Back to Search Start Over

Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop

Authors :
Mohamad Khayat
Ezedin Barka
Mohamed Adel Serhani
Farag Sallabi
Khaled Shuaib
Heba M. Khater
Source :
IEEE Access, Vol 13, Pp 24736-24748 (2025)
Publication Year :
2025
Publisher :
IEEE, 2025.

Abstract

As the field of cybersecurity has experienced continual changes, up-to-date techniques have become increasingly necessary to analyze and defend against threats. Furthermore, the current methods consistently produce false alarms and sometimes completely miss real threats. This paper proposes an approach that integrates secure blockchain technology with data preprocessing, deep learning, and reinforcement learning to enhance threat detection and response capabilities. To secure the exchange of threat intelligence information, a safe blockchain network is used, which comprises Byzantine Fault Tolerance for high data integrity and Zero-Knowledge Proofs for access control. All relevant information is cleaned and standardized prior to analysis. Subsequently, graph convolutional neural networks with autoencoders are trained on large unlabeled sets of threat data to automatically label various types of threats, with the system employing fuzzy logic to rank and score possible threats. Furthermore, we implemented a feedback loop that incorporates reinforcement learning, thereby improving model performance over time according to guidance provided by cybersecurity specialists. The proposed system achieved high accuracy, precision, negative predictive value, and MCC, as well as notably low FPR and FNR values. The results establish that the proposed system is a reliable and effective measure for detecting cyberthreats.

Details

Language :
English
ISSN :
21693536
Volume :
13
Database :
Directory of Open Access Journals
Journal :
IEEE Access
Publication Type :
Academic Journal
Accession number :
edsdoj.f8c8f1f864b04ea3b3ecfcbc0e75dde8
Document Type :
article
Full Text :
https://doi.org/10.1109/ACCESS.2025.3538160