The dynamic increase in the cyber threats in distributed computing environment has added pressure on the need to implement sophisticated and intelligent defense mechanisms. Conventional methods of cybersecurity are usually not scalable, transparent and real-time responsive in managing high volumes of heterogeneous data. To resolve these drawbacks, it is suggested to implement a Big Data Analytics Framework with the help of a Blockchain to secure cyber defense. The framework uses blockchain to guarantee integrity, provenance and tamper resistance of the data and big data analytics to process data at high throughput in order to detect anomalies, detect intrusions and generate threat intelligence. The framework incorporates advanced machine learning models to improve predictive analysis and false positives. Experimental analysis based on benchmark cybersecurity data sets proves that the system has 96.8 percent detection, decreased by 23 percent false positives, and accelerated the response time relative to the state-of-the-art big data-based security models. The empirical analysis of CICIDS 2017 and UNSW-NB15 datasets shows a 96.8% detection rate, 23 percent decrease in false positives, and 17 percent response time better than the state-of-the-art big data-based security models. Scalability analysis of CSE-CIC-IDS 2018 indicates that it can handle the number of 1.2 million events per second with low latency. These findings make the suggested framework a strong and scalable solution to the next-generation cyber defense systems.
Keywords
Big Data Analytics, Blockchain, Cybersecurity, Intrusion Detection, Anomaly Detection, Predictive Analytics, Threat Intelligence, Secure Framework.
P. Tekchandani, I. Pradhan, A. K. Das, N. Kumar, and Y. Park, “Blockchain-Enabled Secure Big Data Analytics for Internet of Things Smart Applications,” IEEE Internet of Things Journal, vol. 10, no. 7, pp. 6428–6443, Apr. 2023, doi: 10.1109/jiot.2022.3227162.
D. Unal, M. Hammoudeh, M. A. Khan, A. Abuarqoub, G. Epiphaniou, and R. Hamila, “Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things,” Computers & Security, vol. 109, p. 102393, Oct. 2021, doi: 10.1016/j.cose.2021.102393.
S. Shaikh, S. Sheiba, and M. Sridevi, “Integrating blockchain with big data analytics for enhanced IoT security and efficiency,” Big Data and Blockchain Technology for Secure IoT Applications, pp. 134–148, Oct. 2024, doi: 10.1201/9781032663005-9.
S. M. Patil, B. S. Dakhare, S. M. Satre, and S. D. Pawar, “Blockchain-based privacy preservation framework for preventing cyberattacks in smart healthcare big data management systems,” Multimedia Tools and Applications, vol. 84, no. 22, pp. 25547–25566, Sep. 2024, doi: 10.1007/s11042-024-20109-x.
P. A. D. S. N. Wijesekara, “Blockchain and Artificial Intelligence for Big Data Analytics in Networking: Leading-edge Frameworks,” Journal of Engineering Science and Technology Review, vol. 17, no. 3, pp. 125–143, 2024, doi: 10.25103/jestr.173.16.
T. K. Vashishth, V. Sharma, K. K. Sharma, B. Kumar, S. Chaudhary, and R. Panwar, “Blockchain-Enabled Data Security and Integrity in IoT-Big Data Systems for Smart Cities,” Internet of Things and Big Data Analytics-Based Manufacturing, pp. 69–90, Sep. 2024, doi: 10.1201/9781032673479-5.
R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, N. Kumar, and M. M. Hassan, “A Privacy-Preserving-Based Secure Framework Using Blockchain-Enabled Deep-Learning in Cooperative Intelligent Transport System,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 9, pp. 16492–16503, Sep. 2022, doi: 10.1109/tits.2021.3098636.
A. Razzaq et al., “Blockchain-Enabled Decentralized Secure Big Data of Remote Sensing,” Electronics, vol. 11, no. 19, p. 3164, Oct. 2022, doi: 10.3390/electronics11193164.
H. Al-Balasmeh, “Blockchain-Enabled Cybersecurity and Data Privacy Solutions for Smart Cities,” 2024 IEEE 9th International Conference on Engineering Technologies and Applied Sciences (ICETAS), pp. 1–9, Nov. 2024, doi: 10.1109/icetas62372.2024.11120069.
M. S and J. K R, “Blockchain-enabled federated learning with edge analytics for secure and efficient electronic health records management,” Scientific Reports, vol. 15, no. 1, Jul. 2025, doi: 10.1038/s41598-025-12225-x.
L. Liu, J. Li, J. Lv, J. Wang, S. Zhao, and Q. Lu, “Privacy-Preserving and Secure Industrial Big Data Analytics: A Survey and the Research Framework,” IEEE Internet of Things Journal, vol. 11, no. 11, pp. 18976–18999, Jun. 2024, doi: 10.1109/jiot.2024.3353727.
A. Bajpai, A. Singh, V. Kansal, S. Prakash, T. Yang, and R. S. Rathore, “Blockchain-Enabled Real-Time Intrusion Detection Framework for a Cyber-Physical System,” 2024 International Conference on Decision Aid Sciences and Applications (DASA), pp. 1–7, Dec. 2024, doi: 10.1109/dasa63652.2024.10836323.
M. Anwar et al., “BBAD: Blockchain-Backed Assault Detection for Cyber Physical Systems,” IEEE Access, vol. 12, pp. 101878–101894, 2024, doi: 10.1109/access.2024.3404656.
N. K. Jadav et al., “Blockchain-Based Secure and Intelligent Data Dissemination Framework for UAVs in Battlefield Applications,” IEEE Communications Standards Magazine, vol. 7, no. 3, pp. 16–23, Sep. 2023, doi: 10.1109/mcomstd.0005.2200052.
C. Kumar and P. Chittora, “Deep-Learning and Blockchain-Empowered Secure Data Sharing for Smart Grid Infrastructure,” Arabian Journal for Science and Engineering, vol. 49, no. 12, pp. 16155–16168, Mar. 2024, doi: 10.1007/s13369-024-08882-1.
A. E. Bekkali, M. Essaaidi, and M. Boulmalf, “A Blockchain-Based Architecture and Framework for Cybersecure Smart Cities,” IEEE Access, vol. 11, pp. 76359–76370, 2023, doi: 10.1109/access.2023.3296482.
O. A. H. Gwassi, O. N. Uçan, and E. A. Navarro, “Cyber-XAI-Block: an end-to-end cyber threat detection & fl-based risk assessment framework for iot enabled smart organization using xai and blockchain technologies,” Multimedia Tools and Applications, vol. 84, no. 23, pp. 26527–26568, Sep. 2024, doi: 10.1007/s11042-024-20059-4.
A. Lakhan, M. A. Mohammed, J. Nedoma, R. Martinek, P. Tiwari, and N. Kumar, “Blockchain-Enabled Cybersecurity Efficient IIOHT Cyber-Physical System for Medical Applications,” IEEE Transactions on Network Science and Engineering, vol. 10, no. 5, pp. 2466–2479, Sep. 2023, doi: 10.1109/tnse.2022.3213651.
CRediT Author Statement
The authors confirm contribution to the paper as follows:
Conceptualization: Alina Granwehr and Verena Hofer;
Writing-Original Draft Preparation: Alina Granwehr;
Visualization: Alina Granwehr and Verena Hofer;
Investigation: Alina Granwehr;
Writing- Reviewing and Editing: Alina Granwehr and Verena Hofer;
All authors reviewed the results and approved the final version of the manuscript.
Acknowledgements
Author(s) thanks to University Mohamed Khider Biskra for research lab and equipment support.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics Declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of Data and Materials
The datasets used to support the findings of this study are publicly available.
The CICIDS 2017 dataset can be accessed at https://www.unb.ca/cic/datasets/ids-2017.html
The UNSW-NB15 dataset is available through the Australian Centre for Cyber Security at https://research.unsw.edu.au/ projects/ unsw-nb15-dataset.
The CSE-CIC-IDS 2018 dataset can be obtained from the Canadian Institute for Cybersecurity at https://www.unb.ca/ cic/datasets/ids-2018.html.
These resources are open-access and widely used in cybersecurity research to evaluate intrusion detection and prevention systems.
Author Information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding Author
Alina Granwehr
University Mohamed Khider Biskra, Biskra 07000, Algeria.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit: https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this Article
Alina Granwehr and Verena Hofer, “Blockchain Enabled Big Data Analytics Framework for Secure Cyber Defense”, Elaris Computing Nexus, pp. 050-060, 2025, doi: 10.65148/ECN/2025006.