{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:05:27Z","timestamp":1774541127723,"version":"3.50.1"},"reference-count":35,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T00:00:00Z","timestamp":1755129600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"RMIT University","award":["II-24-03"],"award-info":[{"award-number":["II-24-03"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>This paper proposes and evaluates a novel real-time cybersecurity framework integrating artificial intelligence (AI) and blockchain technology to enhance the detection and auditability of cyber threats. Traditional cybersecurity approaches often lack transparency and robustness in logging and verifying AI-generated decisions, hindering forensic investigations and regulatory compliance. To address these challenges, we developed an integrated solution combining a convolutional neural network (CNN)-based anomaly detection module with a permissioned Ethereum blockchain to securely log and immutably store AI-generated alerts and relevant metadata. The proposed system employs smart contracts to automatically validate AI alerts and ensure data integrity and transparency, significantly enhancing auditability and forensic analysis capabilities. To rigorously test and validate our solution, we conducted comprehensive experiments using the CICIDS2017 dataset and evaluated the system\u2019s detection accuracy, precision, recall, and real-time responsiveness. Additionally, we performed penetration testing and security assessments to verify system resilience against common cybersecurity threats. Results demonstrate that our AI-blockchain integrated solution achieves superior detection performance while ensuring real-time logging, transparency, and auditability. The integration significantly strengthens system robustness, reduces false positives, and provides clear benefits for cybersecurity management, especially in regulated environments. This paper concludes by outlining potential avenues for future research, particularly extending blockchain scalability, privacy enhancements, and optimizing performance for high-throughput cybersecurity applications.<\/jats:p>","DOI":"10.3390\/jcp5030059","type":"journal-article","created":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T15:44:21Z","timestamp":1755186261000},"page":"59","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["AI-Blockchain Integration for Real-Time Cybersecurity: System Design and Evaluation"],"prefix":"10.3390","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6465-1097","authenticated-orcid":false,"given":"Sam","family":"Goundar","sequence":"first","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne 3000, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7963-2446","authenticated-orcid":false,"given":"Iqbal","family":"Gondal","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne 3000, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2025,8,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"478","DOI":"10.51594\/csitrj.v4i3.1500","article-title":"Real-Time Cybersecurity threat detection using machine learning and big data analytics: A comprehensive approach","volume":"4","author":"Ofoegbu","year":"2023","journal-title":"Comput. Sci. IT Res. J."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Jain, V., and Mitra, A. (2025). Real-Time Threat Detection in Cybersecurity: Leveraging Machine Learning Algorithms for Enhanced Anomaly Detection. Machine Intelligence Applications in Cyber-Risk Management, IGI Global Scientific Publishing.","DOI":"10.4018\/979-8-3693-7540-2.ch014"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"6969","DOI":"10.1007\/s10115-025-02429-y","article-title":"Artificial intelligence and machine learning in cybersecurity: A deep dive into state-of-the-art techniques and future paradigms","volume":"67","author":"Mohamed","year":"2025","journal-title":"Knowl. Inf. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"12229","DOI":"10.1109\/ACCESS.2024.3355547","article-title":"A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cyber security solutions","volume":"12","author":"Akin","year":"2024","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s10462-024-11005-9","article-title":"Robustness in deep learning models for medical diagnostics: Security and adversarial challenges towards robust AI applications","volume":"58","author":"Javed","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Radanliev, P., and Santos, O. (2023). Adversarial attacks can deceive AI systems, leading to misclassification or incorrect decisions. ACM Comput. Surv.","DOI":"10.20944\/preprints202309.2064.v1"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.inffus.2023.03.008","article-title":"A systematic review of trustworthy and explainable artificial intelligence in healthcare: Assessment of quality, bias risk, and data fusion","volume":"96","author":"Albahri","year":"2023","journal-title":"Inf. Fusion"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3491209","article-title":"Trustworthy artificial intelligence: A review","volume":"55","author":"Kaur","year":"2022","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"37889","DOI":"10.1007\/s11042-023-16951-0","article-title":"Blockchain-based proof-of-authenticity frameworks for Explainable AI","volume":"83","author":"Malhotra","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"103858","DOI":"10.1016\/j.jnca.2024.103858","article-title":"AI-enhanced blockchain technology: A review of advancements and opportunities","volume":"225","author":"Ressi","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_11","first-page":"11","article-title":"AI and blockchain integration: Enhancing security and transparency in financial transactions","volume":"3","author":"Martinez","year":"2024","journal-title":"Int. Trans. Artif. Intell. (ITALIC)"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Goundar, S. (2024, January 9\u201311). Blockchain-AI integration for resilient real-time cyber security. Proceedings of the Global Congress on Emerging Technologies (GCET-2024), Gran Canaria, Spain.","DOI":"10.1109\/GCET64327.2024.10934609"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3503","DOI":"10.1007\/s10462-021-10088-y","article-title":"Explainable artificial intelligence: A comprehensive review","volume":"55","author":"Minh","year":"2022","journal-title":"Artif. Intell. Rev."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Aliyu, A.A., Liu, J., and Gilliard, E. (2024). A decentralized and self-adaptive intrusion detection approach using continuous learning and blockchain technology. J. Data Sci. Intell. Syst.","DOI":"10.47852\/bonviewJDSIS42023803"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Merhej, J., Harb, H., Abouaissa, A., and Idoumghar, L. (2024). Toward a new era of smart and secure healthcare information exchange systems: Combining blockchain and artificial intelligence. Appl. Sci., 14.","DOI":"10.3390\/app14198808"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Balani, Z., and Mohammed, M.S. (2025, January 15\u201316). The convergence of AI and blockchain technologies: A review on enhancing IoT security. Proceedings of the 2025 5th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), Fez, Morocco.","DOI":"10.1109\/IRASET64571.2025.11008214"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/s10462-024-10854-8","article-title":"Explainable artificial intelligence (XAI) in finance: A systematic literature review","volume":"57","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"78994","DOI":"10.1109\/ACCESS.2023.3294569","article-title":"A review of trustworthy and explainable artificial intelligence (XAI)","volume":"11","author":"Chamola","year":"2023","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s10207-023-00752-5","article-title":"An integrated deep learning model for Ethereum smart contract vulnerability detection","volume":"23","author":"Jain","year":"2024","journal-title":"Int. J. Inf. Secur."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"3614","DOI":"10.1109\/TITS.2023.3236274","article-title":"Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence","volume":"24","author":"Bendiab","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Anand, M., Kumar, S.P., Selvi, M., SVN, S.K., Ram, G.D., and Kannan, A. (2023, January 23\u201325). Deep learning model based IDS for detecting cyber attacks in IoT based smart vehicle network. Proceedings of the 2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), Gobichettipalayam, India.","DOI":"10.1109\/ICSCDS56580.2023.10104996"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"11553","DOI":"10.1109\/TII.2023.3246983","article-title":"Digital twins for anomaly detection in the industrial internet of things: Conceptual architecture and proof-of-concept","volume":"19","author":"Flammini","year":"2023","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"107274","DOI":"10.1016\/j.asoc.2021.107274","article-title":"Smart water conservation through a machine learning and blockchain-enabled decentralized edge computing network","volume":"106","author":"Thakur","year":"2021","journal-title":"Appl. Soft Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"112405","DOI":"10.1016\/j.asoc.2024.112405","article-title":"Privacy preserving verifiable federated learning scheme using blockchain and homomorphic encryption","volume":"167","author":"Mahato","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"e11477","DOI":"10.1016\/j.heliyon.2022.e11477","article-title":"Trusted-auditing chain: A security blockchain prototype used in agriculture traceability","volume":"8","author":"Lei","year":"2022","journal-title":"Heliyon"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ahmad, A., Lee, S., and Peinado, M. (2022, January 22\u201326). Hardlog: Practical tamper-proof system auditing using a novel audit device. Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP46214.2022.9833745"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Cao, B., Li, C., Song, Y., Qin, Y., and Chen, C. (2022). Network Intrusion Detection Model Based on CNN and GRU. Appl. Sci., 12.","DOI":"10.3390\/app12094184"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Mohammadpour, L., Ling, T.C., Liew, C.S., and Aryanfar, A. (2022). A Survey of CNN-Based Network Intrusion Detection. Appl. Sci., 12.","DOI":"10.3390\/app12168162"},{"key":"ref_29","unstructured":"(2024, June 06). CICIDS2017 Dataset. Available online: https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"100061","DOI":"10.1016\/j.bcra.2022.100061","article-title":"Blockchain software patterns for the design of decentralized applications: A systematic literature review","volume":"3","author":"Six","year":"2022","journal-title":"Blockchain Res. Appl."},{"key":"ref_31","first-page":"7586","article-title":"DECENT: Decentralized and efficient key management to secure communication in dense and dynamic environments","volume":"24","author":"Mantas","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Banipal, I.S., Asthana, S., and Mazumder, S. (2023, January 19\u201320). Sustainable AI\u2014Standards, current practices and recommendations. Proceedings of the Future Technologies Conference, Vancouver, BC, Canada.","DOI":"10.1007\/978-3-031-47454-5_21"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"142194","DOI":"10.1109\/ACCESS.2024.3463976","article-title":"AICyber-Chain: Combining AI and Blockchain for Improved Cybersecurity","volume":"12","author":"Ullah","year":"2024","journal-title":"IEEE Access"},{"key":"ref_34","unstructured":"Gajjar, T., Parikh, S., and Shekokar, K. (2025, January 2\u20133). Integrating blockchain technology with AI to enhance security measure. Proceedings of the Parul University International Conference on Engineering and Technology 2025 (PiCET 2025), Vadodara, India. Hybrid Conference."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Bhumichai, D., Smiliotopoulos, C., Benton, R., Kambourakis, G., and Damopoulos, D. (2024). The convergence of artificial intelligence and blockchain: The state of play and the road ahead. Information, 15.","DOI":"10.3390\/info15050268"}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/5\/3\/59\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:27:47Z","timestamp":1760034467000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/5\/3\/59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,14]]},"references-count":35,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["jcp5030059"],"URL":"https:\/\/doi.org\/10.3390\/jcp5030059","relation":{},"ISSN":["2624-800X"],"issn-type":[{"value":"2624-800X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,14]]}}}