{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T22:16:21Z","timestamp":1777932981675,"version":"3.51.4"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Data security and confidentiality are major goals now days due to the extensive use of the internet for data sharing. In modern era, most of the networks are compromised by intruders to grab access to private, confidential, and highly secured data. An intrusion detection system (IDS) is widely used to secure the network from getting compromised by intruders. Most of the IDS share the signatures of the novel attacks detected by anomaly approach for improving the detection rate and processing time. Security of signature shared by nodes is becoming a considerable problem. This paper presents a novel framework blockchain based hybrid intrusion detection system (BC-HyIDS), which uses the blockchain framework for exchanging signatures from one node to the other in distributed IDS. BC-HyIDS works in three phases where it uses both detection methods and blockchain in the third phase to provide security to data transferred through the network. This system makes use of a cryptosystem to encrypt the data stored in blocks to improve security one level higher. Hyperledger fabric v2.0 and Hyperledger sawtooth is used to implement system. Blockchain framework is created as a prototype using distributed ledger technology which helps in securing signature exchange. Performance of BC-HyIDS is evaluated in terms of accuracy, detection rate, and false alarm rate. From results, it is observed that a 2.8% increase in accuracy, 4.3% increase in detection rate, and a reduction of 2.6% in FAR is achieved. Blockchain performance is evaluated using Hyperledger fabric v2.0 and Hyperledger sawtooth on throughput, processing time, and average latency. BC-HyIDS shows improved performance when used with blockchain.\n<\/jats:p>","DOI":"10.1186\/s13638-022-02089-4","type":"journal-article","created":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:03:03Z","timestamp":1656327783000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Hybrid intrusion detection system using blockchain framework"],"prefix":"10.1186","volume":"2022","author":[{"given":"S. R.","family":"Khonde","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"V.","family":"Ulagamuthalvi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,6,27]]},"reference":[{"key":"2089_CR1","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"M. Ahmed, A.N. Mahmood, H. Jiankun, A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2015.11.016","journal-title":"J. Netw. Comput. Appl."},{"key":"2089_CR2","doi-asserted-by":"publisher","first-page":"102422","DOI":"10.1016\/j.jnca.2019.102422","volume":"147","author":"J Manan","year":"2019","unstructured":"J. Manan, A. Ahmed, I. Ullah, L.M. Boulahia, D. Gaiti, Distributed intrusion detection scheme for next generation networks. J. Netw. Comput. Appl. 147, 102422 (2019). https:\/\/doi.org\/10.1016\/j.jnca.2019.102422","journal-title":"J. Netw. Comput. Appl."},{"key":"2089_CR3","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.dcan.2019.01.005","volume":"6","author":"PJ Taylor","year":"2020","unstructured":"P.J. Taylor, T. Dargahi, A. Dehghantanha, R.M. Parizi, K.R. Choo, A systematic literature review of blockchain cyber security. Digit. Commun. Netw. 6, 147\u2013156 (2020)","journal-title":"Digit. Commun. Netw."},{"issue":"1","key":"2089_CR4","doi-asserted-by":"publisher","first-page":"102397","DOI":"10.1016\/j.ipm.2020.102397","volume":"58","author":"D Berdik","year":"2021","unstructured":"D. Berdik, S. Otoum, N. Schmidt, D. Porter, Y. Jararweh, A survey on blockchain for information systems management and security. Inf. Process. Manag. 58(1), 102397 (2021). https:\/\/doi.org\/10.1016\/j.ipm.2020.102397","journal-title":"Inf. Process. Manag."},{"key":"2089_CR5","doi-asserted-by":"publisher","first-page":"27324","DOI":"10.1109\/ACCESS.2018.2821705","volume":"6","author":"Y He","year":"2018","unstructured":"Y. He, H. Li, X. Cheng, Y. Liu, C. Yang, L. Sun, A blockchain based truthful incentive mechanism for distributed P2P applications. IEEE Access 6, 27324\u201327335 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2821705","journal-title":"IEEE Access"},{"issue":"7","key":"2089_CR6","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1109\/TKDE.2017.2781227","volume":"30","author":"T Dinh","year":"2018","unstructured":"T. Dinh, R. Liu, M. Zhang, G. Chen, B. Ooi, J. Wang, Untangling blockchain: a data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30(7), 1366\u20131385 (2018). https:\/\/doi.org\/10.1109\/TKDE.2017.2781227","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"2089_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.33166\/AETiC.2018.01.001","volume":"2","author":"M Miraz","year":"2018","unstructured":"M. Miraz, M. Ali, Applications of blockchain technology beyond cryptocurrency. Ann. Emerg. Technol. Comput. 2(1), 1\u20136 (2018)","journal-title":"Ann. Emerg. Technol. Comput."},{"issue":"1","key":"2089_CR8","doi-asserted-by":"publisher","first-page":"10179","DOI":"10.1109\/ACCESS.2018.2799854","volume":"6","author":"W Meng","year":"2018","unstructured":"W. Meng, E. Tischhauser, Q. Wang, Y. Wang, J. Han, When intrusion detection meets blockchain technology: a review. IEEE Access 6(1), 10179\u201310188 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2799854","journal-title":"IEEE Access"},{"key":"2089_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2020.08.010","volume-title":"Advances in Computers","author":"N Kumar","year":"2020","unstructured":"N. Kumar, S. Aggarwal, Core components of blockchain, in Advances in Computers. ed. by S. Aggarwal, N. Kumar, P. Raj (Academic Press, London, 2020). https:\/\/doi.org\/10.1016\/bs.adcom.2020.08.010"},{"key":"2089_CR10","doi-asserted-by":"publisher","first-page":"102918","DOI":"10.1016\/j.jnca.2020.102918","volume":"175","author":"M Jan","year":"2021","unstructured":"M. Jan, J. Cai, X. Gao, F. Khan, S. Mastorakis, M. Usman, M. Alazab, P. Watters, Security and blockchain convergence with internet of multimedia things: current trends, research challenges and future directions. J. Netw. Comput. Appl. 175, 102918 (2021). https:\/\/doi.org\/10.1016\/j.jnca.2020.102918","journal-title":"J. Netw. Comput. Appl."},{"key":"2089_CR11","unstructured":"A. Ramachandran, M. Kantarcioglu, Using blockchain and smart contracts for secure data provenance management. arXiv:1709.10000 (2017)"},{"key":"2089_CR12","doi-asserted-by":"publisher","first-page":"17465","DOI":"10.1109\/ACCESS.2017.2720760","volume":"5","author":"K Toyoda","year":"2017","unstructured":"K. Toyoda, P. Mathiopoulos, I. Sasase, T. Ohtsuki, A novel blockchain-based product ownership management system (POMS) for anti counterfeits in the post supply chain. IEEE Access 5, 17465\u201317477 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2720760","journal-title":"IEEE Access"},{"issue":"3","key":"2089_CR13","first-page":"9135","volume":"29","author":"BT Rao","year":"2020","unstructured":"B.T. Rao, V.L. Narayana, V. Pavani, P. Anusha, Use of blockchain in malicious activity detection for improving security. Int. J. Adv. Sci. Technol. 29(3), 9135\u20139146 (2020)","journal-title":"Int. J. Adv. Sci. Technol."},{"issue":"1","key":"2089_CR14","doi-asserted-by":"publisher","first-page":"3821","DOI":"10.35940\/ijeat.A9836.109119","volume":"9","author":"AR Mathew","year":"2019","unstructured":"A.R. Mathew, Cyber security through blockchain technology. Int. J. Eng. Adv. Technol. 9(1), 3821\u20133824 (2019)","journal-title":"Int. J. Eng. Adv. Technol."},{"key":"2089_CR15","doi-asserted-by":"publisher","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","volume":"149","author":"J Sengupta","year":"2020","unstructured":"J. Sengupta, S. Ruj, S. Bit, A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 149, 102481 (2020). https:\/\/doi.org\/10.1016\/j.jnca.2019.102481","journal-title":"J. Netw. Comput. Appl."},{"issue":"7","key":"2089_CR16","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.3390\/electronics9071120","volume":"9","author":"C Liang","year":"2020","unstructured":"C. Liang, B. Shanmugam, S. Azam, A. Karim, A. Islam, M. Zamani, S. Kavianpour, N. Idris, Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics 9(7), 1120 (2020). https:\/\/doi.org\/10.3390\/electronics9071120","journal-title":"Electronics"},{"key":"2089_CR17","doi-asserted-by":"crossref","unstructured":"T. Golomb, Y. Mirsky, Y. Elovici, CIoTA: collaborative IoT anomaly detection via blockchain. arXiv:1803.03807v2, [cs.CY] (2018)","DOI":"10.14722\/diss.2018.23003"},{"key":"2089_CR18","doi-asserted-by":"publisher","first-page":"9601357","DOI":"10.1155\/2018\/9601357","volume":"2018","author":"N Agarwal","year":"2018","unstructured":"N. Agarwal, S. Hussain, A closer look at intrusion detection system for web applications. Secur. Commun. Netw. 2018, 9601357 (2018). https:\/\/doi.org\/10.1155\/2018\/9601357","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"2089_CR19","first-page":"35","volume":"41","author":"H Hamad","year":"2012","unstructured":"H. Hamad, M. Al-Hoby, Managing intrusion detection as a service in cloud networks. Int. J. Comput. Appl. 41(1), 35\u201340 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"2089_CR20","first-page":"1229512303","volume":"6","author":"Y Zhao","year":"2018","unstructured":"Y. Zhao, Y. Li, Q. Mu, B. Yang, Y. Yu, Secure pub-sub: blockchain-based fair payment with reputation for reliable cyber physical systems. IEEE Access 6, 1229512303 (2018)","journal-title":"IEEE Access"},{"key":"2089_CR21","doi-asserted-by":"publisher","first-page":"24639","DOI":"10.1109\/ACCESS.2018.2799942","volume":"6","author":"S Cha","year":"2018","unstructured":"S. Cha, J. Chen, C. Su, K. Yeh, A blockchain connected gateway for BLE-based devices in the internet of things. IEEE Access 6, 24639\u201324649 (2018)","journal-title":"IEEE Access"},{"key":"2089_CR22","unstructured":"K. W\u00fcst, A. Gervais, Do you need a blockchain? IACR Cryptol. ePrint Arch. 375 (2017), Available http:\/\/eprint.iacr.org\/2017\/375"},{"key":"2089_CR23","unstructured":"S. Nakamoto, BitCoin: a peer-to-peer electronic cash system (2008), Available http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"2089_CR24","doi-asserted-by":"publisher","unstructured":"E. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, M. Virza, Zerocash: decentralized anonymous payments from bitcoin, in Proceedings of IEEE Symposium on Security and Privacy, Berkeley, CA, USA (2014), pp. 459\u2013474. https:\/\/doi.org\/10.1109\/SP.2014.36","DOI":"10.1109\/SP.2014.36"},{"key":"2089_CR25","unstructured":"G. Wood, Ethereum: a secure decentralised generalised transaction ledger. Document EIP-150 Revision (2016)"},{"key":"2089_CR26","unstructured":"Linux Foundation. Hyperledger blockchain for business, Available https:\/\/www.hyperledger.org. Accessed 1 Oct 2017"},{"key":"2089_CR27","doi-asserted-by":"publisher","first-page":"101590","DOI":"10.1016\/j.is.2020.101590","volume":"94","author":"Y Chen","year":"2020","unstructured":"Y. Chen, S. Chen, J. Liang, L. Feagan, W. Han, S. Huang, X. Wang, Decentralized data access control over consortium blockchains. Inf. Syst. 94, 101590 (2020). https:\/\/doi.org\/10.1016\/j.is.2020.101590","journal-title":"Inf. Syst."},{"key":"2089_CR28","doi-asserted-by":"publisher","first-page":"12118","DOI":"10.1109\/ACCESS.2018.2805783","volume":"6","author":"J Gu","year":"2018","unstructured":"J. Gu, B. Sun, X. Du, J. Wang, Y. Zhuang, Z. Wang, Consortium blockchain-based malware detection in mobile devices. IEEE Access 6, 12118\u201312128 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2805783","journal-title":"IEEE Access"},{"key":"2089_CR29","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.eij.2013.10.003","volume":"15","author":"G Nadiammai","year":"2014","unstructured":"G. Nadiammai, M. Hemalatha, Effective approach toward intrusion detection system using data mining techniques. Egypt. Inform. J. 15, 37\u201350 (2014). https:\/\/doi.org\/10.1016\/j.eij.2013.10.003","journal-title":"Egypt. Inform. J."},{"key":"2089_CR30","doi-asserted-by":"publisher","first-page":"14525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"R. Vinayakumar, M. Alazab, K. Soman, P. Poornachandran, A. Al-nemrat, S. Venkatraman, Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 14525\u201341550 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2895334","journal-title":"IEEE Access"},{"issue":"1","key":"2089_CR31","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, M. Rajarajan, A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42\u201357 (2013). https:\/\/doi.org\/10.1016\/j.jnca.2012.05.003","journal-title":"J. Netw. Comput. Appl."},{"key":"2089_CR32","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.cose.2016.11.004","volume":"65","author":"A Aburomman","year":"2017","unstructured":"A. Aburomman, M. Reaz, A survey of intrusion detection systems based on ensemble and hybrid classifiers. Comput. Secur. 65, 35\u2013152 (2017). https:\/\/doi.org\/10.1016\/j.cose.2016.11.004","journal-title":"Comput. Secur."},{"issue":"6","key":"2089_CR33","first-page":"1159","volume":"18","author":"Q Qassim","year":"2016","unstructured":"Q. Qassim, A. Zin, M. Aziz, Anomalies classification approach for network\u2014based intrusion detection system. Int. J. Netw. Secur. 18(6), 1159\u20131172 (2016)","journal-title":"Int. J. Netw. Secur."},{"key":"2089_CR34","doi-asserted-by":"publisher","first-page":"13624","DOI":"10.1109\/ACCESS.2018.2810198","volume":"6","author":"P Tao","year":"2018","unstructured":"P. Tao, Z. Sun, Z. Sun, An improved intrusion detection algorithm based on GA and SVM. IEEE Access 6, 13624\u201313631 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2810198","journal-title":"IEEE Access"},{"key":"2089_CR35","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.future.2013.06.027","volume":"37","author":"W Feng","year":"2014","unstructured":"W. Feng, Q. Zhang, G. Hu, J.X. Huang, Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Gener. Comput. Syst. 37, 127\u2013140 (2014). https:\/\/doi.org\/10.1016\/j.future.2013.06.027","journal-title":"Future Gener. Comput. Syst."},{"key":"2089_CR36","doi-asserted-by":"publisher","first-page":"42210","DOI":"10.1109\/ACCESS.2019.2904620","volume":"7","author":"Y Xiao","year":"2019","unstructured":"Y. Xiao, C. Xing, T. Zhang, Z. Zhao, An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42210\u201342219 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2904620","journal-title":"IEEE Access"},{"key":"2089_CR37","doi-asserted-by":"publisher","first-page":"101851","DOI":"10.1016\/j.cose.2020.1010851","volume":"95","author":"X Li","year":"2020","unstructured":"X. Li, W. Chen, Q. Zhang, L. Wu, Building auto-encoder intrusion detection system based on random forest feature selection. Comput. Secur. 95, 101851 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.1010851","journal-title":"Comput. Secur."},{"key":"2089_CR38","doi-asserted-by":"publisher","first-page":"107247","DOI":"10.1016\/j.comnet.2020.107247","volume":"174","author":"Y Zhou","year":"2020","unstructured":"Y. Zhou, G. Cheng, S. Jiang, M. Dai, Building an efficient intrusion detection system based on feature election and ensemble classifier. Comput. Netw. 174, 107247 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2020.107247","journal-title":"Comput. Netw."},{"key":"2089_CR39","doi-asserted-by":"publisher","first-page":"12060","DOI":"10.1109\/ACCESS.2017.2787719","volume":"6","author":"L Li","year":"2017","unstructured":"L. Li, Y. Yu, S. Bai, Y. Hou, X. Chen, An effective two-step intrusion detection approach based on binary classification and k-NN. IEEE Access 6, 12060\u201312073 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2787719","journal-title":"IEEE Access"},{"issue":"1","key":"2089_CR40","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.jnca.2005.06.003","volume":"30","author":"S Peddabachigiri","year":"2007","unstructured":"S. Peddabachigiri, A. Abraham, C. Grosan, J. Thomas, Modelling of intrusion detection system using hybrid intelligent systems. J. Netw. Comput. Appl. 30(1), 114\u2013132 (2007). https:\/\/doi.org\/10.1016\/j.jnca.2005.06.003","journal-title":"J. Netw. Comput. Appl."},{"key":"2089_CR41","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.neucom.2016.06.021","volume":"214","author":"C Guo","year":"2016","unstructured":"C. Guo, Y. Ping, N. Liu et al., A two-level hybrid approach for intrusion detection. Neurocomputing 214, 391\u2013400 (2016)","journal-title":"Neurocomputing"},{"key":"2089_CR42","doi-asserted-by":"publisher","first-page":"50850","DOI":"10.1109\/ACCESS.2018.2868993","volume":"6","author":"K Wu","year":"2018","unstructured":"K. Wu, Z. Chen, W. Li, A novel intrusion detection model for a massive network using convolutional neural networks. IEEE Access 6, 50850\u201350859 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2868993","journal-title":"IEEE Access"},{"issue":"7","key":"2089_CR43","doi-asserted-by":"publisher","first-page":"1731","DOI":"10.1016\/j.engappai.2013.03.008","volume":"26","author":"ZA Baig","year":"2013","unstructured":"Z.A. Baig, S.M. Sait, A.R. Shaheen, GMDH-based networks for intelligent intrusion detection. Eng. Appl. Artif. Intell. 26(7), 1731\u20131740 (2013). https:\/\/doi.org\/10.1016\/j.engappai.2013.03.008","journal-title":"Eng. Appl. Artif. Intell."},{"key":"2089_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106639","volume":"85","author":"M AbdShehab","year":"2020","unstructured":"M. AbdShehab, N. Kahraman, A weighted voting ensemble of efficient regularized extreme learning machine. Comput. Electr. Eng. 85, 106639 (2020). https:\/\/doi.org\/10.1016\/j.compeleceng.2020.106639","journal-title":"Comput. Electr. Eng."},{"key":"2089_CR45","first-page":"40","volume":"2","author":"S Kumari","year":"2021","unstructured":"S. Kumari, D. Kumar, M. Mittal, An ensemble approach for classification and prediction of diabetes mellitus using soft voting classifier. Int. J. Cogn. Comput. Eng. 2, 40\u201346 (2021)","journal-title":"Int. J. Cogn. Comput. Eng."},{"key":"2089_CR46","doi-asserted-by":"publisher","first-page":"173481","DOI":"10.1109\/ACCESS.2020.3025622","volume":"8","author":"M Signorini","year":"2020","unstructured":"M. Signorini, M. Pontecorvi, W. Kanoun, R. Pietro, BAD: a blockchain anomaly detection solution. IEEE Access 8, 173481\u2013173490 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3025622","journal-title":"IEEE Access"},{"key":"2089_CR47","doi-asserted-by":"crossref","unstructured":"M. Signorini, M. Pontecorvi, W. Kanoun, R.D. Pietro, Advise: anomaly detection tool for blockchain systems, in 2018 IEEE World Congress on Services (SERVICES) (2018), pp. 65\u201366","DOI":"10.1109\/SERVICES.2018.00046"},{"issue":"2","key":"2089_CR48","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/TSC.2019.2949561","volume":"13","author":"X Wang","year":"2020","unstructured":"X. Wang, J. He, Z. Xie, G. Zhao, S. Cheung, Contractguard: defend ethereum smart contracts with embedded intrusion detection. IEEE Trans. Serv. Comput. 13(2), 314\u2013328 (2020). https:\/\/doi.org\/10.1109\/TSC.2019.2949561","journal-title":"IEEE Trans. Serv. Comput."},{"key":"2089_CR49","doi-asserted-by":"publisher","unstructured":"P. Ga\u017ei, A. Kiayias, D. Zindros, Proof-of-stake sidechains, in 2019 IEEE Symposium on Security and Privacy (SP) (2019), pp. 139\u2013156. https:\/\/doi.org\/10.1109\/SP.2019.00040","DOI":"10.1109\/SP.2019.00040"},{"key":"2089_CR50","doi-asserted-by":"publisher","first-page":"126927","DOI":"10.1109\/ACCESS.2020.3006078","volume":"8","author":"C Fan","year":"2020","unstructured":"C. Fan, S. Ghaemi, H. Khazaei, P. Musilek, Performance evaluation of blockchain systems: a systematic survey. IEEE Access 8, 126927\u2013126950 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3006078","journal-title":"IEEE Access"},{"issue":"12","key":"2089_CR51","doi-asserted-by":"publisher","first-page":"3358","DOI":"10.3390\/s20123358","volume":"20","author":"S Smetanin","year":"2020","unstructured":"S. Smetanin, A. Ometov, M. Komarov, P. Masek, Y. Koucheryavy, Blockchain evaluation approaches: state-of-the-art and future perspective. Sensors 20(12), 3358 (2020). https:\/\/doi.org\/10.3390\/s20123358","journal-title":"Sensors"},{"key":"2089_CR52","doi-asserted-by":"publisher","first-page":"3976093","DOI":"10.1155\/2018\/3976093","volume":"2018","author":"Q Nasir","year":"2018","unstructured":"Q. Nasir, I. Qasse, M. Talib, A. Nassif, Performance analysis of hyperledger fabric platforms. Secur. Commun. Netw. 2018, 3976093 (2018). https:\/\/doi.org\/10.1155\/2018\/3976093","journal-title":"Secur. Commun. Netw."},{"key":"2089_CR53","unstructured":"A. Baliga, I. Subhod, P. Kamat, S. Chatterjee, Performance evaluation of the quorum blockchain platform. arXiv:1809.03421 (2018)"},{"key":"2089_CR54","doi-asserted-by":"publisher","unstructured":"S. Pongnumkul, C. Siripanpornchana, S. Thajchayapong, Performance analysis of private blockchain platforms in varying workloads, in 26th International Conference on Computer Communications and Networks, ICCCN (2017). https:\/\/doi.org\/10.1109\/ICCCN.2017.8038517","DOI":"10.1109\/ICCCN.2017.8038517"},{"key":"2089_CR55","first-page":"56","volume":"65","author":"W Al-Yaseen","year":"2016","unstructured":"W. Al-Yaseen, Z. Othman, Z. Nazri, Real-time multi-agent system for an adaptive intrusion detection system. Pattern Recognit. Lett. 65, 56\u201364 (2016)","journal-title":"Pattern Recognit. Lett."},{"key":"2089_CR56","doi-asserted-by":"crossref","unstructured":"T. Hwang, T. Lee, Y. Lee, A three tier IDS via data mining approach, in Proceedings of the 3rd Annual ACM Workshop on Mining Network Data, San Diego, CA (2007), pp. 1\u20136","DOI":"10.1145\/1269880.1269882"},{"key":"2089_CR57","doi-asserted-by":"crossref","unstructured":"L. Kuang, M. Zulkernine, An anomaly intrusion detection method using the CSI-KNN algorithm, in ACM Symposium on Applied Computing, Fortaleza (Ceara, Brazil) (2008), pp. 921\u2013926","DOI":"10.1145\/1363686.1363897"},{"key":"2089_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2016.03.011","volume":"66","author":"G Folino","year":"2016","unstructured":"G. Folino, P. Sabatino, Ensemble based collaborative and distributed intrusion detection systems: a survey. J. Netw. Comput. Appl. 66, 1\u201316 (2016)","journal-title":"J. Netw. Comput. Appl."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-022-02089-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-022-02089-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-022-02089-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:05:27Z","timestamp":1656327927000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-022-02089-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["2089"],"URL":"https:\/\/doi.org\/10.1186\/s13638-022-02089-4","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,27]]},"assertion":[{"value":"26 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The experiments are numerical simulations on a computer platform. They do not require and ethical valuation. There is no research carried out on Humans, animals, plants, or other living tissues.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"58"}}