A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT

被引:1
作者
Wang, Yilei [1 ]
Li, Chunmei [1 ]
Zhang, Yiting [1 ]
Li, Tao [1 ]
Ning, Jianting [2 ,3 ]
Gai, Keke [4 ]
Choo, Kim-Kwang Raymond [5 ]
机构
[1] Qufu Normal Univ, Sch Comp Sci, Rizhao 276827, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
[3] City Univ Macau, Fac Data Sci, Macau, Peoples R China
[4] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 11期
基金
中国国家自然科学基金;
关键词
Data mining; Internet of Things; Deep learning; Feature extraction; Needles; Training; Biological neural networks; Back-propagation neural network; blockchain; ensemble deep learning (NEEDLE); selfish mining attack; BITCOIN; BLOCKCHAIN; NETWORKS;
D O I
10.1109/JIOT.2024.3367689
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptojacking is a new type of Internet of Things (IoT) attack, where an attacker hijacks the computing power of IoT devices, such as wireless routers, smart TVs, set-top boxes, or cameras, to mine cryptocurrencies, e.g., PyRoMineIoT. The attackers launch selfish mining-like (SM-like) attacks to obtain lucrative mining rewards with the stolen computing power, once the power exceeds a threshold. Generally, a single deep learning (DL) model with a single feature (e.g., fork height) is trained to detect SM-like attacks. However, the existing model fails to detect every SM-like attack since the model training ignores other distinctive features (e.g., mining rewards and blocking rate) of SM-like attacks. In this article, SM-NEEDLE, an ensemble DL (NEEDLE) method is proposed to detect SM-like attacks. More specifically, the distinctive features are extracted from the blockchain system, where SM-like simulators emulate the strategies of SM-like attacks. Further, to circumvent the local optima problem caused by the single DL model (e.g., Back-Propagation Neural Network, BPNN), the SM-NEEDLE trains multiple BPNNs with these distinctive features. Evaluation results indicate the accuracy and false negative rate (FNR) of SM-NEEDLE for detecting SM-like attacks (including SM1 and its variants) are 98.9% and 1.48%, respectively. That is, 98.9% of SM-like attacks are correctly identified and only 1.48% of attacks are undetectable.
引用
收藏
页码:19564 / 19574
页数:11
相关论文
共 43 条
  • [1] Badirli S, 2020, Arxiv, DOI [arXiv:2002.07971, 10.48550/arXiv.2002.07971, DOI 10.48550/ARXIV.2002.07971]
  • [2] Bag Samiran, 2017, IEEE Transactions on Information Forensics and Security, V12, P1967, DOI 10.1109/TIFS.2016.2623588
  • [3] Blockchain Mining With Multiple Selfish Miners
    Bai, Qianlan
    Xu, Yuedong
    Liu, Nianyi
    Wang, Xin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3116 - 3131
  • [4] Cao J., 2022, P INT C FIN CRYPT D
  • [5] On the Instability of Bitcoin Without the Block Reward
    Carlsten, Miles
    Kalodner, Harry
    Weinberg, S. Matthew
    Narayanan, Arvind
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 154 - 167
  • [6] On the detection of selfish mining and stalker attacks in blockchain networks
    Chicarino, Vanessa
    Albuquerque, Celio
    Jesus, Emanuel
    Rocha, Antonio
    [J]. ANNALS OF TELECOMMUNICATIONS, 2020, 75 (3-4) : 143 - 152
  • [7] A Cross-Layer Trust-Based Consensus Protocol for Peer-to-Peer Energy Trading Using Fuzzy Logic
    Chowdhury, Mohammad Jabed M.
    Usman, Muhammad
    Ferdous, Md Sadek
    Chowdhury, Niaz
    Harun, Anam Ibna
    Jannat, Umme Sumaya
    Biswas, Kamanashis
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16): : 14779 - 14789
  • [8] Cortes C., 2017, P 34 INT C MACH LEAR, VVolume 2, P1452
  • [9] Cossio F. J. M., 2019, P 1 ACM C ADV FIN TE, P21
  • [10] Dembo A., 2020, P ACM SIGSAC C COMP, P1