Synergy of Blockchain Technology and Data Mining Techniques for Anomaly Detection

被引:14
|
作者
Kamisalic, Aida [1 ]
Kramberger, Renata [2 ]
Fister, Iztok, Jr. [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, Koroska Cesta 46, Maribor 2000, Slovenia
[2] Zagreb Univ Appl Sci, Dept Informat Technol & Comp, Vrbik 8, Zagreb 10000, Croatia
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 17期
基金
欧盟地平线“2020”;
关键词
anomaly detection; blockchain; distributed ledger; data mining; machine learning; PRIVACY-PRESERVING-FRAMEWORK; FINANCIAL FRAUD DETECTION; CRYPTOMINING MALWARE; ATTACK DETECTION; DATA-MANAGEMENT; SMART; NETWORKS; INTERNET; MACHINE; SYSTEM;
D O I
10.3390/app11177987
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Blockchain and Data Mining are not simply buzzwords, but rather concepts that are playing an important role in the modern Information Technology (IT) revolution. Blockchain has recently been popularized by the rise of cryptocurrencies, while data mining has already been present in IT for many decades. Data stored in a blockchain can also be considered to be big data, whereas data mining methods can be applied to extract knowledge hidden in the blockchain. In a nutshell, this paper presents the interplay of these two research areas. In this paper, we surveyed approaches for the data mining of blockchain data, yet show several real-world applications. Special attention was paid to anomaly detection and fraud detection, which were identified as the most prolific applications of applying data mining methods on blockchain data. The paper concludes with challenges for future investigations of this research area.
引用
收藏
页数:37
相关论文
共 50 条
  • [31] Comparative Evaluation of Anomaly Detection Techniques for Sequence Data
    Chandola, Varun
    Mithal, Varun
    Kumar, Vipin
    ICDM 2008: EIGHTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2008, : 743 - +
  • [32] Anomaly Detection Techniques in the Gaia Space Mission Data
    Roberti, Marco
    Druetto, Alessandro
    Busonero, Deborah
    Cancelliere, Rossella
    Cavagnino, Davide
    Gai, Mario
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2021, 93 (11): : 1339 - 1357
  • [33] Data mining methods for anomaly detection of HTTP request exploitations
    Wang, XF
    Zhou, JL
    Yu, SS
    Cai, LZ
    FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 2, PROCEEDINGS, 2005, 3614 : 320 - 323
  • [34] Data Mining Approach for Anomaly Detection in Social Network Analysis
    Sudha, M. Swarna
    Priya, K. Arun
    Lakshmi, A. Kanaka
    Kruthika, A.
    Priya, D. Lakshmi
    Valarmathi, K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1862 - 1866
  • [36] Anomaly detection scheme using data mining in mobile environment
    Park, K
    Ryou, H
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 21 - 30
  • [37] An adaptive smartphone anomaly detection model based on data mining
    Xue Li Hu
    Lian Cheng Zhang
    Zhen Xing Wang
    EURASIP Journal on Wireless Communications and Networking, 2018
  • [38] Applying fuzzy data mining to network unsupervised anomaly detection
    Xiang, G
    Min, W
    Zhao, RC
    INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1249 - 1253
  • [39] Strategies for data stream mining method applied in anomaly detection
    Ruxia Sun
    Sun Zhang
    Chunyong Yin
    Jin Wang
    Seungwook Min
    Cluster Computing, 2019, 22 : 399 - 408
  • [40] Data Mining Method for Anomaly Detection in the Supercomputer Task Flow
    Voevodin, Vadim
    Voevodin, Vladimir
    Shaikhislamov, Denis
    Nikitenko, Dmitry
    NUMERICAL COMPUTATIONS: THEORY AND ALGORITHMS (NUMTA-2016), 2016, 1776