Main Title: Adaptive Cognitive Q-Learning–Based Security Model for Blockchain Protocols: Simulation and Experimental Evaluation on a Private Ethereum Network.
DOI:
https://doi.org/10.24297/ijct.v26i.9836Keywords:
anomaly detection, adaptive defense, cognitive agent, Q-learning, blockchain securityAbstract
The rapid growth of blockchain technologies has enabled decentralized applications based on smart contracts and distributed consensus. However, the increasing number of attacks exploiting protocol logic and network dynamics highlights the limitations of traditional, static security mechanisms. This study proposes an adaptive cognitive security model based on a Q-learning agent to enhance the protection of blockchain protocols. The agent is designed to analyze transaction behavior, assess risk levels, and dynamically select appropriate countermeasures. The proposed approach is evaluated through a dual experimental framework combining large-scale simulation using SimPy and execution on a private blockchain environment implemented with Ganache. Experimental results show a detection rate of approximately 70%, no observed false positives, a response time close to one second, and a very low operational gas cost. These results demonstrate that reinforcement learning can effectively improve the adaptability and responsiveness of blockchain security mechanisms while preserving network performance and economic viability. The study confirms the potential of cognitive and adaptive approaches for building more resilient and autonomous blockchain security systems.
Downloads
References
Alharby, M., & Moorsel, A. van. (2017). Blockchain-based Smart Contracts : A Systematic Mapping Study. Computer Science & Information Technology (CS & IT), 125-140. https://doi.org/10.5121/csit.2017.71011
Bashir, I. (2020). Mastering blockchain (2nd ed.). Packt Publishing.
Chainalysis. (2025). Blockchain security: Preventing threats before they strike. https://www.chainalysis.com
Choo, K.-K. R. (avec Dehghantanha, A., & Parizi, R. M.). (2020). Blockchain Cybersecurity, Trust and Privacy. Springer International Publishing AG.
Elrom, E. (2019). The Blockchain Developer : A Practical Guide for Designing, Implementing, Publishing, Testing, and Securing Distributed Blockchain-based Projects. Apress. https://doi.org/10.1007/978-1-4842-4847-8
Guru, A., Mohanta, B. K., Mohapatra, H., Al-Turjman, F., Altrjman, C., & Yadav, A. (2023). A Survey on Consensus Protocols and Attacks on Blockchain Technology. Applied Sciences, 13(4), 2604. https://doi.org/10.3390/app13042604
IBM. (n.d.). What is blockchain security? https://www.ibm.com/think/topics/blockchain-security
ISO/IEC. (2022). ISO/IEC 27001:2022 – Information security management systems – Requirements. International Organization for Standardization. https://www.exactls.com/wp-content/uploads/2025/02/ISO_IEC-270012022-ed.3.pdf
Joint Task Force Interagency Working Group. (2020). Security and Privacy Controls for Information Systems and Organizations (Revision 5). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-53r5
Kamal, R. (Ed.). (2020). Handbook of research on blockchain technology. Academic Press.
Kamhoua, C. A., Njilla, L. L., & Shetty, S. (Éds.). (2019). Blockchain for distributed systems security. Wiley-IEEE. https://doi.org/10.1002/9781119519621
Kshetri, N., Pandey, P. S., & Ahmed, M. (2024). Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures : Techniques, Solutions, and Applications (1re éd.). CRC Press. https://doi.org/10.1201/9781003449515
Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Éds.). (2021). Artificial intelligence and blockchain for future cybersecurity applications. Springer International Publishing AG.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf
OWASP Foundation. (2025). OWASP smart contract top 10. https://owasp.org/www-project-smart-contract-top-10/
Zhang, R., Xue, R., & Liu, L. (2020). Security and Privacy on Blockchain. ACM Computing Surveys, 52(3), 1-34. https://doi.org/10.1145/3316481
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Rakotonanahary Fenitra , Robinson Hobihery Matio

This work is licensed under a Creative Commons Attribution 4.0 International License.
