Synergy of Blockchain Technology and Data Mining Techniques for Anomaly Detection

被引:14
|
作者
Kamisalic, Aida [1 ]
Kramberger, Renata [2 ]
Fister, Iztok, Jr. [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, Koroska Cesta 46, Maribor 2000, Slovenia
[2] Zagreb Univ Appl Sci, Dept Informat Technol & Comp, Vrbik 8, Zagreb 10000, Croatia
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 17期
基金
欧盟地平线“2020”;
关键词
anomaly detection; blockchain; distributed ledger; data mining; machine learning; PRIVACY-PRESERVING-FRAMEWORK; FINANCIAL FRAUD DETECTION; CRYPTOMINING MALWARE; ATTACK DETECTION; DATA-MANAGEMENT; SMART; NETWORKS; INTERNET; MACHINE; SYSTEM;
D O I
10.3390/app11177987
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Blockchain and Data Mining are not simply buzzwords, but rather concepts that are playing an important role in the modern Information Technology (IT) revolution. Blockchain has recently been popularized by the rise of cryptocurrencies, while data mining has already been present in IT for many decades. Data stored in a blockchain can also be considered to be big data, whereas data mining methods can be applied to extract knowledge hidden in the blockchain. In a nutshell, this paper presents the interplay of these two research areas. In this paper, we surveyed approaches for the data mining of blockchain data, yet show several real-world applications. Special attention was paid to anomaly detection and fraud detection, which were identified as the most prolific applications of applying data mining methods on blockchain data. The paper concludes with challenges for future investigations of this research area.
引用
收藏
页数:37
相关论文
共 50 条
  • [41] Wind Turbine Anomaly Detection Based on SCADA Data Mining
    Liu, Xiaoyuan
    Lu, Senxiang
    Ren, Yan
    Wu, Zhenning
    ELECTRONICS, 2020, 9 (05)
  • [42] Mining Anomalous Usage of Sensitive Data Through Anomaly Detection
    Jin, Xin
    Xiong, Yan
    Huang, Wenchao
    Meng, Zhaoyi
    2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 59 - 67
  • [43] An adaptive smartphone anomaly detection model based on data mining
    Hu, Xue Li
    Zhang, Lian Cheng
    Wang, Zhen Xing
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [44] Strategies for data stream mining method applied in anomaly detection
    Sun, Ruxia
    Zhang, Sun
    Yin, Chunyong
    Wang, Jin
    Min, Seungwook
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : 399 - 408
  • [45] Anomaly Detection in Business Process based on Data Stream Mining
    Tavares, Gabriel Marques
    Turrisi da Costa, Victor G.
    Martins, Vinicius Eiji
    Ceravolo, Paolo
    Barbon, Sylvio, Jr.
    PROCEEDINGS OF THE 14TH BRAZILIAN SYMPOSIUM ON INFORMATION SYSTEMS (SBSI2018), 2018, : 120 - 127
  • [46] Agent Mining: The Synergy of Agents and Data Mining
    Cao, Longbing
    Gorodetsky, Vladimir
    Mitkas, Pericles A.
    IEEE INTELLIGENT SYSTEMS, 2009, 24 (03) : 64 - 72
  • [47] BAD: A Blockchain Anomaly Detection Solution
    Signorini, Matteo
    Pontecorvi, Matteo
    Kanoun, Wael
    Di Pietro, Roberto
    IEEE ACCESS, 2020, 8 (08) : 173481 - 173490
  • [48] Using data mining as a tool for anomaly detection in food safety audit data
    Kleboth, J. A.
    Kosorus, H.
    Rechberger, T.
    Luning, P. A.
    FOOD CONTROL, 2022, 138
  • [49] Data warehousing and data mining techniques for intrusion detection systems
    Anoop Singhal
    Sushil Jajodia
    Distributed and Parallel Databases, 2006, 20 : 149 - 166
  • [50] Data warehousing and data mining techniques for intrusion detection systems
    Singhal, Anoop
    Jajodia, Sushil
    DISTRIBUTED AND PARALLEL DATABASES, 2006, 20 (02) : 149 - 166