A Framework for Anomaly Detection in Blockchain Networks With Sketches

被引:6
作者
Voronov, Tomer [1 ]
Raz, Danny [1 ]
Rottenstreich, Ori [1 ]
机构
[1] Technion Israel Inst Technol, IL-3200003 H_efa, Israel
关键词
Terms-Blockchain; sketches; anomaly detection; DATA-COLLECTION; BLOOM FILTER; INTERNET;
D O I
10.1109/TNET.2023.3298253
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A blockchain is a distributed ledger composed of immutable blocks of data that often refer to money transfers. As blockchain networks gain popularity, there is a rising concern for security against malicious and hacking users. Detection anomalies and unusual account activities can be based on comparing upcoming activity with recent and historical data. However, the size and rapid growth of the complete blockchain history can result in slow and expensive processing. This paper proposes a solution to this challenge by analyzing summarized block data structures, known as sketches, instead of the entire blockchain. Sketches are commonly used in computer systems and blockchain networks to provide efficient query executions while maintaining a compact data representation. This study explores the use of sketches, such as Bloom Filter and HyperLogLog, to identify suspicious accounts without requiring the examination of the entire blockchain data. We design solutions for anomaly detection of certain goals that may be indications of known attacks. We develop methods to identify accounts with high transaction volume, frequency, and node degree. Furthermore, the innovation of this paper lies in the generalization of sketch-based anomaly detection through a generic solution capable of addressing diverse queries. We conduct experiments based on real Ethereum data and compare the accuracy, time complexity, and memory usage of our algorithms with traditional detection algorithms that rely on the complete blockchain data. Our results indicate that sketch-based anomaly detection methods can provide a practical and scalable solution for detecting anomalies in transactions on blockchain networks. We managed to reduce the amount of memory used by the detection process by 90%-96% and reduce the time complexity by 86% while maintaining high accuracy.
引用
收藏
页码:686 / 698
页数:13
相关论文
共 53 条
  • [1] Phishing Attacks and Preventions in Blockchain Based Projects
    Andryukhin, A. A.
    [J]. 2019 INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGIES AND COMPUTER SCIENCE (ENT): INNOVATION & APPLICATION, 2019, : 15 - 19
  • [2] [Anonymous], 2014, LATEST INTERNET PLAG
  • [3] [Anonymous], 2005, P 5 ACM SIGCOMM C IN
  • [4] Stressing Out: Bitcoin "Stress Testing"
    Baqer, Khaled
    Huang, Danny Yuxing
    McCoy, Damon
    Weaver, Nicholas
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2016, 9604 : 3 - 18
  • [5] Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users
    Beres, Ferenc
    Seres, Istvan A.
    Benczur, Andras A.
    Quintyne-Collins, Mikerah
    [J]. 2021 THIRD IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES (DAPPS 2021), 2021,
  • [6] SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS
    BLOOM, BH
    [J]. COMMUNICATIONS OF THE ACM, 1970, 13 (07) : 422 - &
  • [7] Braverman Vladimir, 2013, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. Algorithms and Techniques. 16th International Workshop, APPROX 2013 and 17th International Workshop, RANDOM 2013. Proceedings: LNCS 8096, P58, DOI 10.1007/978-3-642-40328-6_5
  • [8] Brunjes L., 2020, LEVERAGING APPL FORM
  • [9] Identifying High Cardinality Internet Hosts
    Cao, Jin
    Jin, Yu
    Chen, Aiyou
    Bu, Tian
    Zhang, Zhi-Li
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 810 - +
  • [10] The Extended UTXO Model
    Chakravarty, Manuel M. T.
    Chapman, James
    MacKenzie, Kenneth
    Melkonian, Orestis
    Jones, Michael Peyton
    Wadler, Philip
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12063 : 525 - 539