Blockchain network layer anomaly traffic detection method based on multiple classifier integration

被引:0
作者
Dai Q. [1 ,2 ]
Zhang B. [1 ,2 ]
Guo S. [1 ]
Xu K. [1 ]
机构
[1] Department of Cryptogram Engineering, Information Engineering University, Zhengzhou
[2] Henan Province Key Laboratory of Information Security, Zhengzhou
来源
Tongxin Xuebao/Journal on Communications | 2023年 / 44卷 / 03期
关键词
anomaly traffic detection; blockchain network layer; ensemble learning; machine learning;
D O I
10.11959/j.issn.1000-436x.2023066
中图分类号
学科分类号
摘要
To improve the comprehensive generalized feature perception ability of mixed attack traffic on the blockchain network layer, and enhance the performance of abnormal traffic detection, a blockchain layer traffic anomaly detection method was proposed that supported the comprehensive judgement of data anomaly with a strong generalisation capability. Firstly, to expand the difference of the input feature subset of the base classifier used, a feature subset selection algorithm based on discrimination degree and redundant information was proposed, and the output of high sensitivity subset terms was stimulated during the feature screening process, while the generation of redundant information was suppressed. Then, the stochastic variance reduction gradient algorithm was introduced into the bagging integration algorithm to realize the dynamic adjustment of the voting weights of each base modeland improve thecapability in detecting the generalised hybrid abnormal attack traffic. Finally, LBoF algorithm was proposed to map the low-dimensional numerical vector output by the integrated algorithm to a high-dimensional space. The discrepancy of data point spatial density distribution of various samples were amplified based on the potential difference between data points to increase the recall rate of anomalous data point detection. The experimental results show that in detecting multiple hybrid attack traffic on blockchain layers, the proposed method presents an increase in the anomaly detection accuracy and recall rate, which is 1.57% and 2.71%, respectively, compared with methods based on a single classifier integration. © 2023 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:66 / 80
页数:14
相关论文
共 27 条
[1]  
SHEN X, PEI Q Q, LIU X F., Survey of block chain, Chinese Journal of Network and Information Security, 2, 11, pp. 11-20, (2016)
[2]  
STEPHEN R, ALEX A., A review on blockchain security, IOP Conference Series: Materials Science and Engineering, (2018)
[3]  
HAN X, YUAN Y, WANG F Y., Security problems on blockchain: the state of the art and future trends, Acta Automatica Sinica, 45, 1, pp. 206-225, (2019)
[4]  
JIANG P P, WANG Q, CHEN Y J, Et al., Securing guarantee of the blockchain network: attacks and countermeasures, Journal on Communications, 42, 1, pp. 151-162, (2021)
[5]  
TRAMER F, BONEH D, PATERSON K G., Remote side-channel attacks on anonymous transactions, Proceedings of the 29th USE-NIX Conference on Security Symposium, pp. 2739-2756, (2020)
[6]  
YE C C, LI G Q, CAI H M, Et al., Security detection model of blockchain, Journal of Software, 29, 5, pp. 1348-1359, (2018)
[7]  
ZENG S Q, HUO R, HUANG T, Et al., Survey of blockchain: principle, progress and application, Journal on Communications, 41, 1, pp. 134-151, (2020)
[8]  
HASSAN M U, REHMANI M H, CHEN J., Anomaly detection in blockchain networks: a comprehensive survey, (2021)
[9]  
KIM J, NAKASHIMA M, FAN W J, Et al., Anomaly detection based on traffic monitoring for secure blockchain networking, Proceedings of 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1-9, (2021)
[10]  
SYARIF I, ZALUSKA E, PRUGEL-BENNETT A, Et al., Application of bagging, boosting and stacking to intrusion detection, Proceedings of International Workshop on Machine Learning and Data Mining in Pattern Recognition, pp. 593-602, (2012)