ADEFGuard: Anomaly detection framework based on Ethereum smart contracts behaviours

被引:1
作者
Ndiaye, Malaw [1 ]
Diallo, Thierno Ahmadou [2 ]
Konate, Karim [1 ]
机构
[1] UCAD, Dept Comp Sci, Dakar, Senegal
[2] UASZ, Comp Sci Dept, Ziguinchor, Senegal
来源
BLOCKCHAIN-RESEARCH AND APPLICATIONS | 2023年 / 4卷 / 03期
关键词
Blockchain; Smart contract; Security; Anomaly;
D O I
10.1016/j.bcra.2023.100148
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart contracts are the building blocks of blockchain systems that enable automated peer-to-peer transactions and decentralized services. Smart contracts certainly provide a powerful functional surplus for maintaining the consistency of transactions in applications governed by blockchain technology. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. Formal verification and symbolic analysis have been employed to combat these destructive scams by analysing the codes and function calls, yet each scam's vulnerability should be discreetly predefined. In this work, we introduce ADEFGuard, a new anomaly detection framework based on the behaviour of smart contracts, as a new feature. We design a learning and monitoring module to determine fraudulent smart contract behaviours.Our framework is advantageous over basic algorithms in three aspects. First, ADEFGuard provides a unified solution to different genres of scams, relieving the need for code analysis skills. Second, ADEFGuard's inference is orders of magnitude faster than code analysis. Third, the experimental results show that ADEFGuard achieves high accuracy (85%), precision (75%), and recall (90%) for malicious contracts and is potentially useful in detecting new malicious behaviours of smart contracts.
引用
收藏
页数:10
相关论文
共 33 条
[1]  
Abiteboul S., 2017, Le temps des algorithmes
[2]   BlockSim: An Extensible Simulation Tool for Blockchain Systems [J].
Alharby, Maher ;
van Moorsel, Aad .
FRONTIERS IN BLOCKCHAIN, 2020, 3
[3]   Formal Modeling and Verification of Smart Contracts [J].
Bai, Xiaomin ;
Cheng, Zijing ;
Duan, Zhangbo ;
Hu, Kai .
PROCEEDINGS OF 2018 7TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2018), 2018, :322-326
[4]  
Baird K., 2019, arXiv
[5]  
Chatterjee Krishnendu, 2018, Programming Languages and Systems. 27th European Symposium on Programming, ESOP 2018, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018. Proceedings: LNCS 10801, P739, DOI 10.1007/978-3-319-89884-1_26
[6]  
Dannen C., 2017, INTRO ETHEREUM SOLID, VVolume 318, DOI DOI 10.1007/978-1-4842-2535-6
[7]  
Dausbourg B., 1994, Computer Security-ESORICS, V94, P247, DOI [10.1007/3-540-58618-0_68, DOI 10.1007/3-540-58618-0_68]
[8]  
Emilion M., 2021, Matrice de confusion: comment la lire et l'interpreter
[9]   Behavior pattern clustering in blockchain networks [J].
Huang, Butian ;
Liu, Zhenguang ;
Chen, Jianhai ;
Liu, Anan ;
Liu, Qi ;
He, Qinming .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) :20099-20110
[10]   Efficient distributed detection of conjunctions of local predicates [J].
Hurfin, M ;
Mizuno, M ;
Raynal, M ;
Singhal, M .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1998, 24 (08) :664-677