BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking

Wenjuan Li, Yu Wang, Weizhi Meng, Jin Li, Chunhua Su

Research output: Journal article publicationJournal articleAcademic researchpeer-review

15 Citations (Scopus)


To safeguard critical services and assets in a distributed environment, collaborative intrusion detection systems (CIDSs) are usually adopted to share necessary data and information among various nodes, and enhance the detection capability. For simplifying the network management, software defined networking (SDN) is an emerging platform that decouples the controller plane from the data plane. Intuitively, SDN can help lighten the management complexity in CIDSs, and a CIDS can protect the security of SDN. In practical implementation, trust management is an important approach to help identify insider attacks (or malicious nodes) in CIDSs, but the challenge is how to ensure the data integrity when evaluating the reputation of a node. Motivated by the recent development of blockchain technology, in this work, we design BlockCSDN - a framework of blockchain-based collaborative intrusion detection in SDN, and take the challenge-based CIDS as a study. The experimental results under both external and internal attacks indicate that using blockchain technology can benefit the robustness and security of CIDSs and SDN.

Original languageEnglish
Pages (from-to)272-279
Number of pages8
JournalIEICE Transactions on Information and Systems
Issue number2
Publication statusPublished - Feb 2022


  • Blockchain technology
  • Challenge-based trust management
  • Collaborative intrusion detection
  • Insider attack
  • Software defined networking

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering
  • Artificial Intelligence


Dive into the research topics of 'BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking'. Together they form a unique fingerprint.

Cite this