MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: Using Blockchain Technology to Help Secure America’s Defense Critical Infrastructure
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • kpk ETH Primekpk ETH Prime(KPK ETH PRIME)$2,034.900.01%
  • bitcoinBitcoin(BTC)$71,982.002.28%
  • ethereumEthereum(ETH)$2,138.233.28%
  • kpk ETH Yieldkpk ETH Yield(KPK ETH YIELD)$2,031.88-0.04%
  • tetherTether(USDT)$1.000.01%
  • binancecoinBNB(BNB)$663.151.79%
  • rippleXRP(XRP)$1.412.15%
  • usd-coinUSDC(USDC)$1.000.01%
  • solanaSolana(SOL)$89.713.35%
  • tronTRON(TRX)$0.2899770.27%
Blockchain Technology

Using Blockchain Technology to Help Secure America’s Defense Critical Infrastructure

Last updated: June 25, 2025 8:24 am
Published: 9 months ago
Share

Critical water infrastructure in the United States faces increasing cybersecurity threats from state-sponsored actors, with potentially devastating consequences for national security, economic stability, and public health. (Cybersecurity and Infrastructure Security Agency, 2025). This infrastructure supports defense critical assets and is actively being targeted by various state-sponsored hacking groups, which poses a major concern for civilians and military alike. K. Herath (personal communication, February 24, 2025) reported being aware of two attacks on Ohio water systems during his tenure as Cybersecurity Strategic Advisor to Ohio Governor Mike DeWine.

Water is essential to everyday life and defense and presents as a high-value target that will be attacked by other nation-state actors in the event of a larger cyber campaign (Wingfield, 2023). This research addresses the vulnerability of water systems by proposing a novel security framework that integrates blockchain technology with unsupervised machine learning techniques to create and maintain immutable attack fingerprints or “personas”- living data-identities of people, machines, etc.

Blockchain technology in its most basic form is a distributed, immutable ledger that can be used to store data and is controlled by various nodes. By recording system activities and operational data on a distributed, tamper-evident blockchain, we develop a methodology for capturing the distinctive behavioral patterns of threat actors while preventing the manipulation or deletion of security logs that typically occurs during sophisticated attacks. Our research explores how organizations can utilize trained machine learning and clustering techniques to identify personas. We show that this technique can prove to be a powerful tool to expand threat intelligence for critical infrastructure providers.

Read more on Digital Commons @ University of South Florida

This news is powered by Digital Commons @ University of South Florida Digital Commons @ University of South Florida

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

Bitcoin’s Next Wave: My Journey Through Volatility, Vision, and What’s Coming Next
Can Blockchain Fix Piracy In The Global Entertainment Industry?
Get Paid to Refer! Cold Wallet Rewards Crypto Users in USDT as Ethereum Heads for $15K, Tron Nears $0.14 High
ZK-powered Bitcoin Layer 2 Citrea launches mainnet
Solana Price Prediction: Can SOL Reclaim $150 ? Or Pepeto Is A better Crypto To Buy ?

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article XRP, DOGE holders can earn up to $19,800 per day through DOT Miners cloud mining
Next Article Asia’s fruit boom: how the continent is feeding the world’s sweet tooth
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d