When Intrusion Detection Meets Blockchain Technology: A Review

Weizhi Meng, Elmar Wolfgang Tischhauser, Qingju Wang, Yu Wang*, Jinguang Han

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

4473 Downloads (Pure)


With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction.
Original languageEnglish
JournalIEEE Access
Pages (from-to)10179 - 10188
Publication statusPublished - 2018


  • Computer Science (all)
  • Materials Science (all)
  • Engineering (all)
  • Blockchain technology
  • Collaborative network
  • Data sharing and management
  • Intrusion detection
  • Trust Management
  • Digital storage
  • Information management
  • Mercury (metal)
  • Network security
  • Security of data
  • Supply chain management
  • Block-chain
  • Current detection
  • Data Sharing
  • Detection capability
  • Detection system
  • Intrusion Detection Systems
  • Trust management


Dive into the research topics of 'When Intrusion Detection Meets Blockchain Technology: A Review'. Together they form a unique fingerprint.

Cite this