Skip to main content

Artificial Intelligence and Blockchain for Cybersecurity Applications

  • Chapter
  • First Online:
Artificial Intelligence and Blockchain for Future Cybersecurity Applications

Part of the book series: Studies in Big Data ((SBD,volume 90))

Abstract

The convergence of Artificial Intelligence and Blockchain is growing very fast in everyday applications and industry. In centralized systems and applications like healthcare, data access and processing in real-time among various information systems is a bottleneck. Blockchain’s decentralized database architecture, secure storage, authentication, and data sharing would offer a solution to this problem. Besides, Artificial Intelligence can live at the top of Blockchain and generate insights from the generated shared data used to make predictions. Blockchain is a high-level cybersecurity technology that forms chains that connect the existing blocks stored in nodes and the new block chronologically by mutual agreements between nodes. Technology convergence accelerates various industries’ growth, such as banking, insurance, cybersecurity, forecasting, medical services, cryptocurrency, etc… The more digital systems are adopted and services provided by these industries, the greater the risk of hacking these systems. Combining blockchain power and artificial intelligence can provide a strong shield against these attacks and security threats. In this chapter, we will study the convergence of AI and Blockchain in cybersecurity. We will expand on their role in securing cyber-physical systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Thames, L., Schaefer, D.: Industry 4.0: an overview of key benefits, technologies, and challenges. In: Cybersecurity for Industry 4.0, pp. 1–33. Springer, Cham (2017)

    Google Scholar 

  2. Zhao, K., Ge, L.: A survey on the Internet of Things security. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 663–667. IEEE, December 2013

    Google Scholar 

  3. Hassani, H., Huang, X., Silva, E.: Big-crypto: big data, blockchain, and cryptocurrency. Big Data Cogn. Comput. 2(4), 34 (2018)

    Article  Google Scholar 

  4. Maxmen, A.: Ai researchers embrace Bitcoin technology to share medical data. Nature 555, 293–294 (2018)

    Article  Google Scholar 

  5. Baynham-Herd, Z.: Enlist blockchain to boost conservation. Nature 548(7669), 523 (2017)

    Article  Google Scholar 

  6. Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Newton (2015)

    Google Scholar 

  7. Aghiath, C.: How AI and Blockchain will be the Future of Cybersecurity (2020). https://www.intelligenthq.com/how-ai-and-blockchain-will-be-the-future-of-cybersecurity/. Accessed Dec 2020

  8. Sirui, Z.: Economics of Artificial Intelligence (2019). https://equalocean.com/analysis/2019100712033. Accessed Dec 2020

  9. Koch, M.: Artificial intelligence is becoming natural. Cell 173(3), 531–533 (2018)

    Article  Google Scholar 

  10. Nebula AI (NBAI): Decentralized AI blockchain whitepaper. Nebula AI Team, Montreal (2018)

    Google Scholar 

  11. Dinh, T.N., Thai, M.T.: AI and blockchain: a disruptive integration. Computer 51(9), 48–53 (2018)

    Article  Google Scholar 

  12. Wang, S., Yuan, Y., Wang, X., Li, J., Qin, R., Wang, F.-Y.: An overview of smart contract: architecture, applications, and future trends. In: Proceedings of the IEEE Intelligent Vehicles Symposium (IV), pp. 108–113, June 2018

    Google Scholar 

  13. Panda, S., Jena, D.: Decentralizing AI using blockchain technology for secure decision making (2021). https://doi.org/10.1007/978-981-15-5243-4_65

  14. Mohanta, B.K., Jena, D., Panda, S.S., Sobhanayak, S.: Blockchain technology: a survey on applications and security privacy challenges. Internet Things 8, 100107 (2019)

    Article  Google Scholar 

  15. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009)

    Google Scholar 

  16. Wood, G.: Ethereum: a secure decentralized generalized transaction ledger. Ethereum Project Yellow Paper, vol. 151, pp. 1–32, April 2014

    Google Scholar 

  17. Market capitalization of Bitcoin from October 2013 to 13 December 2020. https://www.statista.com/statistics/377382/bitcoin-market-capitalization/. Accessed Dec 2020

  18. NIST (2020). https://csrc.nist.gov/glossary/term/social_engineering. Accessed Dec 2020

  19. Department of Justice (2019). https://www.justice.gov/opa/pr/russian-national-charged-decade-long-series-hacking-and-bank-fraud-offenses-resulting-tens. Accessed Dec 2020

  20. Al-Rushdan, H., Shurman, M., Alnabelsi, S.H., Althebyan, Q.: Zero-day attack detection and prevention in software-defined networks. In: 2019 International Arab Conference on Information Technology (ACIT), Al Ain, United Arab Emirates, pp. 278–282 (2019). https://doi.org/10.1109/ACIT47987.2019.8991124

  21. Wikipedia (2016 Dyn cyberattack). https://en.wikipedia.org/wiki/2016_Dyn_cyberattack. Accessed Dec 2020

  22. Michel, C.: Study: Hackers Attack Every 39 Seconds (2007). https://eng.umd.edu/news/story/study-hackers-attack-every-39-seconds. Accessed Dec 2020

  23. Yao, M.: Your electronic medical records could be worth $1000 to hackers, Forbes (2017). https://www.Forbes.com/sites/mariyayao/2017/04/14/your-electronic-medical-records-can-be-worth-1000-to-hackers. Accessed Dec 2020

  24. Purplesec: 2020 Cyber Secuirty Statistics the Ultimate List of Stats Data & Trends (2020). https://purplesec.us/resources/cyber-security-statistics/. Accessed Dec 2020

  25. Singer, P.W., Friedman, A.: Cybersecurity: what everyone needs to know. OUP, USA (2014)

    Google Scholar 

  26. Parrend, P., Navarro, J., Guigou, F., Deruyver, A., Collet, P.: Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection. EURASIP J. Inf. Secur. 2018(1), 4 (2018)

    Article  Google Scholar 

  27. Raj, R.K., Anand, V., Gibson, D., Kaza, S., Phillips, A.: Cybersecurity program accreditation: benefits and challenges. In: Proceedings of the 50th ACM Technical Symposium on Computer Science Education, pp. 173–174, February 2019

    Google Scholar 

  28. De Bruijn, H., Janssen, M.: Building cybersecurity awareness: the need for evidence-based framing strategies. Gov. Inf. Q. 34(1), 1–7 (2017)

    Article  Google Scholar 

  29. Maalem Lahcen, R.A., Caulkins, B., Mohapatra, R., Kumar, M.: Review and insight on the behavioral aspects of cybersecurity. Cybersecurity 3, 1–18 (2020)

    Article  Google Scholar 

  30. Patterson, I., Nutaro, J., Allgood, G., Kuruganti, T., Fugate, D.: Optimizing investments in cyber-security for critical infrastructure. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, pp. 1–4, January 2013

    Google Scholar 

  31. Jones, S.L., Collins, E.I., Levordashka, A., Muir, K., Joinson, A.: What is ‘cyber security’? Differential language of cyber security across the lifespan. In: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1–6, May 2019

    Google Scholar 

  32. Romero-Mariona, J., Ziv, H., Richardson, D.J., Bystritsky, D.: Towards usable cyber security requirements. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, pp. 1–4, April 2009

    Google Scholar 

  33. Yavanoglu, O., Aydos, M.: A review of cybersecurity datasets for machine learning algorithms. In: 2017 IEEE International Conference on Big Data (Big Data), pp. 2186–2193. IEEE, December 2017

    Google Scholar 

  34. Yampolskiy, R.V., Spellchecker, M.S.: Artificial intelligence safety and cybersecurity: a timeline of AI failures. arXiv preprint arXiv:1610.07997 (2016)

  35. Dilek, S., Çakır, H., Aydın, M.: Applications of artificial intelligence techniques to combating cyber crimes: a review. arXiv preprint arXiv:1502.03552 (2015)

  36. Li, J.H.: Cybersecurity meets artificial Intelligence: a survey. Front. Inf. Technol. Electron. Eng. 19(12), 1462–1474 (2018)

    Article  Google Scholar 

  37. O’Reilly, U.M., Toutouh, J., Pertierra, M., Sanchez, D.P., Garcia, D., Luogo, A.E., Hemberg, E.: Adversarial genetic programming for cybersecurity: a rising application domain where GP matters. Genet. Program. Evol. Mach. 21, 219–250 (2020)

    Article  Google Scholar 

  38. Banković, Z., Stepanović, D., Bojanić, S., Nieto-Taladriz, O.: Improving network security using a genetic algorithm approach. Comput. Electr. Eng. 33(5–6), 438–451 (2007)

    Article  Google Scholar 

  39. Willard, G.N.: Understanding the co-evolution of cyber defenses and attacks to achieve enhanced cybersecurity. J. Inf. Warfare 14(2), 16–30 (2015)

    Google Scholar 

  40. Albladi, S.M., Weir, G.R.: Predicting individuals’ vulnerability to social engineering in social networks. Cybersecurity 3(1), 1–19 (2020)

    Article  Google Scholar 

  41. Melissa, L.: Cybersecurity: What Every CEO and CFO Should Know (2016). https://www.toptal.com/finance/finance-directors/cyber-security. Accessed Dec 2020

  42. Wang, K., Dong, J., Wang, Y., Yin, H.: Securing data with blockchain and AI. IEEE Access 7, 77981–77989 (2019)

    Article  Google Scholar 

  43. Michele, D.: How Does the Blockchain Work? (2016). https://onezero.medium.com/how-does-the-blockchain-work-98c8cd01d2ae. Accessed Dec 2020

  44. Smith, S.S.: Blockchain: what you need to know. Account. Today 31(11), 42 (2017)

    Google Scholar 

  45. Mahbod, R., Hinton, D.: Blockchain: the future of the auditing and assurance profession. Armed Forces Comptrol. 64(1), 23–27 (2019)

    Google Scholar 

  46. Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Work 2017), pp. 618–623 (2017). https://doi.org/10.1109/PERCOMW.2017.7917634

  47. Sikorski, J.J., Haughton, J., Kraft, M.: Blockchain technology in the chemical industry: machine-to-machine electricity market. Appl. Energy 195, 234–246 (2017). https://doi.org/10.1016/j.apenergy.2017.03.039

    Article  Google Scholar 

  48. Liang, X., Zhao, J., Shetty, S., Liu, J., Li, D.: Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In: IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2018 (2018). https://doi.org/10.1109/PIMRC.2017.8292361

  49. Guo, Y., Liang, C.: Blockchain application and outlook in the banking industry. Financ. Innov. 2 (2016). https://doi.org/10.1186/s40854-016-0034-9

  50. Gartner: Gartner Survey Shows 37 Percent of Organizations Have Implemented AI in Some Form, Gartner (2019). https://marketbusinessnews.com/ai-gartner-survey/194856/. Accessed Dec 2020

  51. Marr, D.: Artificial intelligence-a personal view. Artif. Intell. 9(1), 37–48 (1977)

    Article  Google Scholar 

  52. Harini, B.N., Rao, T.: An extensive review on recent emerging applications of artificial intelligence. Asia-Pacific J. Converg. Res. Interchange 5(2), 79–88 (2019)

    Article  Google Scholar 

  53. Calderon, R.: The benefits of artificial intelligence in cybersecurity (2019)

    Google Scholar 

  54. Zeadally, S., Adi, E., Baig, Z., Khan, I.A.: Harnessing artificial intelligence capabilities to improve cybersecurity. IEEE Access 8, 23817–23837 (2020). https://doi.org/10.1109/ACCESS.2020.2968045

    Article  Google Scholar 

  55. Panarello, A., Tapas, N., Merlino, G., Longo, F., Puliafito, A.: Blockchain and IoT integration: a systematic survey. Sensors 18(8), E2575 (2018)

    Article  Google Scholar 

  56. Salah, K., Rehman, M.H.U., Nizamuddin, N., Al-Fuqaha, A.: Blockchain for AI: review and open research challenges. IEEE Access 7, 10127–10149 (2019). https://doi.org/10.1109/ACCESS.2018.2890507

    Article  Google Scholar 

  57. The foundation for our digital future. https://ethereum.org/en/what-is-ethereum/. Accessed Feb 2021

  58. Mengidis, N., Tsikrika, T., Vrochidis, S., Kompatsiaris, I.: Blockchain and AI for the next generation energy grids: cybersecurity challenges and opportunities. Inf. Secur. Int. J. 43(1), 21–33 (2019). https://doi.org/10.11610/isij.4302

    Article  Google Scholar 

  59. Kumble, G.P.: Practical Artificial Intelligence and Blockchain: A Guide to Converging Blockchain and AI to Build Smar Applications for New Economies (2020)

    Google Scholar 

  60. BlockchianInsight: Top Blockchain Technology Companies 2021 (2021). https://www.leewayhertz.com/blockchain-technology-companies-2021/. Accessed Feb 2021

Download references

Acknowledgments

This research is supported by the Texas A&M University Chancellor Research Initiative (CRI) grant awarded to Texas A&M University-San Antonio, TX, USA.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lo’ai Tawalbeh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Muheidat, F., Tawalbeh, L. (2021). Artificial Intelligence and Blockchain for Cybersecurity Applications. In: Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., Romdhani, I. (eds) Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Studies in Big Data, vol 90. Springer, Cham. https://doi.org/10.1007/978-3-030-74575-2_1

Download citation

Publish with us

Policies and ethics