Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning

被引:1
作者
Mughaid, Ala [1 ]
Obeidat, Ibrahim [1 ]
Shdaifat, Andaleeb [1 ]
Alhayjna, Razan [1 ]
AlZu'bi, Shadi [2 ]
机构
[1] Hashemite Univ, Fac prince Al Hussien bin Abdullah IT, Dept Informat Technol, POB 330127, Zarqa 13133, Jordan
[2] Al Zaytoonah Univ Jordan, Comp Sci Dept, Amman, Jordan
来源
2023 EIGHTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC | 2023年
关键词
Cyber security; Blockchain; Smart contract; Machine learning; IPFS; BLOCKCHAIN;
D O I
10.1109/FMEC59375.2023.10305867
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, the use and development of a blockchain systems such as Ethereum has increased rapidly, and many systems have relied on a third party as an intermediary between the sender and the receiver. Despite the attempts of developers to protect smart contracts, smart contracts contain many vulnerabilities that hackers resort to exploiting and using due to the attack that caused many financial and economic losses, and with the increase of errors in smart contracts, there are many tools and methods. For the analysis of smart contracts, machine learning models have appeared that facilitate their discovery instead of extracting them manually. In this paper, We have built a model that attempts to cancel the third party and we used machine learning to identify valid and invalid smart contracts. We have used several models and compared them with previous results of previous work in the same field. The result of this research was as expected of height accuracy achieved with approximately.99%.
引用
收藏
页码:123 / 127
页数:5
相关论文
共 50 条
  • [31] IDENTIFICATION AND LOCALIZATION OF VULNERABILITIES IN SMART CONTRACTS USING ATTENTION VECTORS ANALYSIS IN A BERT-BASED MODEL
    Tereshchenko, O. I.
    Komleva, N.
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2024, (03) : 173 - 184
  • [32] Machine Learning for Detecting Security Attacks on Blockchain using Software Defined Networking
    Gaba, Shivani
    Budhiraja, Ishan
    Makkar, Aaisha
    Garg, Deepak
    2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 260 - 264
  • [33] Detecting abnormal behaviors in smart contracts using opcode sequences
    Li, Peiqiang
    Wang, Guojun
    Xing, Xiaofei
    Zhu, Jinyao
    Gu, Wanyi
    Zhai, Guangxin
    COMPUTER COMMUNICATIONS, 2024, 220 : 12 - 22
  • [34] Detecting functional and security-related issues in smart contracts: A systematic literature review
    Piantadosi, Valentina
    Rosa, Giovanni
    Placella, Davide
    Scalabrino, Simone
    Oliveto, Rocco
    SOFTWARE-PRACTICE & EXPERIENCE, 2023, 53 (02) : 465 - 495
  • [35] Smart contracts auditing and multi-classification using machine learning algorithms: an efficient vulnerability detection in ethereum blockchain
    El Haddouti, Samia
    Khaldoune, Mohammed
    Ayache, Meryeme
    Ech-Cherif El Kettani, Mohamed Dafir
    COMPUTING, 2024, 106 (09) : 2971 - 3003
  • [36] Detect and Mitigate Blockchain-Based DDoS Attacks Using Machine Learning and Smart Contracts
    Hamodi Y.I.
    Majeed A.A.
    Jihad K.H.
    Qader B.A.
    Informatica (Slovenia), 2022, 46 (07): : 55 - 62
  • [37] A Survey on Ethereum Smart Contract Vulnerability Detection Using Machine Learning
    Surucu, Onur
    Yeprem, Uygar
    Wilkinson, Connor
    Hilal, Waleed
    Gadsden, S. Andrew
    Yawney, John
    Alsadi, Naseem
    Giuliano, Alessandro
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VI, 2022, 12117
  • [38] Adaptive Security for Smart Contracts using High Granularity Metrics
    Bhamidipati, Venkata Siva Vijayendra
    Chan, Michael
    Chamorro, Derek
    Jain, Arpit
    Murthy, Ashok
    ICVISP 2019: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON VISION, IMAGE AND SIGNAL PROCESSING, 2019,
  • [39] Securing Smart Contracts in Fog Computing: Machine Learning-Based Attack Detection for Registration and Resource Access Granting
    Ehsan, Tahmina
    Sana, Muhammad Usman
    Ali, Muhammad Usman
    Montero, Elizabeth Caro
    Alvarado, Eduardo Silva
    Djuraev, Sirojiddin
    Ashraf, Imran
    IEEE ACCESS, 2024, 12 : 42802 - 42815
  • [40] Preserving Data Integrity and Detecting Toxic Recordings in Machine Learning using Blockchain
    Alaya, Bechir
    Moulahi, Tarek
    El Khediri, Salim
    Aladhadh, Suliman
    PROCEEDINGS 2024 IEEE 25TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM 2024, 2024, : 18 - 23