</td>
<td>All attacks</td>
<td>IoT simulation testbed consisting of 48 Raspberry Pis</td>
<td>Emulation</td>
<td>[<xref ref-type="bibr" rid="ref-68">68</xref>]</td>
</tr>
<tr>
<td>CollabDict</td>
<td>NA</td>
<td>Gaussian Graphic Model</td>
<td>NC&#x002A;</td>
<td>[<xref ref-type="bibr" rid="ref-69">69</xref>]</td>
</tr>
<tr>
<td rowspan="3">P2P</td>
<td>ADvISE</td>
<td>Eclipse</td>
<td>NA</td>
<td>NA</td>
<td>[<xref ref-type="bibr" rid="ref-73">73</xref>]</td>
</tr>
<tr>
<td>NA</td>
<td>NA</td>
<td>NS3</td>
<td>Ubuntu</td>
<td>[<xref ref-type="bibr" rid="ref-70">70</xref>]</td>
</tr>
<tr>
<td>NA</td>
<td>NA</td>
<td>NA</td>
<td>NA</td>
<td>[<xref ref-type="bibr" rid="ref-71">71</xref>]</td>
</tr>
<tr>
<td>SDN</td>
<td>ChainGuard</td>
<td>DoS DDoS</td>
<td>SYN flood</td>
<td>Virtual Machine</td>
<td>[<xref ref-type="bibr" rid="ref-75">75</xref>]</td>
</tr><tr>
<td/>
<td>Cloud Computing</td>
<td>CBDM</td>
<td>User Collusion Attack Model (UCAM).</td>
<td>Ethereum client Geth and Wallet</td>
<td>NC</td>
<td>[<xref ref-type="bibr" rid="ref-76">76</xref>]</td>
</tr>
<tr>
<td rowspan="3">Signature</td>
<td>IoT</td>
<td>CBSigIDS</td>
<td>Flooding Worm</td>
<td>Snort</td>
<td>Simulated and real CIDN environment.</td>
<td>[<xref ref-type="bibr" rid="ref-82">82</xref>]</td>
</tr>
<tr>
<td>P2P</td>
<td>Generic architecture</td>
<td>NC</td>
<td>NA</td>
<td>NA</td>
<td>[<xref ref-type="bibr" rid="ref-81">81</xref>]</td>
</tr>
<tr>
<td>Multi-microgrid (MMG)</td>
<td>NA</td>
<td>Tampering, Man-in-the-Middle Replay &#x0026; DoS</td>
<td>Co-simulation</td>
<td>NC</td>
<td>[<xref ref-type="bibr" rid="ref-79">79</xref>]</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s6">
<label>6</label>
<title>Future Research Directions</title>
<p>Prior research has focused on constructing models to enhance the performance of IDSs by adopting blockchain technology over several network environments. However, most of these models suffer from issues related to the blockchain technique, IDS approach, or network environment. Therefore, the present paper notes a few issues that require consideration in future research concerning performance improvements for IDSs based on blockchain technology.</p>
<p><italic>No Application in Real Environment:</italic> Most IDS models proposed for different network architectures that have adopted blockchain technology were applied in a virtual environment, but not in a real environment. In addition, each model suffers from its own limitations, such as lacking a framework of blockchain-based intrusion detection techniques (either an anomaly or signature).</p>
<p><italic>Increased Accuracy in IDSs Based on Blockchain Technology:</italic> An IDS can send false alarms, which means that it can detect an attack when there is none. [<xref ref-type="bibr" rid="ref-81">81</xref>] suggested that these false alarms can be prevented by using the signature detection blockchain nodes to verify alarms, but this has not been implemented. To verify whether an alarm is true, an approach must be designed based on blockchain technology that receives and verifies an alarm before exchanging it over a network.</p>
<p><italic>Data Management in CIDSs Based on Blockchain Technology:</italic> The nodes in CIDSs communicate and share data between each other to detect attacks. Blockchain technology emphasizes trust and privacy for sharing data over P2P networks. A mechanism should be proposed to reduce communication overhead by storing alarms and data efficiently. Another issue in data management is accountability in tracing data between nodes over a distributed network.</p>
<p><italic>Build a Hybrid Model Using Blockchain Technology and Other Models to Enhance Detection in IDSs:</italic> Anomaly and signature approaches utilize different techniques to detect attacks in a system. As aforementioned, there are a few techniques for adapting blockchain technology with IDSs. Therefore, other techniques can improve the performance of IDSs based on blockchain. For instance, researchers can design a hybrid model using blockchain and biological models to enhance detection with the anomaly approach; they can also employ a hybrid model using blockchain and data mining to enhance detection with the signature approach.</p>
<p><italic>Design Proof-of-Concepts for CIDS:</italic> Researchers must demonstrate the probability and effectiveness on CIDSs based on blockchain regarding different issues, such as energy, cost, complexity, speed, and scalability.</p>
</sec>
<sec id="s7">
<label>7</label>
<title>Conclusion</title>
<p>Recently, blockchain technology has emerged within several fields to ensure high level of security. This paper discussed the structure of blockchain, presented an overview of IDSs, and compared between existing blockchain-based IDS models. However, few research has been conducted on this topic, and no standard approaches or real applications have been demonstrated. In addition, this paper identified future directions that need to be addressed and investigated by researchers to improve the performance of IDSs based on blockchain technology. From the authors&#x2019; perspectives, the CIDS architecture is the most proper architecture for building general architecture for IDSs based on blockchain technology because CIDSs can share data between nodes over a P2P network, which is considered an important feature in a blockchain structure.</p>
</sec>
</body>
<back>
<ack>
<p>I express my gratitude to Universiti Sains Malaysia, Malaysia and Northern Border University, Saudi Arabia, for administrative and technical support.</p>
</ack><fn-group>
<fn fn-type="other">
<p><bold>Funding Statement:</bold> This work was supported by Universiti Sains Malaysia under external grant (Grant number 304/PNAV/650958/U154).</p>
</fn>
<fn fn-type="conflict">
<p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</fn>
<fn fn-type="other" id="fn-1">
<p>HDG: healthcare data gateway. PSN: application of pervasive social network, MedRec: is a distributed ledger protocol. BBSD:
blockchain-based data sharing for electronic medical records in cloud environments.</p></fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1">
<label>1</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>S. M.</given-names> 
<surname>Kolekar</surname></string-name>, <string-name>
<given-names>R. P.</given-names> 
<surname>More</surname></string-name>, <string-name>
<given-names>S. S.</given-names> 
<surname>Bachal</surname></string-name> and <string-name>
<given-names>A. V.</given-names> 
<surname>Yenkikar</surname></string-name>
</person-group>, &#x201C;
<article-title>Review paper on untwist Blockchain: A data handling process of Blockchain systems</article-title>,&#x201D; in <conf-name>2018 Int. Conf. on Information, Communication, Engineering and Technology (ICICET)</conf-name>, pp. 
<fpage>1</fpage>&#x2013;
<lpage>4</lpage>, 
<year>2018</year>. </mixed-citation>
</ref>
<ref id="ref-2">
<label>2</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>H. M.</given-names> 
<surname>Shreevyas</surname></string-name>, <string-name>
<given-names>C. S.</given-names> 
<surname>Kumar</surname></string-name>, <string-name>
<given-names>P.</given-names> 
<surname>Diat-Drdo</surname></string-name>, <string-name>
<given-names>R. A.</given-names> 
<surname>Shaikh</surname></string-name>, <string-name>
<given-names>B.</given-names> 
<surname>Acu</surname></string-name> <etal>et al.</etal>
</person-group><italic>,</italic> &#x201C;
<article-title>Can Blockchain technology be the future of network intrusion detection system: A review</article-title>,&#x201D; 
<source>International Journal of Applied Engineering Research</source>, vol. 
<volume>14</volume>, no. 
<issue>15</issue>, pp. 10179&#x2013;10187, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-3">
<label>3</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>W.</given-names> 
<surname>Meng</surname></string-name>, <string-name>
<given-names>E. W.</given-names> 
<surname>Tischhauser</surname></string-name>, <string-name>
<given-names>Q.</given-names> 
<surname>Wang</surname></string-name>, <string-name>
<given-names>Y.</given-names> 
<surname>Wang</surname></string-name> and <string-name>
<given-names>J.</given-names> 
<surname>Han</surname></string-name>
</person-group>, &#x201C;
<article-title>When intrusion detection meets Blockchain Technology: A review</article-title>,&#x201D; 
<source>IEEE Access</source>, vol. 
<volume>6</volume>, pp. 
<fpage>10179</fpage>&#x2013;
<lpage>10188</lpage>, 
<year>2018</year>.</mixed-citation>
</ref>
<ref id="ref-4">
<label>4</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>X.</given-names> 
<surname>Wang</surname></string-name>, <string-name>
<given-names>X.</given-names> 
<surname>Zha</surname></string-name>, <string-name>
<given-names>W.</given-names> 
<surname>Ni</surname></string-name>, <string-name>
<given-names>R.</given-names> 
<surname>Liu</surname></string-name>, <string-name>
<given-names>Y.</given-names> 
<surname>Guo</surname></string-name> <etal>et al.</etal>
</person-group><italic>,</italic> &#x201C;
<article-title>Survey on blockchain for Internet of Things</article-title>,&#x201D; 
<source>Computer Communications</source>, vol. 
<volume>136</volume>, no. 
<issue>7</issue>, pp. 
<fpage>10</fpage>&#x2013;
<lpage>29</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-5">
<label>5</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>M. A.</given-names> 
<surname>Khan</surname></string-name> and <string-name>
<given-names>K.</given-names> 
<surname>Salah</surname></string-name>
</person-group>, &#x201C;
<article-title>IoT security: Review, Blockchain solutions, and open challenges</article-title>,&#x201D; 
<source>Future Generation of Computer Systems</source>, vol. 
<volume>82</volume>, no. 
<issue>15</issue>, pp. 
<fpage>395</fpage>&#x2013;
<lpage>411</lpage>, 
<year>2018</year>.</mixed-citation>
</ref>
<ref id="ref-6">
<label>6</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>H.</given-names> 
<surname>Hui</surname></string-name>, <string-name>
<given-names>X.</given-names> 
<surname>An</surname></string-name>, <string-name>
<given-names>H.</given-names> 
<surname>Wang</surname></string-name>, <string-name>
<given-names>W.</given-names> 
<surname>Ju</surname></string-name>, <string-name>
<given-names>H.</given-names> 
<surname>Yang</surname></string-name> <etal>et al.</etal>
</person-group><italic>,</italic> &#x201C;
<article-title>Survey on Blockchain for Internet of Things</article-title>,&#x201D; 
<source>Journal of Internet Services and Information Security</source>, vol. 
<volume>9</volume>, no. 
<issue>2</issue>, pp. 
<fpage>1</fpage>&#x2013;
<lpage>30</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-7">
<label>7</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>W.</given-names> 
<surname>Yang</surname></string-name>, <string-name>
<given-names>E.</given-names> 
<surname>Aghasian</surname></string-name>, <string-name>
<given-names>S.</given-names> 
<surname>Garg</surname></string-name>, <string-name>
<given-names>D.</given-names> 
<surname>Herbert</surname></string-name>, <string-name>
<given-names>L.</given-names> 
<surname>Disiuta</surname></string-name> <etal>et al.</etal>
</person-group><italic>,</italic> &#x201C;
<article-title>A survey on Blockchain-based internet service architecture: Requirements, challenges, trends, and future</article-title>,&#x201D; 
<source>IEEE Access</source>, vol. 
<volume>7</volume>, pp. 
<fpage>75845</fpage>&#x2013;
<lpage>75872</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-8">
<label>8</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>J.</given-names> 
<surname>Sengupta</surname></string-name>, <string-name>
<given-names>S.</given-names> 
<surname>Ruj</surname></string-name> and <string-name>
<given-names>S. D.</given-names> 
<surname>Bit</surname></string-name>
</person-group>, &#x201C;
<article-title>A comprehensive survey on attacks, security issues and Blockchain solutions for IoT and IIoT</article-title>,&#x201D; 
<source>Journal of Network and Computing Applications</source>, vol. 
<volume>149</volume>, no. 
<issue>6</issue>, pp. 
<fpage>102481</fpage>, 
<year>2020</year>.</mixed-citation>
</ref>
<ref id="ref-9">
<label>9</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>I.</given-names> 
<surname>Islam</surname></string-name>, <string-name>
<given-names>K. M.</given-names> 
<surname>Munim</surname></string-name>, <string-name>
<given-names>S. J.</given-names> 
<surname>Oishwee</surname></string-name>, <string-name>
<given-names>A. N.</given-names> 
<surname>Islam</surname></string-name> and <string-name>
<given-names>M. N.</given-names> 
<surname>Islam</surname></string-name>
</person-group>, &#x201C;
<article-title>A critical review of concepts, benefits, and Pitfalls of Blockchain technology using concept map</article-title>,&#x201D; 
<source>IEEE Access</source>, vol. 
<volume>8</volume>, pp. 
<fpage>68333</fpage>&#x2013;
<lpage>68341</lpage>, 
<year>2020</year>.</mixed-citation>
</ref>
<ref id="ref-10">
<label>10</label><mixed-citation publication-type="other">
<person-group person-group-type="author"><string-name>
<given-names>S.</given-names> 
<surname>Nakamoto</surname></string-name>
</person-group>, &#x201C;
<article-title>Bitcoin: A peer-to-peer electronic cash system</article-title>,&#x201D; 
<year>2008</year>. [Online]. Available at: <uri>https://www.klausnordby.com/bitcoin/Bitcoin_Whitepaper_Document_HD.pdf</uri>.</mixed-citation>
</ref>
<ref id="ref-11">
<label>11</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>Q.</given-names> 
<surname>Feng</surname></string-name>, <string-name>
<given-names>D.</given-names> 
<surname>He</surname></string-name>, <string-name>
<given-names>S.</given-names> 
<surname>Zeadally</surname></string-name>, <string-name>
<given-names>M. K.</given-names> 
<surname>Khan</surname></string-name> and <string-name>
<given-names>N.</given-names> 
<surname>Kumar</surname></string-name>
</person-group>, &#x201C;
<article-title>A survey on privacy protection in Blockchain system</article-title>,&#x201D; 
<source>Journal of Network and Computer Applications</source>, vol. 
<volume>126</volume>, no. 
<issue>2</issue>, pp. 
<fpage>45</fpage>&#x2013;
<lpage>58</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-12">
<label>12</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>W.</given-names> 
<surname>Gao</surname></string-name>, <string-name>
<given-names>W. G.</given-names> 
<surname>Hatcher</surname></string-name> and <string-name>
<given-names>W.</given-names> 
<surname>Yu</surname></string-name>
</person-group>, &#x201C;
<article-title>A survey of Blockchain: techniques, applications, and challenges</article-title>,&#x201D; in <conf-name>2018 27th Int. Conf. on Computer Communication and Networks (ICCCN)</conf-name>, pp. 
<fpage>1</fpage>&#x2013;
<lpage>11</lpage>, 
<year>2018</year>. </mixed-citation>
</ref>
<ref id="ref-13">
<label>13</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>X.</given-names> 
<surname>Liang</surname></string-name>, <string-name>
<given-names>S.</given-names> 
<surname>Shetty</surname></string-name>, <string-name>
<given-names>D.</given-names> 
<surname>Tosh</surname></string-name>, <string-name>
<given-names>C.</given-names> 
<surname>Kamhoua</surname></string-name>, <string-name>
<given-names>K.</given-names> 
<surname>Kwiat</surname></string-name> <etal>et al.</etal>
</person-group><italic>,</italic> &#x201C;
<article-title>Provchain: A Blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability</article-title>,&#x201D; in <conf-name>Proc. of the 17th IEEE/ACM Int. sym. on cluster, cloud and grid computing</conf-name>, pp. 
<fpage>468</fpage>&#x2013;
<lpage>477</lpage>, 
<year>2017</year>. </mixed-citation>
</ref>
<ref id="ref-14">
<label>14</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>M.</given-names> 
<surname>Muzammal</surname></string-name>, <string-name>
<given-names>Q.</given-names> 
<surname>Qu</surname></string-name> and <string-name>
<given-names>B.</given-names> 
<surname>Nasrulin</surname></string-name>
</person-group>, &#x201C;
<article-title>Renovating Blockchain with distributed databases: An open-source system</article-title>,&#x201D; 
<source>Future Generation Computer Systems</source>, vol. 
<volume>90</volume>, no. 
<issue>Supplement C</issue>, pp. 
<fpage>105</fpage>&#x2013;
<lpage>117</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-15">
<label>15</label><mixed-citation publication-type="book">
<person-group person-group-type="author"><string-name>
<given-names>Z.</given-names> 
<surname>Zheng</surname></string-name>, <string-name>
<given-names>S.</given-names> 
<surname>Xie</surname></string-name>, <string-name>
<given-names>H.</given-names> 
<surname>Dai</surname></string-name>, <string-name>
<given-names>X.</given-names> 
<surname>Chen</surname></string-name> and <string-name>
<given-names>H.</given-names> 
<surname>Wang</surname></string-name>
</person-group>, &#x201C;<chapter-title>An overview of Blockchain technology: Architecture, consensus, and future trends</chapter-title>,&#x201D; in 
<source>2017 IEEE International Congress on Big Data (BigData Congress)</source>, pp. 
<fpage>557</fpage>&#x2013;
<lpage>564</lpage>, 
<year>2017</year>.</mixed-citation>
</ref>
<ref id="ref-16">
<label>16</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>Y.</given-names> 
<surname>Yuan</surname></string-name> and <string-name>
<given-names>F. Y.</given-names> 
<surname>Wang</surname></string-name>
</person-group>, &#x201C;
<article-title>Blockchain and cryptocurrencies: model, techniques, and applications</article-title>,&#x201D; 
<source>IEEE Transactions on Systems, Man, and Cybernetics: Systems</source>, vol. 
<volume>48</volume>, no. 
<issue>9</issue>, pp. 
<fpage>1421</fpage>&#x2013;
<lpage>1428</lpage>, 
<year>2018</year>.</mixed-citation>
</ref>
<ref id="ref-17">
<label>17</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>L.</given-names> 
<surname>Ismail</surname></string-name>, <string-name>
<given-names>H.</given-names> 
<surname>Hameed</surname></string-name>, <string-name>
<given-names>M.</given-names> 
<surname>AlShamsi</surname></string-name>, <string-name>
<given-names>M.</given-names> 
<surname>AlHammadi</surname></string-name> and <string-name>
<given-names>N.</given-names> 
<surname>AlDhanhani</surname></string-name>
</person-group>, &#x201C;
<article-title>Towards a Blockchain deployment at UAE university: Performance evaluation and Blockchain taxonomy</article-title>,&#x201D; in <conf-name>Proc. of the 2019 Int. Conf. on Blockchain Technology</conf-name>, pp. 
<fpage>30</fpage>&#x2013;
<lpage>38</lpage>, 
<year>2019</year>. </mixed-citation>
</ref>
<ref id="ref-18">
<label>18</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>F.</given-names> 
<surname>Glaser</surname></string-name>
</person-group>, &#x201C;
<article-title>Pervasive decentralisation of digital infrastructures: A framework for blockchain enabled system and use case analysis</article-title>,&#x201D; in <conf-name>Proc. of the 50th Hawaii Int. Conf. on System Sciences</conf-name>, 
<year>2017</year>. </mixed-citation>
</ref>
<ref id="ref-19">
<label>19</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>B. A.</given-names> 
<surname>Tama</surname></string-name>, <string-name>
<given-names>B. J.</given-names> 
<surname>Kweka</surname></string-name>, <string-name>
<given-names>Y.</given-names> 
<surname>Park</surname></string-name> and <string-name>
<given-names>K.</given-names> 
<surname>Rhee</surname></string-name>
</person-group>, &#x201C;
<article-title>A critical review of Blockchain and its current applications</article-title>,&#x201D; in <conf-name>2017 Int. Conf. on Electrical Engineering and Computer Science (ICECOS)</conf-name>, pp. 
<fpage>109</fpage>&#x2013;
<lpage>113</lpage>, 
<year>2017</year>. </mixed-citation>
</ref>
<ref id="ref-20">
<label>20</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>F.</given-names> 
<surname>Dai</surname></string-name>, <string-name>
<given-names>Y.</given-names> 
<surname>Shi</surname></string-name>, <string-name>
<given-names>N.</given-names> 
<surname>Meng</surname></string-name>, <string-name>
<given-names>L.</given-names> 
<surname>Wei</surname></string-name> and <string-name>
<given-names>Z.</given-names> 
<surname>Ye</surname></string-name>
</person-group>, &#x201C;
<article-title>From Bitcoin to cybersecurity: A comparative study of blockchain application and security issues</article-title>,&#x201D; in <conf-name>2017 4th Int. Conf. on Systems and Informatics (ICSAI)</conf-name>, pp. 
<fpage>975</fpage>&#x2013;
<lpage>979</lpage>, 
<year>2017</year>. </mixed-citation>
</ref>
<ref id="ref-21">
<label>21</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>C.</given-names> 
<surname>Elsden</surname></string-name>, <string-name>
<given-names>A.</given-names> 
<surname>Manohar</surname></string-name>, <string-name>
<given-names>J.</given-names> 
<surname>Briggs</surname></string-name>, <string-name>
<given-names>M.</given-names> 
<surname>Harding</surname></string-name>, <string-name>
<given-names>C.</given-names> 
<surname>Speed</surname></string-name> <etal>et al.</etal>
</person-group><italic>,</italic> &#x201C;
<article-title>Making sense of Blockchain applications: A typology for HCI</article-title>,&#x201D; in <conf-name>Proc. of the 2018 CHI Conf. on Human Factors in Computing Systems</conf-name>, pp. 
<fpage>458</fpage>, 
<year>2018</year>. </mixed-citation>
</ref>
<ref id="ref-22">
<label>22</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>A. Al</given-names> 
<surname>Omar</surname></string-name>, <string-name>
<given-names>M. S.</given-names> 
<surname>Rahman</surname></string-name>, <string-name>
<given-names>A.</given-names> 
<surname>Basu</surname></string-name> and <string-name>
<given-names>S.</given-names> 
<surname>Kiyomoto</surname></string-name>
</person-group>, &#x201C;
<article-title>Medibchain: A Blockchain based privacy preserving platform for healthcare data</article-title>,&#x201D; in <conf-name>Int. conf. on security, privacy and anonymity in computation, communication and storage</conf-name>, pp. 
<fpage>534</fpage>&#x2013;
<lpage>543</lpage>, 
<year>2017</year>. </mixed-citation>
</ref>
<ref id="ref-23">
<label>23</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>C. C.</given-names> 
<surname>Agbo</surname></string-name>, <string-name>
<given-names>Q. H.</given-names> 
<surname>Mahmoud</surname></string-name> and <string-name>
<given-names>J. M.</given-names> 
<surname>Eklund</surname></string-name>
</person-group>, &#x201C;
<article-title>Blockchain technology in healthcare: A systematic review</article-title>,&#x201D; 
<source>Healthcare</source>, vol. 
<volume>7</volume>, no. 
<issue>2</issue>, pp. 
<fpage>56</fpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-24">
<label>24</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>A.</given-names> 
<surname>Mohsin</surname></string-name>, <string-name>
<given-names>A.</given-names> 
<surname>Zaidan</surname></string-name>, <string-name>
<given-names>A.</given-names> 
<surname>Zaidan</surname></string-name>, <string-name>
<given-names>B.</given-names> 
<surname>Albahri</surname></string-name>, <string-name>
<given-names>O.</given-names> 
<surname>Albahri</surname></string-name> <etal>et al.</etal>
</person-group><italic>,</italic> &#x201C;
<article-title>Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions</article-title>,&#x201D; 
<source>Computer Standards &#x0026; Interfaces</source>, vol. 
<volume>1</volume>, no. 
<issue>64</issue>, pp. 
<fpage>41</fpage>&#x2013;
<lpage>60</lpage>, 
<year>2018</year>.</mixed-citation>
</ref>
<ref id="ref-25">
<label>25</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>A.</given-names> 
<surname>Alammary</surname></string-name>, <string-name>
<given-names>S.</given-names> 
<surname>Alhazmi</surname></string-name>, <string-name>
<given-names>M.</given-names> 
<surname>Almasri</surname></string-name> and <string-name>
<given-names>S.</given-names> 
<surname>Gillani</surname></string-name>
</person-group>, &#x201C;
<article-title>Blockchain-based applications in education: A systematic review</article-title>,&#x201D; 
<source>Application Science</source>, vol. 
<volume>9</volume>, no. 
<issue>12</issue>, pp. 
<fpage>2400</fpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-26">
<label>26</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>N. O.</given-names> 
<surname>Nawari</surname></string-name> and <string-name>
<given-names>S.</given-names> 
<surname>Ravindran</surname></string-name>
</person-group>, &#x201C;
<article-title>Blockchain technology and BIM process: Review and potential applications</article-title>,&#x201D; 
<source>Journal of Information Technology and Constraint Information Technology</source>, vol. 
<volume>24</volume>, no. 
<issue>12</issue>, pp. 
<fpage>209</fpage>&#x2013;
<lpage>238</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-27">
<label>27</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>J. A.</given-names> 
<surname>Jaoude</surname></string-name> and <string-name>
<given-names>R. G.</given-names> 
<surname>Saade</surname></string-name>
</person-group>, &#x201C;
<article-title>Blockchain applications-usage in different domains</article-title>,&#x201D; 
<source>IEEE Access</source>, vol. 
<volume>7</volume>, pp. 
<fpage>45360</fpage>&#x2013;
<lpage>45381</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-28">
<label>28</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>T. M.</given-names> 
<surname>Fern&#x00E1;ndez-Caram&#x00E9;s</surname></string-name> and <string-name>
<given-names>P.</given-names> 
<surname>Fraga-Lamas</surname></string-name>
</person-group>, &#x201C;
<article-title>A review on the application of Blockchain for the next generation of cybersecure industry 4.0 smart factories</article-title>,&#x201D; 
<source>IEEE Access</source>, vol. 
<volume>7</volume>, pp. 
<fpage>45201</fpage>&#x2013;
<lpage>45218</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-29">
<label>29</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>M.</given-names> 
<surname>Niranjanamurthy</surname></string-name>, <string-name>
<given-names>B. N.</given-names> 
<surname>Nithya</surname></string-name> and <string-name>
<given-names>S.</given-names> 
<surname>Jagannatha</surname></string-name>
</person-group>, &#x201C;
<article-title>Analysis of Blockchain technology: Pros, cons and SWOT</article-title>,&#x201D; 
<source>Cluster Computing</source>, vol. 22, no. 6, pp. 14743&#x2013;14757, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-30">
<label>30</label><mixed-citation publication-type="book">
<person-group person-group-type="author"><string-name>
<given-names>J.</given-names> 
<surname>Golosova</surname></string-name> and <string-name>
<given-names>A.</given-names> 
<surname>Romanovs</surname></string-name>
</person-group>, &#x201C;<chapter-title>The advantages and disadvantages of the Blockchain technology</chapter-title>,&#x201D; in 
<source>2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)</source>, pp. 
<fpage>1</fpage>&#x2013;
<lpage>6</lpage>, 
<year>2018</year>.</mixed-citation>
</ref>
<ref id="ref-31">
<label>31</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>J. J.</given-names> 
<surname>Xu</surname></string-name>
</person-group>, &#x201C;
<article-title>Are blockchains immune to all malicious attacks?</article-title>,&#x201D; 
<source>Financial Innovation</source>, vol. 
<volume>2</volume>, no. 
<issue>1</issue>, pp. 
<fpage>2</fpage>, 
<year>2016</year>.</mixed-citation>
</ref>
<ref id="ref-32">
<label>32</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>I.-C.</given-names> 
<surname>Lin</surname></string-name> and <string-name>
<given-names>T. C.</given-names> 
<surname>Liao</surname></string-name>
</person-group>, &#x201C;
<article-title>A survey of Blockchain security issues and challenges</article-title>,&#x201D; 
<source>International Journal of Network Security</source>, vol. 
<volume>19</volume>, no. 
<issue>5</issue>, pp. 
<fpage>653</fpage>&#x2013;
<lpage>659</lpage>, 
<year>2017</year>.</mixed-citation>
</ref>
<ref id="ref-33">
<label>33</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>H.</given-names> 
<surname>Wang</surname></string-name>, <string-name>
<given-names>Y.</given-names> 
<surname>Wang</surname></string-name>, <string-name>
<given-names>Z.</given-names> 
<surname>Cao</surname></string-name>, <string-name>
<given-names>Z.</given-names> 
<surname>Li</surname></string-name> and <string-name>
<given-names>G.</given-names> 
<surname>Xiong</surname></string-name>
</person-group>, &#x201C;
<article-title>An overview of Blockchain security analysis</article-title>,&#x201D; in <conf-name>China Cyber Security Annual Conf.</conf-name>, pp. 
<fpage>55</fpage>&#x2013;
<lpage>72</lpage>, 
<year>2018</year>. </mixed-citation>
</ref>
<ref id="ref-34">
<label>34</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>G.</given-names> 
<surname>Agrawal</surname></string-name>, <string-name>
<given-names>S. K.</given-names> 
<surname>Soni</surname></string-name> and <string-name>
<given-names>C.</given-names> 
<surname>Agrawal</surname></string-name>
</person-group>, &#x201C;
<article-title>A survey on attacks and approaches of intrusion detection systems</article-title>,&#x201D; 
<source>International Journal of Advanced Research in Computer Science</source>, vol. 
<volume>8</volume>, no. 
<issue>8, pp. 231&#x2013;253, </issue>
<year>2017</year>.</mixed-citation>
</ref>
<ref id="ref-35">
<label>35</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>S.</given-names> 
<surname>Tug</surname></string-name>, <string-name>
<given-names>W.</given-names> 
<surname>Meng</surname></string-name> and <string-name>
<given-names>Y.</given-names> 
<surname>Wang</surname></string-name>
</person-group>, &#x201C;
<article-title>CBSigIDS: towards collaborative Blockchained signature-based intrusion detection</article-title>,&#x201D; in <conf-name>2018 IEEE Int. Conf. on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)</conf-name>, 
<publisher-loc>Halifax, NS, Canada</publisher-loc>, pp. 
<fpage>1228</fpage>&#x2013;
<lpage>1235</lpage>, 
<year>2018</year>. </mixed-citation>
</ref>
<ref id="ref-36">
<label>36</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>E.</given-names> 
<surname>Vasilomanolakis</surname></string-name>, <string-name>
<given-names>S.</given-names> 
<surname>Karuppayah</surname></string-name>, <string-name>
<given-names>M.</given-names> 
<surname>M&#x00FC;hlh&#x00E4;user</surname></string-name> and <string-name>
<given-names>M.</given-names> 
<surname>Fischer</surname></string-name>
</person-group>, &#x201C;
<article-title>Taxonomy and survey of collaborative intrusion detection</article-title>,&#x201D; 
<source>ACM Computing Surveys CSUR</source>, vol. 
<volume>47</volume>, no. 
<issue>4</issue>, pp. 
<fpage>55</fpage>, 
<year>2015</year>.</mixed-citation>
</ref>
<ref id="ref-37">
<label>37</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>T. A.</given-names> 
<surname>Alamiedy</surname></string-name>, <string-name>
<given-names>M.</given-names> 
<surname>Anbar</surname></string-name>, <string-name>
<given-names>A. K.</given-names> 
<surname>Al-Ani</surname></string-name>, <string-name>
<given-names>B. N.</given-names> 
<surname>Al-Tamimi</surname></string-name> and <string-name>
<given-names>N.</given-names> 
<surname>Faleh</surname></string-name>
</person-group>, &#x201C;
<article-title>Review on feature selection algorithms for anomaly-based intrusion detection system</article-title>,&#x201D; in <conf-name>Int. Conf. of Reliable Information and Communication Technology</conf-name>, pp. 
<fpage>605</fpage>&#x2013;
<lpage>619</lpage>, 
<year>2018</year>. </mixed-citation>
</ref>
<ref id="ref-38">
<label>38</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>S.</given-names> 
<surname>Dharmapurikar</surname></string-name> and <string-name>
<given-names>J. W.</given-names> 
<surname>Lockwood</surname></string-name>
</person-group>, &#x201C;
<article-title>Fast and scalable pattern matching for network intrusion detection systems</article-title>,&#x201D; 
<source>IEEE Journal on Selected Areas in Communications</source>, vol. 
<volume>24</volume>, no. 
<issue>10</issue>, pp. 
<fpage>1781</fpage>&#x2013;
<lpage>1792</lpage>, 
<year>2006</year>.</mixed-citation>
</ref>
<ref id="ref-39">
<label>39</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>M.</given-names> 
<surname>Aldwairi</surname></string-name>, <string-name>
<given-names>A. M.</given-names> 
<surname>Abu-Dalo</surname></string-name> and <string-name>
<given-names>M.</given-names> 
<surname>Jarrah</surname></string-name>
</person-group>, &#x201C;
<article-title>Pattern matching of signature-based IDS using Myers algorithm under MapReduce framework</article-title>,&#x201D; 
<source>EURASIP Journal on Information Security</source>, vol. 
<volume>2017</volume>, no. 
<issue>1</issue>, pp. 
<fpage>2730</fpage>, 
<year>2017</year>.</mixed-citation>
</ref>
<ref id="ref-40">
<label>40</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>M.</given-names> 
<surname>Naik</surname></string-name> and <string-name>
<given-names>N.</given-names> 
<surname>Geethanjali</surname></string-name>
</person-group>, &#x201C;
<article-title>A multi-fusion pattern matching algorithm for signature-based network intrusion detection system</article-title>,&#x201D; 
<source>International Journal of Research in Engineering, IT and Social Sciences</source>, vol. 23, no. 
<issue>8</issue>, pp. 
<fpage>36</fpage>&#x2013;
<lpage>41</lpage>, 
<year>2016</year>.</mixed-citation>
</ref>
<ref id="ref-41">
<label>41</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>S.</given-names> 
<surname>Souissi</surname></string-name>, <string-name>
<given-names>L.</given-names> 
<surname>Sliman</surname></string-name> and <string-name>
<given-names>B.</given-names> 
<surname>Charroux</surname></string-name>
</person-group>, &#x201C;
<article-title>A novel security architecture based on multi-level rule expression language</article-title>,&#x201D; in <conf-name>Int. Conf. on Hybrid Intelligent Systems</conf-name>, pp. 
<fpage>259</fpage>&#x2013;
<lpage>269</lpage>, 
<year>2016</year>. </mixed-citation>
</ref>
<ref id="ref-42">
<label>42</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>S.</given-names> 
<surname>Geetha</surname></string-name>, <string-name>
<given-names>U. N.</given-names> 
<surname>Dulhare</surname></string-name> and <string-name>
<given-names>S. S. S.</given-names> 
<surname>Sindhu</surname></string-name>
</person-group>, &#x201C;
<article-title>Intrusion detection using NBHoeffding rule-based decision tree for wireless sensor networks</article-title>,&#x201D; in <conf-name>2018 Second Int. Conf. on Advances in Electronics, Computers and Communications (ICAECC)</conf-name>, pp. 
<fpage>1</fpage>&#x2013;
<lpage>5</lpage>, 
<year>2018</year>. </mixed-citation>
</ref>
<ref id="ref-43">
<label>43</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>S.</given-names> 
<surname>Eckmann</surname></string-name>, <string-name>
<given-names>G.</given-names> 
<surname>Vigna</surname></string-name> and <string-name>
<given-names>R.</given-names> 
<surname>Kemmerer</surname></string-name>
</person-group>, &#x201C;
<article-title>An attack language for state-based intrusion detection</article-title>,&#x201D; in <conf-name>Proc. of the 2000 ACM Workshop on Intrusion Detection</conf-name>, 
<publisher-name>ACM</publisher-name>, 
<year>2000</year>. </mixed-citation>
</ref>
<ref id="ref-44">
<label>44</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>C.-T.</given-names> 
<surname>Lu</surname></string-name>, <string-name>
<given-names>A. P.</given-names> 
<surname>Boedihardjo</surname></string-name> and <string-name>
<given-names>P.</given-names> 
<surname>Manalwar</surname></string-name>
</person-group>, &#x201C;
<article-title>Exploiting efficient data mining techniques to enhance intrusion detection systems</article-title>,&#x201D; in <conf-name>IRI-2005 IEEE Int. Conf. on Information Reuse and Integration, Conf.</conf-name>, pp. 
<fpage>512</fpage>&#x2013;
<lpage>517</lpage>, 
<year>2005</year>. </mixed-citation>
</ref>
<ref id="ref-45">
<label>45</label><mixed-citation publication-type="book">
<person-group person-group-type="author"><string-name>
<given-names>R.</given-names> 
<surname>Sahani</surname></string-name>, <string-name>
<given-names>C.</given-names> 
<surname>Rout</surname></string-name>, <string-name>
<given-names>J. C.</given-names> 
<surname>Badajena</surname></string-name>, <string-name>
<given-names>A. K.</given-names> 
<surname>Jena</surname></string-name>, <string-name>
<given-names>H.</given-names> 
<surname>Das</surname></string-name> <etal>et al.</etal>
</person-group><italic>,</italic> &#x201C;<chapter-title>Classification of intrusion detection using data mining techniques</chapter-title>,&#x201D; in 
<source>Progress in Computing, Analytics and Networking, Springer</source>, pp. 
<fpage>753</fpage>&#x2013;
<lpage>764</lpage>, 
<year>2018</year>.</mixed-citation>
</ref>
<ref id="ref-46">
<label>46</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>F.</given-names> 
<surname>Salo</surname></string-name>, <string-name>
<given-names>M.</given-names> 
<surname>Injadat</surname></string-name>, <string-name>
<given-names>A. B.</given-names> 
<surname>Nassif</surname></string-name>, <string-name>
<given-names>A.</given-names> 
<surname>Shami</surname></string-name> and <string-name>
<given-names>A.</given-names> 
<surname>Essex</surname></string-name>
</person-group>, &#x201C;
<article-title>Data Mining techniques in intrusion detection systems: A systematic literature review</article-title>,&#x201D; 
<source>IEEE Access</source>, vol. 
<volume>6</volume>, pp. 
<fpage>56046</fpage>&#x2013;
<lpage>56058</lpage>, 
<year>2018</year>.</mixed-citation>
</ref>
<ref id="ref-47">
<label>47</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>M.</given-names> 
<surname>Anbar</surname></string-name>, <string-name>
<given-names>R.</given-names> 
<surname>Abdullah</surname></string-name>, <string-name>
<given-names>I. H.</given-names> 
<surname>Hasbullah</surname></string-name>, <string-name>
<given-names>Y. W.</given-names> 
<surname>Chong</surname></string-name> and <string-name>
<given-names>O. E.</given-names> 
<surname>Elejla</surname></string-name>
</person-group>, &#x201C;
<article-title>Comparative performance analysis of classification algorithms for intrusion detection system</article-title>,&#x201D; in <conf-name>2016 14th Annual Conf. on Privacy, Security and Trust (PST)</conf-name>, pp. 
<fpage>282</fpage>&#x2013;
<lpage>288</lpage>, 
<year>2016</year>. </mixed-citation>
</ref>
<ref id="ref-48">
<label>48</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>P.</given-names> 
<surname>Garcia-Teodoro</surname></string-name>, <string-name>
<given-names>J.</given-names> 
<surname>Diaz-Verdejo</surname></string-name>, <string-name>
<given-names>G.</given-names> 
<surname>Maci&#x00E1;-Fern&#x00E1;ndez</surname></string-name> and <string-name>
<given-names>E.</given-names> 
<surname>V&#x00E1;zquez</surname></string-name>
</person-group>, &#x201C;
<article-title>Anomaly-based network intrusion detection: Techniques, systems and challenges</article-title>,&#x201D; 
<source>Computers &#x0026; Security</source>, vol. 
<volume>28</volume>, no. 
<issue>1&#x2013;2</issue>, pp. 
<fpage>18</fpage>&#x2013;
<lpage>28</lpage>, 
<year>2009</year>.</mixed-citation>
</ref>
<ref id="ref-49">
<label>49</label><mixed-citation publication-type="book">
<person-group person-group-type="author"><string-name>
<given-names>M.-L.</given-names> 
<surname>Shyu</surname></string-name>, <string-name>
<given-names>S. C.</given-names> 
<surname>Chen</surname></string-name>, <string-name>
<given-names>K.</given-names> 
<surname>Sarinnapakorn</surname></string-name> and <string-name>
<given-names>L.</given-names> 
<surname>Chang</surname></string-name>
</person-group>, 
<source>A novel anomaly detection scheme based on principal component classifier</source>. 
<publisher-name>Miami Univ Coral Gables Fl Dept of Electrical and Computer Engineering</publisher-name>, 
<year>2003</year>.</mixed-citation>
</ref>
<ref id="ref-50">
<label>50</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>N.</given-names> 
<surname>Ye</surname></string-name> and <string-name>
<given-names>Q.</given-names> 
<surname>Chen</surname></string-name>
</person-group>, &#x201C;
<article-title>An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems</article-title>,&#x201D; 
<source>Quality and Reliability Engineering International</source>, vol. 
<volume>17</volume>, no. 
<issue>2</issue>, pp. 
<fpage>105</fpage>&#x2013;
<lpage>112</lpage>, 
<year>2001</year>.</mixed-citation>
</ref>
<ref id="ref-51">
<label>51</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>A.</given-names> 
<surname>Boukerche</surname></string-name>, <string-name>
<given-names>R. B.</given-names> 
<surname>Machado</surname></string-name>, <string-name>
<given-names>K. R.</given-names> 
<surname>Juc&#x00E1;</surname></string-name>, <string-name>
<given-names>J. B. M.</given-names> 
<surname>Sobral</surname></string-name> and <string-name>
<given-names>M. S.</given-names> 
<surname>Notare</surname></string-name>
</person-group>, &#x201C;
<article-title>An agent based and biological inspired real-time intrusion detection and security model for computer network operations</article-title>,&#x201D; 
<source>Computer Communications</source>, vol. 
<volume>30</volume>, no. 
<issue>13</issue>, pp. 
<fpage>2649</fpage>&#x2013;
<lpage>2660</lpage>, 
<year>2007</year>.</mixed-citation>
</ref>
<ref id="ref-52">
<label>52</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>E. A. E. R.</given-names> 
<surname>Abas</surname></string-name>, <string-name>
<given-names>H.</given-names> 
<surname>Abdelkader</surname></string-name> and <string-name>
<given-names>A.</given-names> 
<surname>Keshk</surname></string-name>
</person-group>, &#x201C;
<article-title>Artificial immune system-based intrusion detection</article-title>,&#x201D; in <conf-name>2015 IEEE Seventh Int. Conf. on Intelligent Computing and Information Systems (ICICIS)</conf-name>, pp. 
<fpage>542</fpage>&#x2013;
<lpage>546</lpage>, 
<year>2015</year>. </mixed-citation>
</ref>
<ref id="ref-53">
<label>53</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>P.</given-names> 
<surname>Saurabh</surname></string-name> and <string-name>
<given-names>B.</given-names> 
<surname>Verma</surname></string-name>
</person-group>, &#x201C;
<article-title>Immunity inspired cooperative agent-based security system</article-title>,&#x201D; 
<source>International Arab Journal of Information Technology</source>, vol. 
<volume>15</volume>, no. 
<issue>2</issue>, pp. 
<fpage>289</fpage>&#x2013;
<lpage>295</lpage>, 
<year>2018</year>.</mixed-citation>
</ref>
<ref id="ref-54">
<label>54</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>M.</given-names> 
<surname>Jha</surname></string-name> and <string-name>
<given-names>R.</given-names> 
<surname>Acharya</surname></string-name>
</person-group>, &#x201C;
<article-title>An immune inspired unsupervised intrusion detection system for detection of novel attacks</article-title>,&#x201D; in <conf-name>2016 IEEE Conf. on Intelligence and Security Informatics (ISI)</conf-name>, pp. 
<fpage>292</fpage>&#x2013;
<lpage>297</lpage>, 
<year>2016</year>. </mixed-citation>
</ref>
<ref id="ref-55">
<label>55</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>M. H.</given-names> 
<surname>Chen</surname></string-name>, <string-name>
<given-names>P. C.</given-names> 
<surname>Chang</surname></string-name> and <string-name>
<given-names>J. L.</given-names> 
<surname>Wu</surname></string-name>
</person-group>, &#x201C;
<article-title>A population-based incremental learning approach with artificial immune system for network intrusion detection</article-title>,&#x201D; 
<source>Engineering Applications of Artificial Intelligence</source>, vol. 
<volume>51</volume>, no. 
<issue>1</issue>, pp. 
<fpage>171</fpage>&#x2013;
<lpage>181</lpage>, 
<year>2016</year>.</mixed-citation>
</ref>
<ref id="ref-56">
<label>56</label><mixed-citation publication-type="other">
<person-group person-group-type="author"><string-name>
<given-names>M.</given-names> 
<surname>Zamani</surname></string-name> and <string-name>
<given-names>M.</given-names> 
<surname>Movahedi</surname></string-name>
</person-group>, &#x201C;
<article-title>Machine learning techniques for intrusion detection</article-title>,&#x201D; 
<year>2013</year>. [Online]. Available at: <uri>https://arxiv.org/abs/1312.2177</uri>.</mixed-citation>
</ref>
<ref id="ref-57">
<label>57</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>F.</given-names> 
<surname>Hosseinpour</surname></string-name>, <string-name>
<given-names>P. V.</given-names> 
<surname>Amoli</surname></string-name>, <string-name>
<given-names>F.</given-names> 
<surname>Farahnakian</surname></string-name>, <string-name>
<given-names>J.</given-names> 
<surname>Plosila</surname></string-name> and <string-name>
<given-names>T.</given-names> 
<surname>H&#x00E4;m&#x00E4;l&#x00E4;inen</surname></string-name>
</person-group>, &#x201C;
<article-title>Artificial immune system based intrusion detection: Innate immunity using an unsupervised learning approach</article-title>,&#x201D; 
<source>International Journal of Digital Content Technology and its Applications</source>, vol. 
<volume>8</volume>, no. 
<issue>5</issue>, pp. 
<fpage>1</fpage>, 
<year>2014</year>.</mixed-citation>
</ref>
<ref id="ref-58">
<label>58</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>H. H.</given-names> 
<surname>Pajouh</surname></string-name>, <string-name>
<given-names>G.</given-names> 
<surname>Dastghaibyfard</surname></string-name> and <string-name>
<given-names>S.</given-names> 
<surname>Hashemi</surname></string-name>
</person-group>, &#x201C;
<article-title>Two-tier network anomaly detection model: A machine learning approach</article-title>,&#x201D; 
<source>Journal of Intelligent Information Systems</source>, vol. 
<volume>48</volume>, no. 
<issue>1</issue>, pp. 
<fpage>61</fpage>&#x2013;
<lpage>74</lpage>, 
<year>2017</year>.</mixed-citation>
</ref>
<ref id="ref-59">
<label>59</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>N.</given-names> 
<surname>Farnaaz</surname></string-name> and <string-name>
<given-names>M.</given-names> 
<surname>Jabbar</surname></string-name>
</person-group>, &#x201C;
<article-title>Random forest modeling for network intrusion detection system</article-title>,&#x201D; 
<source>Procedia Computer Science</source>, vol. 
<volume>89</volume>, no. 
<issue>1</issue>, pp. 
<fpage>213</fpage>&#x2013;
<lpage>217</lpage>, 
<year>2016</year>.</mixed-citation>
</ref>
<ref id="ref-60">
<label>60</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>I.</given-names> 
<surname>Iervolino</surname></string-name>, <string-name>
<given-names>D.</given-names> 
<surname>Accardo</surname></string-name>, <string-name>
<given-names>A. E.</given-names> 
<surname>Tirri</surname></string-name>, <string-name>
<given-names>G.</given-names> 
<surname>Pio</surname></string-name> and <string-name>
<given-names>E.</given-names> 
<surname>Salzano</surname></string-name>
</person-group>, &#x201C;
<article-title>Quantitative risk analysis for the Amerigo Vespucci (Florence, Italy) airport including domino effects</article-title>,&#x201D; 
<source>Safety Science</source>, vol. 
<volume>113</volume>, no. 
<issue>4</issue>, pp. 
<fpage>472</fpage>&#x2013;
<lpage>489</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-61">
<label>61</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>M.</given-names> 
<surname>Anbar</surname></string-name>, <string-name>
<given-names>R.</given-names> 
<surname>Abdullah</surname></string-name>, <string-name>
<given-names>B. N.</given-names> 
<surname>Al-Tamimi</surname></string-name> and <string-name>
<given-names>A.</given-names> 
<surname>Hussain</surname></string-name>
</person-group>, &#x201C;
<article-title>A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks</article-title>,&#x201D; 
<source>Cognitive Computation</source>, vol. 
<volume>10</volume>, no. 
<issue>2</issue>, pp. 
<fpage>201</fpage>&#x2013;
<lpage>214</lpage>, 
<year>2018</year>.</mixed-citation>
</ref>
<ref id="ref-62">
<label>62</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>M.</given-names> 
<surname>Elhamahmy</surname></string-name>, <string-name>
<given-names>H. N.</given-names> 
<surname>Elmahdy</surname></string-name> and <string-name>
<given-names>I. A.</given-names> 
<surname>Saroit</surname></string-name>
</person-group>, &#x201C;
<article-title>A new approach for evaluating intrusion detection system</article-title>,&#x201D; 
<source>International Journal of Artificial Intelligent Systems and Machine Learning</source>, vol. 
<volume>2</volume>, no. 
<issue>11</issue>, pp. 
<fpage>290</fpage>&#x2013;
<lpage>298</lpage>, 
<year>2010</year>.</mixed-citation>
</ref>
<ref id="ref-63">
<label>63</label><mixed-citation publication-type="book">
<person-group person-group-type="author"><string-name>
<given-names>B.</given-names> 
<surname>Abdullah</surname></string-name>, <string-name>
<given-names>I.</given-names> 
<surname>Abd-Alghafar</surname></string-name>, <string-name>
<given-names>G. I.</given-names> 
<surname>Salama</surname></string-name> and <string-name>
<given-names>A.</given-names> 
<surname>Abd-Alhafez</surname></string-name>
</person-group>, &#x201C;<chapter-title>Performance evaluation of a genetic algorithm based approach to network intrusion detection system</chapter-title>,&#x201D; in 
<source>Int. Conf. on Aerospace Sciences and Aviation Technology, vol. 13, no. aerospace sciences &#x0026; aviation technology, ASAT-13</source>. 
<publisher-name>The Military Technical College</publisher-name>, pp. 
<fpage>1</fpage>&#x2013;
<lpage>17, </lpage>
<year>May 26&#x2013;28, 2009</year>.</mixed-citation>
</ref>
<ref id="ref-64">
<label>64</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>N.</given-names> 
<surname>Gupta</surname></string-name>, <string-name>
<given-names>K.</given-names> 
<surname>Srivastava</surname></string-name> and <string-name>
<given-names>A.</given-names> 
<surname>Sharma</surname></string-name>
</person-group>, &#x201C;
<article-title>Reducing false positive in intrusion detection system: a survey</article-title>,&#x201D; 
<source>International Journal of Computer Science and Information Technologies</source>, vol. 
<volume>7</volume>, no. 
<issue>3</issue>, pp. 
<fpage>1600</fpage>&#x2013;
<lpage>1603</lpage>, 
<year>2016</year>.</mixed-citation>
</ref>
<ref id="ref-65">
<label>65</label><mixed-citation publication-type="book">
<person-group person-group-type="author"><string-name>
<given-names>A. A.</given-names> 
<surname>Ghorbani</surname></string-name>, <string-name>
<given-names>W.</given-names> 
<surname>Lu</surname></string-name> and <string-name>
<given-names>M.</given-names> 
<surname>Tavallaee</surname></string-name>
</person-group>, 
<source>Network Intrusion Detection and Prevention</source>. Vol. 
<volume>47</volume>. 
<publisher-loc>Boston, MA</publisher-loc>: 
<publisher-name>Springer US</publisher-name>, 
<year>2010</year>.</mixed-citation>
</ref>
<ref id="ref-66">
<label>66</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>N.</given-names> 
<surname>Sultana</surname></string-name>, <string-name>
<given-names>N.</given-names> 
<surname>Chilamkurti</surname></string-name>, <string-name>
<given-names>W.</given-names> 
<surname>Peng</surname></string-name> and <string-name>
<given-names>R.</given-names> 
<surname>Alhadad</surname></string-name>
</person-group>, &#x201C;
<article-title>Survey on SDN based network intrusion detection system using machine learning approaches</article-title>,&#x201D; 
<source>Peer-to-Peer Networking and Applications</source>, vol. 
<volume>12</volume>, no. 
<issue>2</issue>, pp. 
<fpage>493</fpage>&#x2013;
<lpage>501</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-67">
<label>67</label><mixed-citation publication-type="other">
<person-group person-group-type="author"><string-name>
<given-names>E.</given-names> 
<surname>Hodo</surname></string-name>, <string-name>
<given-names>X.</given-names> 
<surname>Bellekens</surname></string-name>, <string-name>
<given-names>A.</given-names> 
<surname>Hamilton</surname></string-name>, <string-name>
<given-names>C.</given-names> 
<surname>Tachtatzis</surname></string-name> and <string-name>
<given-names>R.</given-names> 
<surname>Atkinson</surname></string-name>
</person-group>, &#x201C;
<article-title>Shallow and deep networks intrusion detection system: A taxonomy and survey</article-title>,&#x201D; 
<year>2017</year>. [Online]. Available at: <uri>https://arxiv.org/abs/1701.02145</uri>.</mixed-citation>
</ref>
<ref id="ref-68">
<label>68</label><mixed-citation publication-type="other">
<person-group person-group-type="author"><string-name>
<given-names>T.</given-names> 
<surname>Golomb</surname></string-name>, <string-name>
<given-names>Y.</given-names> 
<surname>Mirsky</surname></string-name> and <string-name>
<given-names>Y.</given-names> 
<surname>Elovici</surname></string-name>
</person-group>, &#x201C;
<article-title>CIoTA: Collaborative IoT anomaly detection via Blockchain</article-title>,&#x201D; 
<year>2018</year>. [Online]. Available at: <uri>https://arxiv.org/abs/1803.03807</uri>.</mixed-citation>
</ref>
<ref id="ref-69">
<label>69</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>T.</given-names> 
<surname>Id&#x00E9;</surname></string-name>
</person-group>, &#x201C;
<article-title>Collaborative Anomaly Detection on Blockchain from Noisy Sensor Data</article-title>,&#x201D; in <conf-name>2018 IEEE Int. Conf. on Data Mining Workshops (ICDMW)</conf-name>, pp. 
<fpage>120</fpage>&#x2013;
<lpage>127</lpage>, 
<year>2018</year>. </mixed-citation>
</ref>
<ref id="ref-70">
<label>70</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>R.</given-names> 
<surname>Kumari</surname></string-name> and <string-name>
<given-names>M.</given-names> 
<surname>Catherine</surname></string-name>
</person-group>, &#x201C;
<article-title>Anomaly detection in Blockchain using clustering protocol</article-title>,&#x201D; 
<source>International Journal of Pure and Applied Mathematics</source>, vol. 
<volume>118</volume>, no. 
<issue>20</issue>, pp. 
<fpage>391</fpage>&#x2013;
<lpage>396</lpage>, 
<year>2018</year>.</mixed-citation>
</ref>
<ref id="ref-71">
<label>71</label><mixed-citation publication-type="book">
<person-group person-group-type="author"><string-name>
<given-names>S.</given-names> 
<surname>Dey</surname></string-name>
</person-group>, &#x201C;<chapter-title>Securing majority-attack in blockchain using machine learning and algorithmic game theory: A proof of work</chapter-title>,&#x201D; in 
<source>2018 10th Computer Science and Electronic Engineering (CEEC)</source>, pp. 
<fpage>7</fpage>&#x2013;
<lpage>10</lpage>, 
<year>2018</year>.</mixed-citation>
</ref>
<ref id="ref-72">
<label>72</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>M.</given-names> 
<surname>Signorini</surname></string-name>, <string-name>
<given-names>M.</given-names> 
<surname>Pontecorvi</surname></string-name>, <string-name>
<given-names>W.</given-names> 
<surname>Kanoun</surname></string-name> and <string-name>
<given-names>R.</given-names> 
<surname>Di-Pietro</surname></string-name>
</person-group>, &#x201C;
<article-title>BAD: Blockchain anomaly detection</article-title>,&#x201D; 
<source>IEEE Access</source>, vol. 
<volume>8</volume>, pp. 
<fpage>173481</fpage>&#x2013;
<lpage>173490</lpage>, 
<year>2020</year>.</mixed-citation>
</ref>
<ref id="ref-73">
<label>73</label><mixed-citation publication-type="book">
<person-group person-group-type="author"><string-name>
<given-names>M.</given-names> 
<surname>Signorini</surname></string-name>, <string-name>
<given-names>M.</given-names> 
<surname>Pontecorvi</surname></string-name>, <string-name>
<given-names>W.</given-names> 
<surname>Kanoun</surname></string-name> and <string-name>
<given-names>R.</given-names> 
<surname>Di-Pietro</surname></string-name>
</person-group>, &#x201C;<chapter-title>ADvISE: Anomaly Detection tool for Blockchain SystEms</chapter-title>,&#x201D; in 
<source>2018 IEEE World Congress on Services (SERVICES)</source>, pp. 
<fpage>65</fpage>&#x2013;
<lpage>66</lpage>, 
<year>2018</year>.</mixed-citation>
</ref>
<ref id="ref-74">
<label>74</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>V.</given-names> 
<surname>Kanth</surname></string-name>, <string-name>
<given-names>A.</given-names> 
<surname>Mcabee</surname></string-name>, <string-name>
<given-names>M.</given-names> 
<surname>Tummala</surname></string-name> and <string-name>
<given-names>J.</given-names> 
<surname>Mceachen</surname></string-name>
</person-group>, &#x201C;
<article-title>Collaborative Intrusion Detection leveraging Blockchain and Pluggable Authentication Modules</article-title>,&#x201D; in <conf-name>Proc. of the 53rd Hawaii Int. Conf. on System Sciences</conf-name>, 
<year>2020</year>. </mixed-citation>
</ref>
<ref id="ref-75">
<label>75</label><mixed-citation publication-type="book">
<person-group person-group-type="author"><string-name>
<given-names>M.</given-names> 
<surname>Steichen</surname></string-name>, <string-name>
<given-names>S.</given-names> 
<surname>Homme</surname></string-name> and <string-name>
<given-names>R.</given-names> 
<surname>State</surname></string-name>
</person-group>, &#x201C;<chapter-title>ChainGuard &#x2014; a firewall for blockchain applications using SDN with OpenFlow</chapter-title>,&#x201D; in 
<source>2017 Principles, Systems and Applications of IP Telecommunications (IPTComm)</source>, pp. 
<fpage>1</fpage>&#x2013;
<lpage>8</lpage>, 
<year>Sep. 2017</year>.</mixed-citation>
</ref>
<ref id="ref-76">
<label>76</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>L.</given-names> 
<surname>Zhu</surname></string-name>, <string-name>
<given-names>Y.</given-names> 
<surname>Wu</surname></string-name>, <string-name>
<given-names>K.</given-names> 
<surname>Gai</surname></string-name> and <string-name>
<given-names>K. R.</given-names> 
<surname>Choo</surname></string-name>
</person-group>, &#x201C;
<article-title>Controllable and trustworthy blockchain-based cloud data management</article-title>,&#x201D; 
<source>Future Generation Computer Systems</source>, vol. 
<volume>91</volume>, no. 
<issue>99</issue>, pp. 
<fpage>527</fpage>&#x2013;
<lpage>535</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-77">
<label>77</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>N.</given-names> 
<surname>Moustafa</surname></string-name>, <string-name>
<given-names>K. K. R.</given-names> 
<surname>Choo</surname></string-name>, <string-name>
<given-names>I.</given-names> 
<surname>Radwan</surname></string-name> and <string-name>
<given-names>S.</given-names> 
<surname>Camtepe</surname></string-name>
</person-group>, &#x201C;
<article-title>Outlier dirichlet mixture mechanism: Adversarial statistical learning for anomaly detection in the fog</article-title>,&#x201D; 
<source>IEEE Transactions on Information Forensics and Security</source>, vol. 
<volume>14</volume>, no. 
<issue>8</issue>, pp. 
<fpage>1975</fpage>&#x2013;
<lpage>1987</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-78">
<label>78</label><mixed-citation publication-type="other">
<person-group person-group-type="author"><string-name>
<given-names>T.</given-names> 
<surname>Pham</surname></string-name> and <string-name>
<given-names>S.</given-names> 
<surname>Lee</surname></string-name>
</person-group>, &#x201C;
<article-title>Anomaly detection in the Bitcoin system-a network perspective</article-title>,&#x201D; 
<year>2016</year>. [Online]. Available at: <uri>https://arxiv.org/abs/1611.03942</uri>.</mixed-citation>
</ref>
<ref id="ref-79">
<label>79</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>B.</given-names> 
<surname>Hu</surname></string-name>, <string-name>
<given-names>C.</given-names> 
<surname>Zhou</surname></string-name>, <string-name>
<given-names>Y. C.</given-names> 
<surname>Tian</surname></string-name>, <string-name>
<given-names>Y.</given-names> 
<surname>Qin</surname></string-name> and <string-name>
<given-names>X.</given-names> 
<surname>Junping</surname></string-name>
</person-group>, &#x201C;
<article-title>A collaborative intrusion detection approach using Blockchain for multimicrogrid systems</article-title>,&#x201D; 
<source>EEE Transactions on Systems, Man, and Cybernetics: Systems</source>, vol. 
<volume>49</volume>, no. 
<issue>8</issue>, pp. 
<fpage>1</fpage>&#x2013;
<lpage>11</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-80">
<label>80</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>C.</given-names> 
<surname>Turner</surname></string-name>, <string-name>
<given-names>R.</given-names> 
<surname>Jeremiah</surname></string-name>, <string-name>
<given-names>D.</given-names> 
<surname>Richards</surname></string-name> and <string-name>
<given-names>A.</given-names> 
<surname>Joseph</surname></string-name>
</person-group>, &#x201C;
<article-title>A rule status monitoring algorithm for rule-based intrusion detection and prevention systems</article-title>,&#x201D; 
<source>Procedia Computer Science</source>, vol. 
<volume>95</volume>, pp. 
<fpage>361</fpage>&#x2013;
<lpage>368</lpage>, 
<year>2016</year>.</mixed-citation>
</ref>
<ref id="ref-81">
<label>81</label><mixed-citation publication-type="book">
<person-group person-group-type="author"><string-name>
<given-names>N.</given-names> 
<surname>Alexopoulos</surname></string-name>, <string-name>
<given-names>E.</given-names> 
<surname>Vasilomanolakis</surname></string-name>, <string-name>
<given-names>N. R.</given-names> 
<surname>Iv&#x00E1;nk&#x00F3;</surname></string-name> and <string-name>
<given-names>M.</given-names> 
<surname>M&#x00FC;hlh&#x00E4;user</surname></string-name>
</person-group>, &#x201C;<chapter-title>Towards Blockchain-based collaborative intrusion detection systems</chapter-title>,&#x201D; in 
<source>Critical Information Infrastructures Security</source>, 
<person-group person-group-type="editor"><string-name>
<given-names>G.</given-names> 
<surname>D&#x2019;Agostino</surname></string-name>, <string-name>
<given-names>A.</given-names> 
<surname>Scala</surname></string-name>
</person-group>, 
<volume>10707</volume>. 
<publisher-loc>Cham</publisher-loc>: 
<publisher-name>Springer International Publishing</publisher-name>, pp. 
<fpage>107</fpage>&#x2013;
<lpage>118</lpage>, 
<year>2018</year>.</mixed-citation>
</ref>
<ref id="ref-82">
<label>82</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>W.</given-names> 
<surname>Li</surname></string-name>, <string-name>
<given-names>S.</given-names> 
<surname>Tug</surname></string-name>, <string-name>
<given-names>W.</given-names> 
<surname>Meng</surname></string-name> and <string-name>
<given-names>Y.</given-names> 
<surname>Wang</surname></string-name>
</person-group>, &#x201C;
<article-title>Designing collaborative blockchained signature-based intrusion detection in IoT environments</article-title>,&#x201D; 
<source>Future Generation Computer Systems</source>, vol. 
<volume>96</volume>, no. 
<issue>3</issue>, pp. 
<fpage>481</fpage>&#x2013;
<lpage>489</lpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-83">
<label>83</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>A.</given-names> 
<surname>Khraisat</surname></string-name>, <string-name>
<given-names>I.</given-names> 
<surname>Gondal</surname></string-name>, <string-name>
<given-names>P.</given-names> 
<surname>Vamplew</surname></string-name> and <string-name>
<given-names>J.</given-names> 
<surname>Kamruzzaman</surname></string-name>
</person-group>, &#x201C;
<article-title>Survey of intrusion detection systems: techniques, datasets and challenges</article-title>,&#x201D; 
<source>Cybersecurity</source>, vol. 
<volume>2</volume>, no. 
<issue>1</issue>, pp. 
<fpage>384</fpage>, 
<year>2019</year>.</mixed-citation>
</ref>
<ref id="ref-84">
<label>84</label><mixed-citation publication-type="other">
<person-group person-group-type="author">
<collab>What is a Distributed System? How a Distributed System Works</collab>
</person-group>, &#x201C;
<article-title>Articles for Developers Building High Performance Systems</article-title>,&#x201D; 
<year>2019</year>. [Online]. Available at: <uri>https://blog.stackpath.com/distributed-system/</uri>.</mixed-citation>
</ref>
<ref id="ref-85">
<label>85</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>S.</given-names> 
<surname>Al-E&#x2019;mari</surname></string-name>, <string-name>
<given-names>M.</given-names> 
<surname>Anbar</surname></string-name>, <string-name>
<given-names>Y.</given-names> 
<surname>Sanjalawe</surname></string-name> and <string-name>
<given-names>S.</given-names> 
<surname>Manickam</surname></string-name>
</person-group>, &#x201C;
<article-title>A labeled transactions-based dataset on the Ethereum network</article-title>,&#x201D; in <conf-name>Int. Conf. on Advances in Cyber Security, Communications in Computer and Information Science</conf-name>, 
<publisher-loc>Singapore</publisher-loc>: 
<publisher-name>Springer,</publisher-name> 
<volume>1347</volume>, pp. 
<fpage>61</fpage>&#x2013;
<lpage>79</lpage>, 
<year>2021</year>. </mixed-citation>
</ref>
</ref-list>
</back>
</article>