Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022 1

Block Hunter: Federated Learning for Cyber Threat


Hunting in Blockchain-based IIoT Networks
Abbas Yazdinejad, Ali Dehghantanha, Senior Member, IEEE, Reza M. Parizi, Senior Member, IEEE, Mohammad
Hammoudeh, Senior Member, IEEE, Hadis Karimipour, Senior Member, IEEE, Gautam Srivastava, Senior
Member, IEEE

Abstract—Nowadays, blockchain-based technologies are being devices are mainly used in B2B (business-to-business) settings,
arXiv:2204.09829v1 [cs.CR] 21 Apr 2022

developed in various industries to improve data security. In the while IoT devices are mostly considered in B2C (business-to-
context of the Industrial Internet of Things (IIoT), a chain-based consumer) environments. This would lead to a different threat
network is one of the most notable applications of blockchain
technology. IIoT devices have become increasingly prevalent in profile for IIoT networks compared to their IoT counterparts
our digital world, especially in support of developing smart where device-to-device transactions are of utmost importance.
factories. Although blockchain is a powerful tool, it is vulnerable IIoT networks provide an umbrella for supporting many
to cyber attacks. Detecting anomalies in blockchain-based IIoT applications and arm us to respond to users’ needs, especially
networks in smart factories is crucial in protecting networks and in an industry setting such as smart factories [1]. Blockchain
systems from unexpected attacks. In this paper, we use Federated
Learning (FL) to build a threat hunting framework called Block technology advantages lead to its wide adoption in IIoT-
Hunter to automatically hunt for attacks in blockchain-based based networks such as smart factories, smart homes/buildings,
IIoT networks. Block Hunter utilizes a cluster-based architecture smart farms, smart cities, connected drones, and healthcare
for anomaly detection combined with several machine learning systems [1], [2]. While the focus of this paper is on the security
models in a federated environment. To the best of our knowledge, of blockchain-based IIoT networks in smart factories [3], [4],
Block Hunter is the first federated threat hunting model in IIoT
networks that identifies anomalous behavior while preserving the suggested framework may be used in other IIoT settings
privacy. Our results prove the efficiency of the Block Hunter in as well.
detecting anomalous activities with high accuracy and minimum In modern smart factories, many devices are connected
required bandwidth. to the public networks, and many activities are supported
Index Terms—Federated Learning, Anomaly Detection, Threat by smart systems such as temperature monitoring systems,
Hunting, Blockchain, Industrial Internet of Things, IIoT, IoT. Internet-enabled lights, IP cameras, and IP phones. These
devices are storing private and sensitive data and may offer
safety-critical services [3], [1]. As the number of IIoT devices
I. I NTRODUCTION
in smart factories increases, the main issue will be storing,

T HE technological trajectory of blockchain makes it a


valuable tool in many areas, including healthcare, mil-
itary, finance and networking, via its immutable and tamper-
collecting, and sharing data securely. Industrial, critical, and
personal data are therefore at risk in such a situation.
Blockchain technology can ensure data integrity inside and
proof data security advantages. With the ever-increasing use outside of smart factories through strong authentication and
of Industrial Internet of Things (IIoT) devices, the world is ensure the availability of communication backbones. Despite
inevitably becoming a smarter interconnected environment; this, privacy and security issues are significant challenges in
especially factories are becoming more intelligent and efficient IIoT [3], [4]. The probability of fraudulent activity occurring
as technology advances [1]. IIoT is considered a subcategory in blockchain-based networks [2], [4] is an important issue.
of the Internet of Things (IoT). There are, however, differences Even though blockchain technology is a powerful tool, it is not
between IoT and IIoT in terms of security requirements. While protected from cyber attacks either. For example, a 51% cyber-
the IoT makes consumers’ lives easier and more convenient, attack [2] on Ethereum Classic, and three consecutive attacks
the IIoT aims to increase production safety and efficiency. IIoT in August of 2020 [5], which resulted in the theft of over $5M
worth of cryptocurrency, have exposed the vulnerabilities of
A. Yazdinejad and A. Dehghantanha are with the Cyber Science
Lab, University of Guelph, Canada, email: ayazdine@uoguelph.ca, ade- this blockchain network.
hghan@uoguelph.ca Smart factories should protect users’ data privacy during
R. M. Parizi is with the College of Computing and Software Engineering, transmission, usage, and storage [4]. Stored data are vulnerable
Kennesaw State University, GA, USA, email: rparizi1@kennesaw.edu
M. Hammoudeh is with Information & Computer Science Department, to tampering by fraudsters seeking to access, alter or use
King Fahd University of Petroleum & Minerals, Saudi Arabia email: the data with malicious motives. Statistically speaking, these
M.Hammoudeh@kfupm.edu.sa attacks can be viewed as anomalous events, exhibiting a strong
H.Karimipour, is with the School of Engineering, Department of Electrical
and Software Engineering at the University of Calgary, Alberta, Canada. deviation from usual behavior [2], [6]. Detecting out-of-norm
email: hadis.karimipour@ucalgary.ca events are essential for threat hunting programs and protecting
G. Srivastava is with the Department of Math and Computer Science, systems from unauthorized access by automatically identifying
Brandon University, Manitoba, Canada as well as with the Research Centre for
Interneural Computing, China Medical University, Taichung, Taiwan. email: and filtering anomalous activities. [6], [7].
srivastavag@brandonu.ca The main objective of this paper is to detect suspicious
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022 2

users and transactions in a blockchain-based IIoT network Here is a breakdown of the rest of the paper. Section
specifically for smart factories. Here, abnormal behavior serves II discusses anomaly detection works in the blockchain and
as a proxy for suspicious behavior as well [4]. By identifying FL. Section III describes the Block Hunter framework and
outliers and patterns, we can leverage Machine Learning (ML) presents the network model and topology design. In Section
algorithms to identify out-of-norm patterns to detect attacks IV, methodology and machine learning approaches to identify
and anomalies on blockchain. Because deep neural networks anomalies are discussed. In Section V, we present the assess-
learn representations automatically from data that they are ment of the Block Hunter framework. Finally, In Section VI,
trained on, they are the candidate solution for detecting we conclude the paper and point out future work directions.
anomalies [4], [7]. However, there are challenges with any
ML and deep learning-based anomaly detection techniques. II. R ELATED WORK
These methods suffer from training data scarcity problems,
and privacy issues [7]. In the face of increasing cybersecurity threats and enlarging
Detecting anomalies in the blockchain is a complicated attack surfaces, it is becoming more complex and challenging
issue [8]. Not only each block needs to be sent to a central to secure IIoT networks and environments [11], [12]. Further-
server, which increases the training time, but also the model more, as blockchain technology is increasingly applied in a
requires new block data in the testing phase [8]. In addition, broad range of fields, anomaly detection is becoming more
when ML models are frequently updated to respond to new and more important. Anomalies can thus occur in a wide
threats and detect anomalies, malicious adversaries can launch range of blockchain-based applications. This section discusses
causative/data poisoning attacks to degrade the ML model research relating to anomaly detection, especially in relation
deliberately. Attackers may intentionally send crafted payloads to blockchain and FL.
to evade anomaly detection. In [13], the authors proposed a framework as BAD to
A novel and practical approach would be to employ Feder- detect anomalies in blockchain-based systems. BAD collects
ated learning (FL) models to detect anomalies while preserving potential malicious activities using blockchain meta-data and
data privacy, and monitoring data quality [7], [9]. FL allows has interesting features like distribution to avoid the cen-
edge devices to collaborate during the training stage while all tral point of failure, trust, and privacy. Another work, [14],
data stays on the device. We can train the model on the device suggests blockchain and anomaly detection systems that rec-
itself instead of sending the data to another place, and only ognize frauds when IoT meter data is tampered with. This
the updates of the model are shared across the network. research uses polynomial regression, DBSCAN, autoencoder,
FL has become a trend in ML where smart edge de- and LSTM methods to detect tampering.
vices can simultaneously develop a mutual prediction between The research by Sayadi et al. [15] proposes an algorithm for
each other [7], [10]. In addition, FL ensures multiple actors anomaly detection over bitcoin electronic transactions. They
construct robust machine learning models without sharing examined the One-Class Support Vector Machines (OCSVM)
data, addressing fundamental privacy, data security, and digital and the K-means algorithms to group outliers similar in
rights management challenges. Considering these characteris- both statistical significance and type. They analyzed their
tics, this paper uses an FL-based anomaly-detection framework work by generating detection results and found that we
called Block Hunter capable of detecting attack payloads in could obtain high-performing results on accuracy. In [16],
blockchain-based IIoT networks. the authors suggested an approach based on the semantics
The main contributions of the paper are summarized as of anomalies in blockchain-based IoT Networks. A method
follows: was presented to detect anomalous behavior in blockchain that
1) Utilize a cluster-based architecture to formulate an gathers metadata in forks to determine mutual informational
anomaly detection problem in blockchain-based smart recognition of anomalous activity. They developed a tool that
factories. The cluster-based approach increase hunting improves blockchain security and connected devices. Also, in
efficiency in terms of bandwidth reduction and through- [17], has introduced encoder-decoder deep learning regression
put in IIoT networks. for detecting blockchain security. This work developed an
2) Apply a federated design model to detect anomalous anomaly detection framework that relies on aggregate infor-
behaviour in IIoT devices related to blockchain-based mation derived from bitcoin blockchain monitoring. Their
smart factories. This provides a privacy-preserving fea- experiments have demonstrated that their model can detect
ture when using machine learning models in a federated publicly reported attacks using the historical logs of the
framework. Ethereum network.
3) Implementation of various anomaly detection algorithms Investigation in blockchain shows blockchain Edge of
such as clustering-based, statistical, subspace-based, Things (BEoT) can enable future services and applications,
classifier-based, and tree-based for efficient anomaly according to [18]. The authors discuss the latest developments
detection in smart factories. and applications of BEoT. Their findings show that blockchain
4) The impact of block generation, block size, and miners technology has grown inquisitive beyond cryptocurrency in
on the Block Hunter framework are considered. More- the Edge of Things (EoT) as it provides decentralization,
over, the performance measurements like Accuracy, Pre- immutability, and traceability, in EoT systems.
cision, Recall, F1-score, and True Positive Rate (TPR) The field of FL is undergoing several new kinds of research.
anomaly detection are discussed. The article cited in [7] provided the FL approach to anomaly
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022 3

detection in smart buildings that FL with additional recurrent its smart devices. A transaction represents the exchange of
neural networks is proposed as a privacy-by-design approach. sensitive factory information between parties during working
It shows that it is more than twice as fast during training in the blockchain network. There are several inputs and outputs
as its centralized counterpart. They were able to achieve in a transaction. Blocks consist of a list of transactions, a
superior performance in both classification and regression reference to the previous block, and a hash. Every block is
responsibilities compared to baseline methods. Also, in [19], made up of transactions that the block creator, referred to as
Nguyen et al. presented a self-learning federated system for the miner, has accepted into its memory pool from the previous
detecting anomalies in IoT networks. Their system is based on block. Considering rigid industrial standards that should be
device communication profiles that can detect adverse changes followed when designing and implementing smart factories, it
in IoT devices’ communication. It employs FL for efficiently is practical to assume that the functionality of smart factories
aggregating behavior profiles. It was one of the first systems to in each cluster is the same.
employ this approach to anomaly detection. Since this system
can handle emerging new threats, it can be used to handle a
wide variety of threats.
The authors of [20] put forward an approach via FL
for detecting abnormal client behavior. The ability to detect
anomalous client behaviour at the server level is mentioned in
their paper. They detected abnormalities across networks using
low-dimensional surrogates of model weight vectors. Experi-
mentally, the detection-based method significantly outperforms
the conventional methods based on defence. Furthermore,
there is a work [21] involving the use of Deep Learning and
blockchain-based FL to detect COVID-19. They develop a
framework to gather data from various sources and generate a
global deep learning model using blockchain-based federated
training. By using blockchain to authenticate the data, FL
enables models to be trained while preserving privacy. By
combining blockchain with federated e-learning, they devel-
oped a system for training global models collaboratively. Their
results show better performance in detecting patients via this
method.
Chai et al. [22] proposed a hierarchical blockchain frame-
work and FL to learn and share environmental data. This
framework is functional and efficient for large-scale vehicular Fig. 1. Overview of the blockchain-based IIoT network for smart factories
networks. FL-based learning meets the Internet of Vehicles’
distributed pattern and privacy requirements. Sharing behavior Detecting anomalous activities is a significant contributor
is modeled as a multi-leader, multi-player trading market pro- to automatically protecting a system from unexpected attacks.
cess to stimulate knowledge sharing. Simulated results indicate Anomalies in blockchain must be detected by sending each
that an algorithm based on hierarchical structures can enhance block of data to a central server for each block update. This is
sharing, learning, and managing specific malicious attacks. not efficient and also imposes privacy concerns. FL solutions
Furthermore, the authors in [23] deliver a comprehensive are promising in tackling this issue. We use FL to update the
investigation on how FL could supply better cybersecurity and model frequently and to obtain a global model for detecting
prevent various cyberattacks in real-time. This work highlights an anomaly. After learning about each smart factory’s data,
some main challenges and future directions on which the devices, and service provider, the model’s parameters will be
researchers can focus for adopting FL in real-time scenarios. sent to the parameter server for aggregation and to update our
general model. We provide the details of implementing the
III. P ROPOSED B LOCK H UNTER FRAMEWORK IN Block Hunter framework in the following sub-sections.
BLOCKCHAIN - BASED II OT N ETWORKS

Fig. 1 presents a detailed overview of the proposed A. Role of FL to detect anomalies in Block Hunter
blockchain-based IIoT network for smart factory applications. We distribute local models across the blockchain-based IIoT
This cluster-based architecture combines users, base stations, network instead of learning an anomaly detection model and
WiFi, service providers, and smart factories connected to the evaluating it on a single node. As shown in Fig. 2, the
blockchain network. Smart factories include several smart- FL setup involves local models as well as distributed smart
connected devices. The service provider can collect sensor data factories nodes. Instead of a centralized learning environment,
in smart factories and use them based on their applications and K smart factories learn a local model in an FL manner.
services. In addition, Fig. 1 illustrates the relationship between The k = 1, . . . , K local models have the same structure,
the peers in terms of information between the factory and but they are trained with different datasets that originate
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022 4

from their connected clients. Our proposed federated anomaly- Algorithm 1 Federated anomaly-detection model
detection algorithm for smart factories in IIoT networks is 1: Input: Pre-trained model
2: Output: Global anomaly-detection model
shown in Algorithm 1. C represents the batch size for the 3: Initializing: (t = 0) // start to set values
4: Parameter server update (W )
global operation; B determines the local batch’s size; a factor 5: Define initial values = B, E, h, C, K
6: initial local models ()
of k indexes the K smart factories; E indicates the number of 7: Model (mi ) = set parameters (w1 , . . . , wn )
8: Client model update
local epochs, and h represents the rate of learning. Initializing 9: Local models→ smart factories’ clusters
10: Federated Training: // beginning FL method
begins the process of initializing the model parameters. During 11: While (K > 0)
the training step, FedAvg [24] is sent to smart factories and 12: Get (local models)
13: For local epoch E
updates the model. Finally, our updated trained model can be 14: For each batch 1 to b
15: Run local models
tested to detect any anomalies. 16: Obtain and set model parameters
17: Return (Model parameters)
18: Parameter server = FedAvg (w)
19: Update (w, m)
20: Decrypted (w,m)
21: D = split Data into batches of size B
22: for local epoch E from 1 to B do
23: for batch x <= B do
24: return w and D to server
25: Return updated Model
26: FedAvg: // model aggregation
27: Server ( Initialize w0 )
28: encryption (Homomorphic)
29: P = compute loss (w, b)
30: for round c = 1 to k do
31: Server: Send wt−1 to Smart factory i − 1
32: E = E+1
33: Parameter server = Update (wk−1 , . . . , wk )

for training based on local epochs. Then the parameters and


hyperparameters will be forwarded to the Parameter Server
for aggregating model weights to compute the global model.
The global model is an ML model that holds in the Parameter
Fig. 2. Proposed Federated Anomaly-detection in Block Hunter framework Server to update its parameters. When a new cluster joins our
framework, the latest global model will send to that cluster as
Based on Algorithm 1, the parameter server starts the FL a pre-train model that in the real-world application, we can
scheme at t = 0, initializing local models with the first set simply follow this approach. The updated global model is sent
of weights. Next, these local models are downloaded from the to clusters gradually during evolution.
parameter server to each of the k = 1, . . . , K smart factory.
Third, using the corresponding blockchain datasets’ training B. Anomaly Detection in blockchain-based IIoT network
data, each of the E = 1, . . . , E local models computes in Smart factories have sensitive data, so storing it on the
parallel a new local set of weights. Finally, the parameter blockchain with its limited storage is both financially and
server aggregates the weights in each client’s local model to computationally costly. Therefore, the actual smart device and
create an improved global model using weighted averaging sensor data are stored in the smart factory. The smart factory
(weighted average). Each time the cycle repeats, a new epoch data includes information about the type of data and control
is initiated until a certain stop criterion has been reached. states as well.
According to McMahan, we utilize the same design policy for The premise behind the development of an anomaly de-
FL as he does [24], [25]. They develop the FL problem as a tection framework for the blockchain-based IIoT networks in
federated optimization problem by distributing the model, m t smart factories lies in providing a new decentralized system
to (a subset of) K clients of the learning federation at time t0 . based on FL that leverages all smart factory data while pro-
To summarize, steps for FL in the Block Hunter framework tecting their privacy. Additionally, we will reach a point where
are categorized: we need to attend to the issue of a fork in the blockchain scope
• Federation Construction: The subset of smart factory during anomaly detection. In some instances, devices or nodes
members, cluster, selected to receive the model locally. do not agree on the state of the blockchain, leading to the fork
• Decentralized Training: When a cluster of smart facto- issue in the blockchain. When blockchain-based applications
ries is selected, it updates its model using its local data. are being developed, forks become more concerned because
• Model Accumulation: Responsible for accumulating and they have the potential to be used for malicious purposes.
merging the data models. Data is not sent and integrated Indeed, a global ML model can use all of the collected
from the federation to the server individually. information from previous forks to detect anomalies during
• Model Aggregation (FedAvg): Parameter server ag- training. This approach has the advantage that while attacks
gregates model weights to compute an enhanced global may only happen once within a smart factory, they behave
model. the same way when repeated against other smart factories
At runtime, pre-trained models as local models are sent over time. Hence, information on past attacks may help us
to clusters in the Block Hunter framework from the Pa- blacklist them and prevent them from occurring in the future.
rameter server, considering blockchain-based IIoT networks The advantage of FL is clear since it will train the global ML
environments. The local models are sent to smart factories model for anomaly detection.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022 5

Based on Fig. 1, each participant in a smart factory can consider the set of transactions in smart factory S1 that belongs
provide a fake blockchain transaction as a side-channel to to the blockchain network. B = [b1 , b2 , . . . , b3 ] represents the
deliver a message. A malicious transaction, as well as creating number of existing Sk blocks in the blockchain network. More
a fake block, are also possible in this situation. A malicious formally, sn = j sj × Dkj , with k being the number of
transaction is a special type of fake transaction, which consists deployed clusters, and j is smart factories in that cluster. It
of a hidden message which is aimed at disrupting the network should be noted that the set of IoT devices refer to a smart
by hitting a specific peer. Inserting fake blocks are blockchain factory, Dkj ∈ [1, j] in the K th cluster.
blocks that contain one or more stolen/malicious transactions. It is possible to summarize the distribution of smart factories
Fake blocks can either be eventually discarded or accepted with their devices in the Block Hunter, the proposed cluster-
into the mainstream chain. based architecture, in Equation 1, distance function, Df. This is
Our solution considers smart factories’ data and chain forks. the point at which smart factories and IoT devices will cluster
We collect, enrich, and share such information with other based on most centrality derived from a distance measure
local ML models across the network. We used the specific based on the presence or absence of shared neighboring
information for training anomaly detection in each local ML devices in the space of (i, j).
model that contains sensitive smart factory data, the features
of previous forks, and the number and type of malicious
v
u K
uX
transactions that occurred. As a result, we can hunt an anomaly Df (Dki , Dkj ) = t (Snj − Sni )2 × (Dkj − Dki )2 (1)
by Block Hunter in a blockchain-based IIoT network for smart i,j=1

factories. To protect the privacy of the data, we only share the The clustering part is shown in Algorithm 2, and it can
parameters of trained models instead of the original data from be considered a piece of the overall algorithm in the Block
smart factories and their blockchain. This work aims to train Hunter. Algorithm 2 collects the locations of smart factories
a global anomalous detection model through locally trained and their IIoT devices. Based on Equation 1, we measure each
sub-protocol models based on the Block Hunter framework. smart factories’ distance and their devices and record it until
Regarding the threat model, the solution proposed in this we obtain the cluster-based architecture. Afterward, the cluster
paper has been designed to be resilient against any class of calculates a collection of S nearest smart factories for each IoT
attacks where a malicious entity can append to the blockchain device, D.
system.
Algorithm 2 Cluster formation strategy in Block Hunter
1: Input:
C. Network model and topology design 2: Get = (S, D)
3: Initialize:
4: Define initial values
This section discusses the efficient network model and 5: Set Number of Cluster = K
6: Get loc = S = {s1 , s2 , . . . , sn } // location of smart factories
topology design for blockchain-based IIoT networks. Wireless 7: Get loc = D = {d1 , d2 , . . . , dn } // location of devices
sensor networks have a variety of topologies, which affect 8: sn = k
S
j sj × Dkj //Deployed clusters and smart factories
9: Main():
their performance and behavior. Some of the metrics include 10: Get (K, S, D)
11: While( K > 0)
throughput, reliability, energy consumption, and latency [26]. 12: {

Therefore, we propose blockchain technology’s cluster-based 13: For z each K


14: Comput = Df z
formation model for smart factories. Cluster-based architecture
r
15: (Dki , Dkj ) =
PK
i,j=1 nj
(S − Sni )2 × (Dkj − Dki )2 //Calculating dis-

provides more efficient use of resources [27] and throughput 16:


tance for finding neighboring devices. The presence or absence of devices in the space of (i, j)
Set area = Kz
during the blockchain run in each smart factory. Clustering 17: Client distance update
18: Marge neighbor
reduces the computational complexity in the creation of the 19: }
20: Return K
underlying network through a hierarchical approach [26]. It
is especially so with blockchain-based IIoT networks that are
Setting model parameters in the parameter server and send-
expected to encompass large numbers of individual devices.
ing pre-trained models to clusters happen during initializing.
Also, we believe that cluster-based architecture will enable us
Next, local models are trained by clusters in the training step
to hunt and manage anomalies better in each smart factory
to aggregate models and update the global model parameters.
zone and increase the network’s throughput.
In each cluster, the smart factory controls all IIoT devices’
activities, and one of the smart factories is usually known as IV. M ETHODOLOGY
Cluster Head (CH) or a leader node. A CH can perform extra
duties in blockchain-based networks like taking part in the In this section, we study several machine learning tech-
mining process by reviewing aspects such as energy, memory, niques for identifying and detecting anomalies in the Block
and computing power. Fig. 1 shows the clustering strategy in Hunter framework.
the blockchain-based smart factory network model.
Based on the target Block Hunter framework, which can A. Neural Encoder-Decoder (NED) model
be represented as a directed graph G = (S, D) with D An example of a classifier-based anomaly detection algo-
being the set of IIoT devices, representing smart devices, rithm is the neural encoder-decoder model. The proposed
D = {d1 , d2 , . . . , dn }, and S = {s1 , s2 , . . . , sn } is the set of anomaly detection framework develops a neural encoder-
smart factories in each cluster. In S1T = [t1 , t2 , . . . , tm ], we decoder model that summarizes the information about the
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022 6

blockchain’s status and transactions and then rebuilds the rise to an empty set. However, all these clusters’ unions should
initial data from this space. Encoding/decoding preserves the represent all of the observations in Dataset D. we are supposed
data’s basic properties when the current status is consistent. to search for a boundary index value that separates the Small
Differently, anomalous situations exhibit inconsistent values, Clusters from the Large Clusters. Finally, we calculate the
ultimately leading to a failing reconstruction. In an encoder- CBLOF scores for each observation by using the following
decoder, this quantity would be paraphrased as noise and equation, 1 ≤ i ≤ k:
therefore would be failing when reconstructing. Therefore, the (
difference between the initial and reconstructed values would |F k|.dis(t, F i) t ∈ Fi
CBLOF (t) = (2)
highlight the anomalous and abnormal situation, thereby trig- |F k|.min(dist(t, F i) t ∈ Fi,
gering an alert [8], [28]. Neural encoder-decoder models ana-
lyze sequences of temporally sorted events. In general, we sup-
pose that the data will be sequenced as P = {P1 , P2 , . . . , Pn } D. Principal Component Analysis (PCA)
concerning some period of observation, where Pt is an assess- A PCA model is a subsequence-based anomaly detection al-
ment of the properties of the tth event in the chronological gorithm. PCA is commonly considered a method to reduce the
order of events in P . Anomalous events occur in P , i.e. a dimensionality algorithm. The variance-covariance of dataset
vector Pt drastically various from its neighbors Pt . characteristics can be used to construct new variables known
as principal components, which are functions of original
B. Isolation Forest variables. For principal component analysis, one uses p distinct
The Isolation Forest (IF) model falls under the Tree-based linear combinations of random variables x1 , x2 , . . . , xp . The
anomaly detection algorithms category. The approach has principal component has the following characteristics: they
gained much universal acceptance in recent years because it is are uncorrelated to each other. Each component’s variance
unsupervised. Isolation forest is a concept based on the idea decreases in descending order, with the principal component
that it’s more prudent to isolate data anomalies rather than containing the highest variance and the subsequent details
generalize the norms. It’s a recursive and random partitioning having lower variances. When combining all the principal
process to isolate the anomalous data point in the dataset components’ variations, the sum of the total variation of the
until it simply describes the stored data. A tree structure original features is always equal to the total variation of all the
represents the recursive partition. A forest of isolation trees principal components. To estimate the principal components
is the foundation of the isolation forest algorithm, where cells of a system, we can use eigenanalysis to get the correlation
in the dataset are randomly selected from the data to form matrix, or covariance matrix of data features [8], [30].
a forest of normal and outlier cells. These trees are binary The PCA algorithm detects anomalies by getting rid of any
trees that have zero or two child nodes, and an isolation forest outliers. The outliers are determined by Mahalanobis distance
contains isolation trees of this type [8], [29]. Consider that X that is carried out repeatedly to eliminate all data points with
is either a leaf node that does not have any children or a parent high Mahalanobis distance values. Where S is a covariance
node that has two children named XL and XR. To choose matrix, xi is the measure of an observation of the ith feature
which child nodes belong to which parents, a test must be in data, and x is the mean of all observations, Mahalanobis
attached to node X. The testing procedure involves selecting distance is denoted as follows:
a random feature f across all the data points and an arbitrary q
splitting point q. Node f < q is in the zone of XL, and f ≥ q D= (Xi − X)T s−1 (Xi − X) (3)
is in the zone of XR.

C. Cluster-Based Local Outlier Factor E. K-means


Our cluster-based local outlier factor (CBLOF) model be- In the cluster-based detection algorithms category, K-means
longs to the classifier-based algorithm-based anomaly detec- is a clustering-based algorithm. As one of the most popular
tion category. Our cluster-based local outlier factor (CBLOF) clustering algorithms, K-means is also commonly used as
model belongs to the classifier-based algorithm-based anomaly an anomaly detection algorithm. It has been introduced as
detection category. Within this algorithm’s anomaly detection an unsupervised learning scheme. The data is divided into
methodology, the data is clustered into clusters, based on k different clusters, with each sample belonging to the clus-
which anomaly scores can be computed similar to those of ter with the closest mean value within each cluster. Across
the local outlier factor algorithm and so on. This algorithm’s clusters, there is a cluster centroid c, which is the mean of
underlying principle of anomaly detection is based on cluster- observations from each cluster in that cluster. When assessing
ing data sets together. This algorithm creates clusters using the similarities among independent observations, the similarity
groups in a dataset by arbitrary clustering algorithms that measure employed is Euclidean distance, where xi is the
assign a specific observation to a cluster. The clusters are measurements and ci is the centroids, and n outlines the
sorted in each case corresponding to their respective sizes of number of independent measurements [8], [31].
|F1 | > |F2 | > . . . > |Fk | where F1 , F2 , . . . , Fk all represent
k
the cluster for which number k is the cluster number [8]. A X
d2 (X, c) = (Xi − ci)2 (4)
pair of clusters, when intersecting with each other, should give i=1
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022 7

V. D ISCUSSION & E VALUATION in smart manufacturing systems, and also two IIoT-related
This section evaluates the performance of the Block Hunter datasets for assessing BlockHunter for smart factories.
and provides results and discussion. The Bitcoin Transaction Dataset (BTD)4 designed for re-
search on blockchain anomaly and fraud detection. It has been
A. Experimental Setup donated to the IEEE data port online community for academic
exploration. Because the dataset is imbalanced and contains
We formed an experimental setup on Intel(R) Core(TM) i7-
roughly 30 million transactions, it presents a challenge in
10700KF CPU @ 3.80GHz 3.79 GHz, Linux 64-bit operating
creating an anomaly-detection model that captures all of them.
system (Ubuntu 20.04), and equipped it with 16 GB DDR4
The dataset is an implementation of a research project that
memory. To evaluate our network model and cluster-based
presents anomaly detection within the context of blockchain
topology design in the proposed framework, we apply Bit-
technology and its applications in the monetary domain. It
coin Simulator1 . Bitcoin Simulator is an open-source bitcoin
extracts blockchain data and uses machine learning techniques
simulator developed on NS3. The Bitcoin Simulator has been
to hunt potentially malicious transactions.
tested with NS3. Also, we consider LENA as an NS-3 module
Another dataset is Ethereum Classic (ETC)5 that is a Big-
to simulate 3GPP networks. The NR module is a pluggable
Query Dataset. We will be able to access Ethereum Classic
module for NS-3 that can be used to simulate New Radio (NR)
transactions and block history in this dataset. The Ethereum
cellular networks. NS-3 supports the widest variety of network
Classic open-source, based on the Ethereum platform, is a
models and protocols and supports the greatest variety of
platform that enables distributed computing by using a public,
networking devices. Indeed, wireless networks and protocols
distributed decentralized network for executing scripts with
rely on the NS-3 to determine their performance. Therefore,
the ability to manage smart contracts. The dataset consists
the assessment of the proposed federated framework will do
of all blocks, contracts, logs, tokens, traces, and transactions
on the performance metrics such as the impact of block
contained within the blockchain network.
size, number of blocks, number of IoT devices, and number
In choosing IIoT related datasets, two well-known datasets
of miners. The implementation details of the Block Hunter
have been considered: Gas Pipeline (GP) and Secure Water
framework is presented in Table I.
Treatment (SWaT). They are well fit for the IIoT environments
TABLE I
and are publicly available [32], [33].
F EDERATED FRAMEWORK PARAMETERS
Parameters Description C. Experimental Analysis
Simulators Bitcoin simulator/ NS3 / 5G-LENA
Operating system Ubuntu 20.04 A cluster-based architecture provides more efficient use of
libraries PySyft / Pythorch
Number of Clusters 50 resources and throughput during the blockchain run in smart
Optimization method SGD
local epoch E=4 factory applications. To evaluate the performance of the Block
Fraction of smart factories 6e − 3
Mobility model Random waypoint model
Hunter, cluster-based architecture, the simulation parameters
Traffic Type
Number of IoT devices
Constant Bit Rate (CBR)
5000
are presented in Table I.To accomplish more realistic results,
Block Size
Number of Miners
1 MB, 2 MB, 4 MB, 8 MB, 16 MB
16, 32, 64
we did the simulation 20 times and designed another sce-
Local epochs in each cluster
Learning rate
4
3e − 2
nario as a non-cluster model to compare the architectural
Local mini-batch size 15 models’ performance during the simulation. The non-cluster
Federated approach FedAvg
model combined blockchain technology with the standard
For the federated setup, we have considered PySyft2 and network model and did not consider and divide it into cluster
PyTorch3 . PySyft is an open-source library that allows us architecture. It has no features and typologies of cluster-
to create VirtualWorkers for training our machine learning based architecture such as adjacencies with other clusters or
models to detect an anomaly. It is designed to allow users part of the network, flexibility, and scalability during run
to create a private and secure ML model, and it is built into time. Conversely, in cluster-based architecture, each cluster
some existing ML libraries, such as PyTorch. Our framework has adjacencies with other clusters and supports the dynamic
is trained with the FedAvg method with E = 4 local epoch characteristics of a network. In the following, we address the
and fraction c = 6e − 3. E mentions to Local batch size impact of Block generation, the impact of the Block size,
used at each learning iteration, and c refers to the number and the impact of the number of miners in the evaluation.
of smart factories used at each iteration. It is also important In the proposed framework, the public blockchain network is
to emphasize e. The e is denoted exp, which is short for deployed among clusters that include smart factories. We need
exponential. Finally, an SGD optimizer is used for training a public blockchain to allow any smart factories to join and
the models with a learning rate of 3e − 2. keep the system completely decentralized. Additionally, public
blockchains give all participants equal access to the chain.
B. Datasets • Impact of the Block generation

The proposed framework is evaluated by two datasets on the Block generation interval is regarded as an important
blockchain side, providing conditions for blockchain adoption metric for measuring the performance of blockchain
networks. If we have an organized topology and structure,
1 https://github.com/ctch3ng/Bitcoin-Simulator-NS3
2 https://github.com/OpenMined/PySyft 4 https://ieee-dataport.org/open-access/bitcoin-transactions-data-2011-2013
3 https://pytorch.org 5 https://www.kaggle.com/bigquery/crypto-ethereum-classic
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022 8

(a) Impact of the Block generation on bandwidth consumption (b) Impact of the Block size on bandwidth

(c) Impact of the Block size on throughput (d) Impact of number of miners

Fig. 3. Cluster-based architecture evaluation

the block generation will be more efficient to support a given architecture directly impacts throughput (trans-
nodes than in a distributed network with a solid and actions/second). According to Fig. 3(d), an increasing
organized structure. Further, since blocks are generated number of miners from 16 to 256 and the block size to 1
more frequently in individual clusters instead of gener- MB in all clusters increased the model throughput. The
ated in batches that consume a considerable amount of increase in the number of miners makes it easier for smart
bandwidth, we can better manage and use the bandwidth. factories to reach a consensus. Additionally, the proposed
Fig. 3(a) shows the bandwidth efficiency of the cluster- cluster-based architecture can handle more transactions in
based design (proposed architecture) compared to the each block by increasing the block size. Consequently, it
non-cluster-based design. will grow the proposed architecture’s throughput rate and
Although there is an increase in block generation time offer better performance.
in the non-cluster-based design, more blocks will be 1) nomaly detection rate
generated in the network and consume more and more This subsection aims to assess some well-known machine
bandwidth. Hence, cluster-based architecture provides learning models such as K-means, PCA, CBLOF, IF, and NED
better performance since the nodes are distributed across to hunt anomalies in the Block Hunter framework. We evaluate
the whole network (currently, there are 5000 reachable these models by comparing their average performance, such
nodes in K = 50 Clusters). as Accuracy, Precision, Recall, and F1-score as follows. These
• Impact of the Block size include, Accuracy (Acc) = T P +TTN P +T N
+F N +F P , Recall (Rec)
Block size has a significant impact on the performance of TP TP
= T P +F P , Precision (Pre) = T P +F P and F1-score (F1) =
blockchain. The block size determines the highest number 2∗T P
2∗T P +F N +F P .
of transactions that can be approved within a block. This Table II and III display the measured performance of the
size, thus, controls the throughput (transactions/second) Block Hunter during applying ML models, K-means, PCA,
obtained by the proposed design. Larger blocks cause CBLOF, IF, and NED in terms of Precision, Accuracy, F1-
more sluggish propagation in each cluster than smaller score, and Recall based on Bitcoin Transaction and Ethereum
blocks. In Fig. 3(b) and Fig. 3(c), we show that the Classic Blockchain datasets. To minimize the loss function, all
bandwidth consumption and throughput increase with hyperparameters are maximized.
increasing block size from 0.5 MB to 8 MB. This In Tables II and III, we can see that NED and IF have
directly impacts both the bandwidth and throughput of the the highest accuracy during the anomaly detection while their
proposed model. As expected, Block Hunter has a higher accuracy is almost similar. In addition, we reported the Area
performance because of better network communication, Under the Curve (AUC) of Receiver Operating Characteristic
efficient topology management, and minimized delay. (ROC) as shown in Figs. 4(a), 4(b), 4(c), 4(d), and 4(e). The
• Impact of number of miners The number of miners in ROC curves for CBLOF, K-means, PCA, IF, and NED are
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022 9

(a) The AUC of ROC curves for CBLOF (b) The AUC of ROC curves for K-means

(e) The AUC of ROC curves for NED

(c) The AUC of ROC curves for PCA (d) The AUC of ROC curves for IF

Fig. 4. AUC of ROC curves in FL framework for Block Hunter

TABLE II for 100 seconds. Based on the cluster-based structure in Block


P ERFORMANCE COMPARISON OF THE ML MODELS BASED ON B ITCOIN Hunter, it is almost certain that this system’s accuracy is
T RANSACTION DATASET (BTD)
acceptable during anomaly hunting, as shown in Table IV. The
Model
NED
Acc (%)
96.7%
Pre (%)
70.4%
F1 (%)
62.5%
Rec (%)
80.2%
Block Hunter framework also works perfectly as the number
CBLOF 82.4% 55.5% 78% 66.1% of transactions and clusters increases.
K-means 87.6% 55.2% 65.2% 89.5%
PCA 89.4% 64.2% 76.2% 76.2%
IF 95.3% 65.1% 61.2% 75%
TABLE IV
A NOMALY HUNTING IN B LOCK H UNTER
TABLE III Number of cluster
Existing anomaly
Max number of transactions
Detected
(K) ( per second )
P ERFORMANCE COMPARISON OF THE ML MODELS BASED ON E THEREUM 30 2 35 2
C LASSIC B LOCKCHAIN (ETC) 40 4 35 4
50 4 35 4
30 5 70 4
Model Acc (%) Pre (%) F1 (%) Rec (%)
40 4 70 3
NED 97.8% 74% 66.2% 86.2%
50 4 70 4
CBLOF 85.6% 60.2% 82.1% 72.1%
K-means 89.7% 59.1% 70.2% 93.1%
PCA 91.6% 70.3% 81.3% 82.1%
IF 96.8% 70.5% 67.6% 81.1v We also evaluated the performance of Block hunter on
several IIoT standard datasets as shown in Table V. The model
performance was evaluated using different ML models namely
presented in a federated setting. K-means, PCA, CBLOF, IF, and NED on GP and SWaT
By examining the visuals and using the highest level of datasets. NED has the highest accuracy as it preserves data
accuracy metric,the AUC for ROC curves show a comparable encoding/decoding.
ROC curve for all algorithms. The AUC for CBLOF, K- Blockchain-based IIoT networks are the underlying tech-
means, PCA, IF, and NED are (0.80, 0.84), (0.82, 0.85), nology for the future smart factories, hence an emerging
(0.86, 0.89), (0.90, 0.93), and (0.95, 0.97) based on BTD and attack target, which shows the significance of this work.
ETC datasets, respectively. While running the Block Hunter To the best of our knowledge, Block Hunter is the first
framework with each ML model, we obtain a global model federated threat hunting model in IIoT networks that identifies
whose parameters are frequently updated via the FedAvg anomalous behavior while preserving privacy. We used FL to
approach [24]. Table IV presents the hunting of anomalies build a threat hunting framework that utilizes a cluster-based
in global models using NED as the local model. This table architecture to formulate an anomaly detection combined with
shows the moment where the Block Hunter framework can several machine learning models. Our results indicate the
hunt an anomaly while doing transactions. This consists of superior performance of our model in automatically hunting
K = 30, 40, 50 clusters and 1 to 35 transactions per second for anomalies while preserving data privacy.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022 10

TABLE V [12] L. Tseng, X. Yao, S. Otoum, M. Aloqaily, and Y. Jararweh, “Blockchain-


S UMMARY OF PERFORMANCE COMPARISON OF THE B LOCK HUNTER IN based database in an iot environment: challenges, opportunities, and
II OT RELATED DATASETS analysis,” Cluster Computing, vol. 23, no. 3, pp. 2151–2165, 2020.
[13] M. Signorini, M. Pontecorvi, W. Kanoun, and R. Di Pietro, “Bad:
Datasets Model Acc (%) Pre (%) F1 (%) Rec (%)
NED 99.1% 98% 99% 98%
a blockchain anomaly detection solution,” IEEE Access, vol. 8, pp.
CBLOF 87.8% 82% 78% 70% 173 481–173 490, 2020.
GP K -means 89.5% 88% 90% 87% [14] S. Iyer, S. Thakur, M. Dixit, R. Katkam, A. Agrawal, and F. Kazi,
PCA 95.2% 90% 88% 89%
IF 96.8% 93% 94% 91% “Blockchain and anomaly detection based monitoring system for en-
NED
CBLOF
98.8%
85.9%
97%
77%
99%
78%
99%
75%
forcing wastewater reuse,” in 2019 10th International Conference on
SWaT K -means 87.1% 78% 80% 76% Computing, Communication and Networking Technologies (ICCCNT).
PCA
IF
92.1%
94.6%
89%
95%
88%
90%
90%
92%
IEEE, 2019, pp. 1–7.
[15] S. Sayadi, S. B. Rejeb, and Z. Choukair, “Anomaly detection model over
blockchain electronic transactions,” in 2019 15th International Wireless
Communications & Mobile Computing Conference (IWCMC). IEEE,
VI. C ONCLUSION & F UTURE W ORKS 2019, pp. 895–900.
[16] Z. Il-Agure, B. Attallah, and Y.-K. Chang, “The semantics of anomalies
In this paper, we developed the Block Hunter framework in iot integrated blockchain network,” in 2019 Sixth HCT Information
to hunt anomalies in blockchain-based IIoT smart factories Technology Trends (ITT). IEEE, 2019, pp. 144–146.
[17] F. Scicchitano, A. Liguori, M. Guarascio, E. Ritacco, and G. Manco, “A
using a federated learning approach. Block Hunter uses a deep learning approach for detecting security attacks on blockchain.” in
cluster-based architecture to reduce resources and improve the ITASEC, 2020, pp. 212–222.
throughput of blockchain-based IIoT networks hunting. The [18] T. R. Gadekallu, Q.-V. Pham, D. C. Nguyen, P. K. R. Maddikunta,
N. Deepa, B. Prabadevi, P. N. Pathirana, J. Zhao, and W.-J. Hwang,
Block Hunter framework was evaluated using a variety of ma- “Blockchain for edge of things: Applications, opportunities, and chal-
chine learning algorithms (NED, IF, CBLOF, K-means, PCA) lenges,” IEEE Internet of Things Journal, vol. 9, no. 2, pp. 964–988,
to detect anomalies. We also examined the impacts of block 2022.
[19] T. D. Nguyen, S. Marchal, M. Miettinen, H. Fereidooni, N. Asokan, and
generation interval, block size, and different miners on the A.-R. Sadeghi, “Dı̈ot: A federated self-learning anomaly detection sys-
performance of the Block Hunter. Using generative adversarial tem for iot,” in 2019 IEEE 39th International Conference on Distributed
networks (GAN) to design and implement a block hunter- Computing Systems (ICDCS). IEEE, 2019, pp. 756–767.
[20] S. Li, Y. Cheng, Y. Liu, W. Wang, and T. Chen, “Abnormal client behav-
like framework would be an interesting future research work. ior detection in federated learning,” arXiv preprint arXiv:1910.09933,
Furthermore, designing and applying IIoT-related blockchain 2019.
networks with different consensus algorithms would also be [21] R. Kumar, A. A. Khan, S. Zhang, W. Wang, Y. Abuidris, W. Amin, and
J. Kumar, “Blockchain-federated-learning and deep learning models for
worth investigating in the future. covid-19 detection using ct imaging,” arXiv preprint arXiv:2007.06537,
2020.
R EFERENCES [22] H. Chai, S. Leng, Y. Chen, and K. Zhang, “A hierarchical blockchain-
enabled federated learning algorithm for knowledge sharing in internet
[1] J. Wan, J. Li, M. Imran, D. Li, and F. e Amin, “A blockchain-based of vehicles,” IEEE Transactions on Intelligent Transportation Systems,
solution for enhancing security and privacy in smart factory,” IEEE 2020.
Transactions on Industrial Informatics, vol. 15, no. 6, pp. 3652–3660, [23] M. Alazab, S. P. RM, P. M, P. K. R. Maddikunta, T. R. Gadekallu, and
2019. Q.-V. Pham, “Federated learning for cybersecurity: Concepts, challenges,
[2] F. Scicchitano, A. Liguori, M. Guarascio, E. Ritacco, and G. Manco, and future directions,” IEEE Transactions on Industrial Informatics,
“Blockchain attack discovery via anomaly detection,” Consiglio vol. 18, no. 5, pp. 3501–3509, 2022.
Nazionale delle Ricerche, Istituto di Calcolo e Reti ad Alte Prestazioni [24] H. Brendan McMahan, E. Moore, D. Ramage, S. Hampson, and
(ICAR), 2019, 2019. B. Agüera y Arcas, “Communication-efficient learning of deep networks
[3] Q. Xu, Z. He, Z. Li, M. Xiao, R. S. M. Goh, and Y. Li, “An effective from decentralized data,” ArXiv e-prints, pp. arXiv–1602, 2016.
blockchain-based, decentralized application for smart building system [25] J. Konečnỳ, H. B. McMahan, F. X. Yu, P. Richtárik, A. T. Suresh, and
management,” in Real-Time Data Analytics for Large Scale Sensor Data. D. Bacon, “Federated learning: Strategies for improving communication
Elsevier, 2020, pp. 157–181. efficiency,” arXiv preprint arXiv:1610.05492, 2016.
[4] B. Podgorelec, M. Turkanović, and S. Karakatič, “A machine learning- [26] N. Moussa and A. E. B. El Alaoui, “An energy-efficient cluster-based
based method for automated blockchain transaction signing including routing protocol using unequal clustering and improved aco techniques
personalized anomaly detection,” Sensors, vol. 20, no. 1, p. 147, 2020. for wsns,” Peer-to-Peer Networking and Applications, pp. 1–14, 2021.
[5] A. Quintal, “Veriblock foundation discloses mess [27] A. Yazdinejad, R. M. Parizi, G. Srivastava, A. Dehghantanha, and K.-
vulnerability in ethereum classic blockchain,” VeriBlock K. R. Choo, “Energy efficient decentralized authentication in internet
Foundation. [Online]. Available: https://www.prnewswire. of underwater things using blockchain,” in 2019 IEEE Globecom Work-
com/news-releases/veriblock-foundation-discloses-mess-vulner\ shops (GC Wkshps). IEEE, 2019, pp. 1–6.
ability-in-ethereum-classic-blockchain-301327998.html [28] V. Le, T. P. Quinn, T. Tran, and S. Venkatesh, “Deep in the bowel: highly
[6] M. Saad, J. Spaulding, L. Njilla, C. Kamhoua, S. Shetty, D. Nyang, interpretable neural encoder-decoder networks predict gut metabolites
and D. Mohaisen, “Exploring the attack surface of blockchain: A from gut microbiome,” BMC genomics, vol. 21, no. 4, pp. 1–15, 2020.
comprehensive survey,” IEEE Communications Surveys & Tutorials, [29] S. Golovkine, N. Klutchnikoff, and V. Patilea, “Clustering multivari-
vol. 22, no. 3, pp. 1977–2008, 2020. ate functional data using unsupervised binary trees,” arXiv preprint
[7] R. A. Sater and A. B. Hamza, “A federated learning approach to anomaly arXiv:2012.05973, 2020.
detection in smart buildings,” arXiv preprint arXiv:2010.10293, 2020. [30] H. Abdi and L. J. Williams, “Principal component analysis,” Wiley
[8] O. Shafiq, “Anomaly detection in blockchain,” Master’s thesis, Tampere interdisciplinary reviews: computational statistics, vol. 2, no. 4, pp. 433–
University, 2019. 459, 2010.
[9] A. Yazdinejadna, R. M. Parizi, A. Dehghantanha, and H. Karimipour, [31] K. P. Sinaga and M.-S. Yang, “Unsupervised k-means clustering algo-
“Federated learning for drone authentication,” Ad Hoc Networks, p. rithm,” IEEE Access, vol. 8, pp. 80 716–80 727, 2020.
102574, 2021. [32] I. P. Turnipseed, A new scada dataset for intrusion detection research.
[10] D. Preuveneers, V. Rimmer, I. Tsingenopoulos, J. Spooren, W. Joosen, Mississippi State University, 2015.
and E. Ilie-Zudor, “Chained anomaly detection models for federated [33] R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons, A. Ostfeld,
learning: An intrusion detection case study,” Applied Sciences, vol. 8, D. G. Eliades, M. Aghashahi, R. Sundararajan, M. Pourahmadi, M. K.
no. 12, p. 2663, 2018. Banks et al., “Battle of the attack detection algorithms: Disclosing cyber
[11] L. Tan, H. Xiao, K. Yu, M. Aloqaily, and Y. Jararweh, “A blockchain- attacks on water distribution networks,” Journal of Water Resources
empowered crowdsourcing system for 5g-enabled smart cities,” Com- Planning and Management, vol. 144, no. 8, p. 04018048, 2018.
puter Standards & Interfaces, vol. 76, p. 103517, 2021.

You might also like