A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT

被引:1
作者
Wang, Yilei [1 ]
Li, Chunmei [1 ]
Zhang, Yiting [1 ]
Li, Tao [1 ]
Ning, Jianting [2 ,3 ]
Gai, Keke [4 ]
Choo, Kim-Kwang Raymond [5 ]
机构
[1] Qufu Normal Univ, Sch Comp Sci, Rizhao 276827, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
[3] City Univ Macau, Fac Data Sci, Macau, Peoples R China
[4] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 11期
基金
中国国家自然科学基金;
关键词
Data mining; Internet of Things; Deep learning; Feature extraction; Needles; Training; Biological neural networks; Back-propagation neural network; blockchain; ensemble deep learning (NEEDLE); selfish mining attack; BITCOIN; BLOCKCHAIN; NETWORKS;
D O I
10.1109/JIOT.2024.3367689
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptojacking is a new type of Internet of Things (IoT) attack, where an attacker hijacks the computing power of IoT devices, such as wireless routers, smart TVs, set-top boxes, or cameras, to mine cryptocurrencies, e.g., PyRoMineIoT. The attackers launch selfish mining-like (SM-like) attacks to obtain lucrative mining rewards with the stolen computing power, once the power exceeds a threshold. Generally, a single deep learning (DL) model with a single feature (e.g., fork height) is trained to detect SM-like attacks. However, the existing model fails to detect every SM-like attack since the model training ignores other distinctive features (e.g., mining rewards and blocking rate) of SM-like attacks. In this article, SM-NEEDLE, an ensemble DL (NEEDLE) method is proposed to detect SM-like attacks. More specifically, the distinctive features are extracted from the blockchain system, where SM-like simulators emulate the strategies of SM-like attacks. Further, to circumvent the local optima problem caused by the single DL model (e.g., Back-Propagation Neural Network, BPNN), the SM-NEEDLE trains multiple BPNNs with these distinctive features. Evaluation results indicate the accuracy and false negative rate (FNR) of SM-NEEDLE for detecting SM-like attacks (including SM1 and its variants) are 98.9% and 1.48%, respectively. That is, 98.9% of SM-like attacks are correctly identified and only 1.48% of attacks are undetectable.
引用
收藏
页码:19564 / 19574
页数:11
相关论文
共 43 条
  • [31] Optimal Selfish Mining Strategies in Bitcoin
    Sapirshtein, Ayelet
    Sompolinsky, Yonatan
    Zohar, Aviv
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 515 - 532
  • [32] Schapire RE, 1999, IJCAI-99: PROCEEDINGS OF THE SIXTEENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOLS 1 & 2, P1401
  • [33] SOLAT S., 2016, ZEROBLOCK PREVENTING
  • [34] Stable Device Pairing for Collaborative Data Dissemination With Device-to-Device Communications
    Song, Wei
    Zhao, Yiming
    Zhuang, Weihua
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (02): : 1251 - 1264
  • [35] SDoS: Selfish Mining-Based Denial-of-Service Attack
    Wang, Qiuhua
    Xia, Tianyu
    Wang, Dong
    Ren, Yizhi
    Miao, Gongxun
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3335 - 3349
  • [36] When blockchain meets AI: Optimal mining strategy achieved by machine learning
    Wang, Taotao
    Liew, Soung Chang
    Zhang, Shengli
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (05) : 2183 - 2207
  • [37] ForkDec: Accurate Detection for Selfish Mining Attacks
    Wang, Zhaojie
    Lv, Qingzhe
    Lu, Zhaobo
    Wang, Yilei
    Yue, Shengjie
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [38] IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers
    Yang, Guoyu
    Wang, Yilei
    Wang, Zhaojie
    Tian, Youliang
    Yu, Xiaomei
    Li, Shouzhe
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2020, 35 (11) : 1735 - 1748
  • [39] Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack
    Yang, Runkai
    Chang, Xiaolin
    Misic, Jelena
    Misic, Vojislav B.
    Kang, Hongyue
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1142 - 1158
  • [40] Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin
    Zhang, Ren
    Preneel, Bart
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 277 - 292