Centralized server systems have been popular in the industry of modern IT services. It allowed the deployment of various large-scale applications to aid the needs of the modern society. However, centralized systems have been common targets for cyberattacks and the need to explore novel ways to secure our systems has always been of utmost importance. As a response, this paper explores the applications of Blockchain Technology to the Cybersecurity paradigm specifically on Phishing attacks. A simulation has been conducted to test the effectiveness of an application that implements a blockchain. A combination of 998 randomly generated phishing messages has been fed to a simulation environment for the application. The results of the simulations show that out of 998 randomly generated phishing messages, a prevention rate of 100% has been performed by the application that implements a blockchain. Therefore, the study implies that the blockchain technology is a very viable option to improve Cybersecurity aspects of modern information systems.


Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels, J., & Amaba, B. (2017, June). Blockchain technology innovations. In Technology & Engineering Management Conference (TEMSCON), 2017 IEEE (pp. 137-141). IEEE.

Atzori, M. (2015). Blockchain technology and decentralized governance: Is the state still necessary?.

Beck, R., Czepluch, J. S., Lollike, N., & Malone, S. (2016). Blockchain-the Gateway to Trust-Free Cryptographic Transactions. In ECIS (p. ResearchPaper153).

Dhamija, R., Tygar, J. D., & Hearst, M. (2006, April). Why phishing works. In Proceedings of the SIGCHI conference on Human Factors in computing systems (pp. 581-590). ACM.

Hong, J. (2012). The state of phishing attacks. Communications of the ACM, 55(1), 74-81.

Korpela, K., Hallikas, J., & Dahlberg, T. (2017, January). Digital supply chain transformation toward blockchain integration. In proceedings of the 50th Hawaii international conference on system sciences.

Litan, A. (2004). Phishing attack victims likely targets for identity theft.

Meng, W., Tischhauser, E. W., Wang, Q., Wang, Y., & Han, J. (2018). When intrusion detection meets blockchain technology: a review. Ieee Access, 6, 10179-10188.

Pilkington, M. (2015). Blockchain technology: principles and applications. Browser Download This Paper.

Tapscott, D., & Tapscott, A. (2016). Blockchain Revolution: How the technology behind Bitcoin is changing money, business, and the world. Penguin.

Vishwanath, A., Herath, T., Chen, R., Wang, J., & Rao, H. R. (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 51(3), 576-586.
How to Cite
OGDOL, Joseph Meynard Gumahin; SAMAR, Bill-Lawrence Tigol; CATAROJA, Charmalyn. ENHANCING CYBERSECURITY THROUGH BLOCKCHAIN TECHNOLOGY. Journal of Higher Education Research Disciplines, [S.l.], v. 3, n. 1, dec. 2018. ISSN 2546-0579. Available at: <https://nmsc.edu.ph/ojs/index.php/jherd/article/view/112>. Date accessed: 16 oct. 2021.