Comprehensive Investigation on Machine Learning and Post-Quantum Cryptographic Frameworks for Blockchain Threat Detection and Security

Authors

  • Ashok Raj R Research Scholar, PG and Research Department of Computer Science, Sri Vijay Vidyalaya College of Arts & Science, Dharmapuri, Tamil Nadu, India Author
  • Dr. D. Maruthanayagam Dean Cum Professor, PG and Research Department of Computer Science, Sri Vijay Vidyalaya College of Arts & Science, Dharmapuri, Tamil Nadu, India Author

DOI:

https://doi.org/10.32628/CSEIT26121332

Keywords:

Machine Learning, Blockchain Security, Post-Quantum Cryptography, Quantum-Resistant Signatures, Threat Detection, Smart Contract Security, Distributed Ledger Technology, Quantum Computing, Cybersecurity Analytics and Decentralized Finance

Abstract

Blockchain technology has evolved from its initial application in cryptocurrencies such as Bitcoin to a versatile decentralized infrastructure supporting decentralized finance (DeFi), digital identity systems, smart contracts, and Web3 ecosystems. Despite its transformative potential, the rapid expansion of blockchain platforms has significantly increased the security attack surface, exposing networks to threats such as double-spending, Sybil attacks, smart contract vulnerabilities, transaction laundering, and large-scale financial fraud. At the same time, the emergence of quantum computing introduces a fundamental challenge to classical cryptographic mechanisms particularly Elliptic Curve Digital Signature Algorithm (ECDSA) and RSA that form the backbone of blockchain authentication and transaction verification. This paper presents a comprehensive study of Machine Learning (ML) techniques and Post-Quantum Cryptographic (PQC) frameworks for strengthening blockchain security and threat detection. The study reviews supervised, unsupervised, and deep learning models used for fraud detection, anomaly identification, smart contract vulnerability analysis, and blockchain transaction monitoring. In parallel, it examines quantum-resistant cryptographic algorithms emerging from the NIST post-quantum standardization process, including lattice-based, hash-based, and code-based schemes, and evaluates their suitability for blockchain environments. Furthermore, the paper analyzes the limitations of ML-based security mechanisms and the practical challenges of integrating PQC into decentralized infrastructures, including scalability, key size overhead, and performance trade-offs. A comparative analysis highlights that ML enhances adaptive behavioral threat detection, while PQC ensures long-term cryptographic resilience against quantum attacks. Therefore, the study emphasizes the importance of a hybrid ML–PQC security model that combines intelligent anomaly detection with quantum-resistant cryptographic protection. Finally, the paper identifies key research challenges and outlines future directions toward building scalable, adaptive, and quantum-secure blockchain ecosystems capable of supporting next-generation decentralized applications.

Downloads

Download data is not yet available.

References

Nakamoto, S. (2008), “Bitcoin: A peer-to-peer electronic cash system”, https://bitcoin.org/bitcoin.pdf.

Buterin, V. (2014), “A next-generation smart contract and decentralized application platform,” Ethereum White Paper. https://ethereum.org.

Chen, Y., Bellavitis, C., & Zaldokas, A. (2020), “Blockchain disruption and decentralized finance: The rise of decentralized business models”, Journal of Business Venturing Insights, 13, e00151. https://doi.org/10.1016/j.jbvi.2019.e00151.

Schär, F. (2021), “Decentralized finance: On blockchain- and smart contract-based financial markets,” Federal Reserve Bank of St. Louis Review, 103(2), 153–174. https://doi.org/10.20955/r.103.153-174.

Kusuma, Kranthi Kiran. (2025). Advanced Benchmarking and Certification Strategies For 5G And LTE Networks. International Research Journal on Advanced Engineering Hub (IRJAEH). 3. 3340-3347. 10.47392/IRJAEH.2025.0491.

FNU Pawan Kumar. Agile methodology and test-driven development for large-scale cloud software projects. World Journal of Advanced Engineering Technology and Sciences, 2025, 15(01), 2525–2533. Article DOI: https://doi.org/10.30574/wjaets.2025.15.1.0316.

Mishra, Chandan. (2025). Enhancing ERP Efficiency: Optimizing Peoplesoft Financial Workflows with Robotic Process Automation (RPA). International Research Journal on Advanced Engineering Hub (IRJAEH). 3. 3348-3354. 10.47392/IRJAEH.2025.0492.

Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., & Felten, E. W. (2015), “Sok: Research perspectives and challenges for Bitcoin and cryptocurrencies,” 2015 IEEE Symposium on Security and Privacy, 104–121. https://doi.org/10.1109/SP.2015.14.

Garay, J., Kiayias, A., & Leonardos, N. (2015), “The Bitcoin backbone protocol: Analysis and applications,” Annual International Conference on the Theory and Applications of Cryptographic Techniques, 281–310. https://doi.org/10.1007/978-3-662-46803-6_10.

Gervais, A., Ritzdorf, H., Karame, G. O., & Capkun, S. (2016), “Tampering with the delivery of blocks and transactions in Bitcoin,” Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 692–705. https://doi.org/10.1145/2810103.2813655.

Wood, G. (2014), “Ethereum: A secure decentralised generalised transaction ledger,” (Yellow Paper), Ethereum Foundation.

Conti, M., Kumar, E. S., Lal, C., & Ruj, S. (2018), “A survey on security and privacy issues of Bitcoin,” IEEE Communications Surveys & Tutorials, 20(4), 3416–3452. https://doi.org/10.1109/COMST.2018.2842460.

Chen, T., & Guestrin, C. (2016), “ XGBoost: A scalable tree boosting system,” Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 785–794. https://doi.org/10.1145/2939672.2939785.

Kipf, T. N., & Welling, M. (2017), “Semi-supervised classification with graph convolutional networks,” International Conference on Learning Representations (ICLR).

Roy, S., Das, S., Chatterjee, M., & Chattopadhyay, S. (2022)., “Deep learning for blockchain security: A survey,” IEEE Access, 10, 105694–105716. https://doi.org/10.1109/ACCESS.2022.3209047.

Shor, P. W. (1997), “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM Journal on Computing, 26(5), 1484–1509. https://doi.org/10.1137/S0097539795293172.

Grover, L. K. (1996), “A fast quantum mechanical algorithm for database search,” Proceedings of the 28th Annual ACM Symposium on Theory of Computing, 212–219. https://doi.org/10.1145/237814.237866.

Alagic, G., et al. (2022), “Status report on the third round of the NIST post-quantum cryptography standardization process,”NIST IR 8413. National Institute of Standards and Technology. https://doi.org/10.6028/NIST.IR.8413.

Chen, L., et al. (2016), “Report on post-quantum cryptography (NIST IR 8105). National Institute of Standards and Technology,” https://doi.org/10.6028/NIST.IR.8105.

Conti, M., Kumar, E. S., Lal, C., & Ruj, S. (2018), “A survey on security and privacy issues of Bitcoin,” IEEE Communications Surveys & Tutorials, 20(4), 3416–3452. https://doi.org/10.1109/COMST.2018.2842460.

Alagic, G., Apon, D., Cooper, D., Dang, Q., Kelsey, J., Liu, Y.-K., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson, A., & Smith-Tone, D. (2022), “Status report on the third round of the NIST post-quantum cryptography standardization process (NIST IR 8413),”National Institute of Standards and Technology. https://doi.org/10.6028/NIST.IR.8413.

Kumar, R., Tripathi, R., & Marchang, N. (2021), “Machine learning-based blockchain security: A survey,” IEEE Access, 9, 84672–84688. https://doi.org/10.1109/ACCESS.2021.3088575.

Singh, S., Hosen, A. S. M. S., & Yoon, B. (2020), “Blockchain security attacks, challenges, and solutions for the future distributed IoT network,” IEEE Access, 8, 13938–13959. https://doi.org/10.1109/ACCESS.2020.2967214.

Qin, K., Zhou, L., Afonin, D., Lazzaretti, L., & Gervais, A. (2021), “CeFi vs. DeFi—Comparing centralized to decentralized finance,” Proceedings of the 2021 ACM Workshop on Decentralized Finance and Security, 1–12.

Makarov, I., & Schoar, A. (2022), “Cryptocurrencies and decentralized finance (DeFi),” Brookings Papers on Economic Activity, 2022(1), 141–215.

Zamyatin, A., Al-Bassam, M., Zindros, D., Kokoris-Kogias, E., Moreno-Sanchez, P., Kiayias, A., & Danezis, G. (2019), “SoK: Communication across distributed ledgers,” IACR Cryptology ePrint Archive, 2019/1128.

Casino, F., Dasaklis, T. K., & Patsakis, C. (2019), “A systematic literature review of blockchain-based applications: Current status, classification and open issues,” Telematics and Informatics, 36, 55–81. https://doi.org/10.1016/j.tele.2018.11.006.

Boneh, D., & Zhandry, M. (2013), “Secure signatures and chosen ciphertext security in a quantum computing world,” Advances in Cryptology – CRYPTO 2013, 361–379. https://doi.org/10.1007/978-3-642-40041-4_20.

Kairouz, P., McMahan, H. B., Avent, B., et al. (2021), “Advances and open problems in federated learning,” Foundations and Trends in Machine Learning, 14(1–2), 1–210. https://doi.org/10.1561/2200000083.

Regev, O. (2009), “On lattices, learning with errors, random linear codes, and cryptography,” Journal of the ACM, 56(6), 1–40. https://doi.org/10.1145/1568318.1568324.

Biggio, B., & Roli, F. (2018), “Wild patterns: Ten years after the rise of adversarial machine learning,” Pattern Recognition, 84, 317–331. https://doi.org/10.1016/j.patcog.2018.07.023.

Goldwasser, S., Micali, S., & Rackoff, C. (1989), “The knowledge complexity of interactive proof systems,” SIAM Journal on Computing, 18(1), 186–208.

Ben-Sasson, E., Chiesa, A., Tromer, E., & Virza, M. (2014), “Succinct non-interactive zero knowledge for a von Neumann architecture,” USENIX Security Symposium, 781–796.

Yao, A. C. (1982), “Protocols for secure computations,” 23rd Annual Symposium on Foundations of Computer Science, 160–164.

Kataria, B., & Jethva, H. B. (2024). Decentralized security mechanisms for AI-driven wireless networks: Integrating blockchain and federated learning. International Journal of Scientific Research in Science, Engineering and Technology, 11(5), 342–352. https://doi.org/10.32628/IJSRSET24105474

Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R., Perlner, R., & Smith-Tone, D. (2016), “Report on post-quantum cryptography (NIST IR 8105),” National Institute of Standards and Technology. https://doi.org/10.6028/NIST.IR.8105.

Weber, M., Domeniconi, G., Chen, J., Weidele, D. K., Bellei, C., Robinson, T., & Leiserson, C. E. (2019), “Anti-money laundering in Bitcoin: Experimenting with graph convolutional networks for financial forensics,” Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2907–2915. https://doi.org/10.1145/3292500.3330766.

Chen, Z., Li, C., Sun, W., & Chen, J. (2020), “XBlock-ETH: Extracting and classifying Ethereum smart contract vulnerabilities using deep learning,” IEEE Access, 8, 122912–122922. https://doi.org/10.1109/ACCESS.2020.3007070.

Pham, T., Lee, S., & Choi, S. (2021), “Anomaly detection in blockchain transactions using machine learning approaches,” Future Generation Computer Systems, 115, 590–602. https://doi.org/10.1016/j.future.2020.09.020.

Alarab, I., Prakoonwit, S., & Nacer, M. I. (2020), “Competence of graph convolutional networks for anti-money laundering in Bitcoin blockchain,” Proceedings of the 2020 IEEE International Conference on Big Data, 5480–5484. https://doi.org/10.1109/BigData50022.2020.9378426.

Goodfellow, I., Shlens, J., & Szegedy, C. (2015), “Explaining and harnessing adversarial examples,” International Conference on Learning Representations (ICLR).

Biggio, B., Nelson, B., & Laskov, P. (2012), “Poisoning attacks against support vector machines,” Proceedings of the 29th International Conference on Machine Learning (ICML), 1467–1474.

Lu, Y., Huang, X., Dai, Y., Maharjan, S., & Zhang, Y. (2020), “Blockchain and federated learning for privacy-preserved data sharing in industrial IoT,” IEEE Transactions on Industrial Informatics, 16(6), 4177–4186. https://doi.org/10.1109/TII.2019.2948440.

Zhang, R., Xue, R., & Liu, L. (2019), “Security and privacy on blockchain,” ACM Computing Surveys, 52(3), 1–34. https://doi.org/10.1145/3316481.

Qin, K., Zhou, L., Livshits, B., & Gervais, A. (2021), “Attacking the DeFi ecosystem with flash loans for fun and profit,” Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 1–18.

Auer, R., Cornelli, G., & Frost, J. (2020), “Rise of the central bank digital currencies: Drivers, approaches and technologies,” BIS Working Papers No. 880. Bank for International Settlements.

Zamyatin, A., Al-Bassam, M., Zindros, D., Kokoris-Kogias, E., Moreno-Sanchez, P., Kiayias, A., & Danezis, G. (2019), “SoK: Communication across distributed ledgers,” IACR Cryptology ePrint Archive, 2019/1128.

Atzei, N., Bartoletti, M., & Cimoli, T. (2017), “A survey of attacks on Ethereum smart contracts,” International Conference on Principles of Security and Trust, 164–186. https://doi.org/10.1007/978-3-662-54455-6_8.

Downloads

Published

15-03-2026

Issue

Section

Research Articles

How to Cite

[1]
Ashok Raj R and Dr. D. Maruthanayagam, “Comprehensive Investigation on Machine Learning and Post-Quantum Cryptographic Frameworks for Blockchain Threat Detection and Security”, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, vol. 12, no. 2, pp. 140–165, Mar. 2026, doi: 10.32628/CSEIT26121332.