Main Title: Adaptive Cognitive Q-Learning–Based Security Model for Blockchain Protocols: Simulation and Experimental Evaluation on a Private Ethereum Network.

Authors

  • Rakotonanahary Fenitra Doctoral School of Engineering Sciences and Technologies (STII), University of Antananarivo
  • Robinson Hobihery Matio Doctoral School of Engineering and Innovation Sciences and Technologies (STII), University of Antananarivo, Madagascar

DOI:

https://doi.org/10.24297/ijct.v26i.9836

Keywords:

anomaly detection, adaptive defense, cognitive agent, Q-learning, blockchain security

Abstract

The rapid growth of blockchain technologies has enabled decentralized applications based on smart contracts and distributed consensus. However, the increasing number of attacks exploiting protocol logic and network dynamics highlights the limitations of traditional, static security mechanisms. This study proposes an adaptive cognitive security model based on a Q-learning agent to enhance the protection of blockchain protocols. The agent is designed to analyze transaction behavior, assess risk levels, and dynamically select appropriate countermeasures. The proposed approach is evaluated through a dual experimental framework combining large-scale simulation using SimPy and execution on a private blockchain environment implemented with Ganache. Experimental results show a detection rate of approximately 70%, no observed false positives, a response time close to one second, and a very low operational gas cost. These results demonstrate that reinforcement learning can effectively improve the adaptability and responsiveness of blockchain security mechanisms while preserving network performance and economic viability. The study confirms the potential of cognitive and adaptive approaches for building more resilient and autonomous blockchain security systems.

Downloads

Download data is not yet available.

Author Biography

Robinson Hobihery Matio, Doctoral School of Engineering and Innovation Sciences and Technologies (STII), University of Antananarivo, Madagascar

Associate Professor (Maître de conférences), Doctoral School of Engineering and Innovation Sciences and Technologies (STII), University of Antananarivo, Madagascar.

References

Alharby, M., & Moorsel, A. van. (2017). Blockchain-based Smart Contracts : A Systematic Mapping Study. Computer Science & Information Technology (CS & IT), 125-140. https://doi.org/10.5121/csit.2017.71011

Bashir, I. (2020). Mastering blockchain (2nd ed.). Packt Publishing.

Chainalysis. (2025). Blockchain security: Preventing threats before they strike. https://www.chainalysis.com

Choo, K.-K. R. (avec Dehghantanha, A., & Parizi, R. M.). (2020). Blockchain Cybersecurity, Trust and Privacy. Springer International Publishing AG.

Elrom, E. (2019). The Blockchain Developer : A Practical Guide for Designing, Implementing, Publishing, Testing, and Securing Distributed Blockchain-based Projects. Apress. https://doi.org/10.1007/978-1-4842-4847-8

Guru, A., Mohanta, B. K., Mohapatra, H., Al-Turjman, F., Altrjman, C., & Yadav, A. (2023). A Survey on Consensus Protocols and Attacks on Blockchain Technology. Applied Sciences, 13(4), 2604. https://doi.org/10.3390/app13042604

IBM. (n.d.). What is blockchain security? https://www.ibm.com/think/topics/blockchain-security

ISO/IEC. (2022). ISO/IEC 27001:2022 – Information security management systems – Requirements. International Organization for Standardization. https://www.exactls.com/wp-content/uploads/2025/02/ISO_IEC-270012022-ed.3.pdf

Joint Task Force Interagency Working Group. (2020). Security and Privacy Controls for Information Systems and Organizations (Revision 5). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-53r5

Kamal, R. (Ed.). (2020). Handbook of research on blockchain technology. Academic Press.

Kamhoua, C. A., Njilla, L. L., & Shetty, S. (Éds.). (2019). Blockchain for distributed systems security. Wiley-IEEE. https://doi.org/10.1002/9781119519621

Kshetri, N., Pandey, P. S., & Ahmed, M. (2024). Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures : Techniques, Solutions, and Applications (1re éd.). CRC Press. https://doi.org/10.1201/9781003449515

Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Éds.). (2021). Artificial intelligence and blockchain for future cybersecurity applications. Springer International Publishing AG.

Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf

OWASP Foundation. (2025). OWASP smart contract top 10. https://owasp.org/www-project-smart-contract-top-10/

Zhang, R., Xue, R., & Liu, L. (2020). Security and Privacy on Blockchain. ACM Computing Surveys, 52(3), 1-34. https://doi.org/10.1145/3316481

Downloads

Published

2026-01-26

How to Cite

Fenitra , R. ., & Matio , R. H. (2026). Main Title: Adaptive Cognitive Q-Learning–Based Security Model for Blockchain Protocols: Simulation and Experimental Evaluation on a Private Ethereum Network. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 26, 1–7. https://doi.org/10.24297/ijct.v26i.9836

Issue

Section

Research Articles