Synergy of Blockchain Technology and Data Mining Techniques for Anomaly Detection

被引:14
|
作者
Kamisalic, Aida [1 ]
Kramberger, Renata [2 ]
Fister, Iztok, Jr. [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, Koroska Cesta 46, Maribor 2000, Slovenia
[2] Zagreb Univ Appl Sci, Dept Informat Technol & Comp, Vrbik 8, Zagreb 10000, Croatia
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 17期
基金
欧盟地平线“2020”;
关键词
anomaly detection; blockchain; distributed ledger; data mining; machine learning; PRIVACY-PRESERVING-FRAMEWORK; FINANCIAL FRAUD DETECTION; CRYPTOMINING MALWARE; ATTACK DETECTION; DATA-MANAGEMENT; SMART; NETWORKS; INTERNET; MACHINE; SYSTEM;
D O I
10.3390/app11177987
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Blockchain and Data Mining are not simply buzzwords, but rather concepts that are playing an important role in the modern Information Technology (IT) revolution. Blockchain has recently been popularized by the rise of cryptocurrencies, while data mining has already been present in IT for many decades. Data stored in a blockchain can also be considered to be big data, whereas data mining methods can be applied to extract knowledge hidden in the blockchain. In a nutshell, this paper presents the interplay of these two research areas. In this paper, we surveyed approaches for the data mining of blockchain data, yet show several real-world applications. Special attention was paid to anomaly detection and fraud detection, which were identified as the most prolific applications of applying data mining methods on blockchain data. The paper concludes with challenges for future investigations of this research area.
引用
收藏
页数:37
相关论文
共 50 条
  • [1] A Survey on Blockchain Anomaly Detection Using Data Mining Techniques
    Li, Ji
    Gu, Chunxiang
    Wei, Fushan
    Chen, Xi
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 491 - 504
  • [2] Anomaly Detection Techniques in Data Mining-A Review
    Lakshmi, K. N.
    Neema, N.
    Muddasir, N. Mohammed
    Prashanth, M., V
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 799 - 804
  • [3] Survey on Anomaly Detection using Data Mining Techniques
    Agrawal, Shikha
    Agrawal, Jitendra
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 708 - 713
  • [4] The Key Techniques of the Network Anomaly Detection Based on Data Mining
    He Xiaobo
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1896 - 1899
  • [5] The Research of Network Anomaly Detection Technology Based on Data Mining
    Wu, Chunhong
    Xia, Wenzhong
    Liu, Fengyun
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1689 - 1692
  • [6] Real Anomaly Detection in Telecommunication Multidimensional Data Using Data Mining Techniques
    Choros, Kazimierz
    COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, PT I, 2010, 6421 : 11 - 19
  • [7] Anomaly Detection in Admission or Selection Examinations using Data Mining Techniques
    Ashaduzzaman, Md
    Roy, Shanto
    Zaman, Shihabuz
    Ferdaus, Abu Ahmed
    2020 2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR INDUSTRY 4.0 (STI), 2020,
  • [8] Big Data Analytics for Anomaly Detection in Blockchain
    Ozbilen, Mahmut Lutfullah
    Ozcan, Elif
    Keles, Mustafa Berk
    Zeybel, Merve
    Dervisoglu, Havanur
    Dogan, Aslinur
    Haklidir, Mehmet
    2023 31ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU, 2023,
  • [9] A survey of data mining and social network analysis based anomaly detection techniques
    Kaur, Ravneet
    Singh, Sarbjeet
    EGYPTIAN INFORMATICS JOURNAL, 2016, 17 (02) : 199 - 216
  • [10] Anomaly Intrusion Detection Based Upon Data Mining Techniques and Fuzzy Logic
    Yu, Yingbing
    Wu, Han
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 514 - 517