International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |


TITLE Blockchain-Powered Insider Threat Detection through Log Analysis
ABSTRACT Because malicious activity is frequently carried out by users with authorized access privileges, insider threats present a serious cybersecurity risk that is challenging to identify with conventional security measures. The centralized log management used by traditional insider threat detection systems is susceptible to manipulation and lacks reliable auditability. This study suggests a blockchain-powered insider threat detection system that combines decentralized and unchangeable alert storage with rule-based log analysis to overcome these drawbacks. To find suspect activity such persistent unsuccessful login attempts, unauthorized resource access, unusual login timings, and privilege escalation, system and application logs are examined. When security alerts are detected, Ganache-deployed smart contracts use the SHA-256 method to cryptographically hash them and record them on a private Ethereum blockchain. This guarantees transparent audit trails, non-repudiation, and data integrity. Blockchain-verified alarm visualization, automated analysis, and safe log submission are all supported by a Flask-based web interface. The suggested method provides tamper-proof and reliable alert management while successfully identifying insider threats with little processing overhead, according to experimental evaluation. The platform provides a scalable basis for upcoming real-time and machine-learning-based expansions while improving insider threat monitoring's transparency and dependability
AUTHOR SAKSHI N M, SANJANA G P, SNEHA M K, MANJUNATH K G UG Students, Dept. of CSE, Jain Institute of Technology, Davangere, Karnataka, India Assistant Professor, Dept. of CSE, Jain Institute of Technology, Davangere, Karnataka, India
VOLUME 177
DOI DOI: 10.15680/IJIRCCE.2025.1312124
PDF pdf/124_Blockchain-Powered Insider Threat Detection through Log Analysis.pdf
KEYWORDS
References Kim, J., Park, S., & Lee, H., “Deep Learning-Based Log Analysis for Cybersecurity in Blockchain-Enabled Vehicular Networks,”
IEEE Access, vol. 10, pp. 112345–112358, 2022.
[2] Behl, A., & Behl, K.,Cybersecurity and Cyberwar: What Everyone Needs to Know,” Oxford University Press, 2017.
[3] Taherdoost, H.,“Blockchain and Machine Learning for Cybersecurity: A Systematic Review,” Computers, vol. 12, no. 4, pp. 1–25, 2023.
[4] Vega-Mori, R., Rodríguez-Correa, M., & López-Nores, M., “Applications of Blockchain and Machine Learning in Secure Communication Systems: A Bibliometric Analysis,”Sensors, vol. 24, no. 3, pp. 1–22, 2024. doi: 10.3390/s24030945.
[5] Salahdine, F., Kaabouch, N., & Ghazi, H.,“A Blockchain-Based Framework for Secure Network Monitoring in 5G Environments,”IEEE Communications Magazine, vol. 56, no. 6, pp. 38–44, 2018. doi: 10.1109/MCOM.2018.1701234.
[6] Rodriguez-Correa, M., Vega-Mori, R., & Pérez-López, D.,
[7] “Global Research Trends in Blockchain and Machine Learning Integration for Cybersecurity,”Journal of Network and Computer Applications, vol. 225, pp. 103456, 2024. doi: 10.1016/j.jnca.2024.103456.
[8] Conti, M., Dehghantanha, A., Franke, K., & Watson, S.,“Internet of Things Security and Forensics: Challenges and Opportunities,” Future Generation Computer Systems, vol. 78, pp. 544–546, 2018.
[9] Buterin, V.,“Ethereum White Paper: A Next-Generation Smart Contract and Decentralized Application Platform,”Ethereum Foundation, 2014.
[10] Kent, K., Chevalier, S., Grance, T., & Dang, H.,“Guide to Integrating Forensic Techniques into Incident Response,” NIST Special Publication 800-86, National Institute of Standards and Technology, 2006.
image
Copyright © IJIRCCE 2020.All right reserved