Blockchain abnormal behavior awareness methods: a survey

被引:7
作者
Yan, Chuyi [1 ,2 ]
Zhang, Chen [1 ,2 ]
Lu, Zhigang [1 ,2 ]
Wang, Zehui [1 ,2 ]
Liu, Yuling [1 ,2 ]
Liu, Baoxu [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchain; Abnormal behavior; Awareness; Supervision; Security detection;
D O I
10.1186/s42400-021-00107-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the wide application and development of blockchain technology in various fields such as finance, government affairs and medical care, security incidents occur frequently on it, which brings great threats to users' assets and information. Many researchers have worked on blockchain abnormal behavior awareness in respond to these threats. We summarize respectively the existing public blockchain and consortium blockchain abnormal behavior awareness methods and ideas in detail as the difference between the two types of blockchain. At the same time, we summarize and analyze the existing data sets related to mainstream blockchain security, and finally discuss possible future research directions. Therefore, this work can provide a reference for blockchain security awareness research.
引用
收藏
页数:27
相关论文
共 88 条
[1]   Decentralized Lightweight Detection of Eclipse Attacks on Bitcoin Clients [J].
Alangot, Bithin ;
Reijsbergen, Daniel ;
Venugopalan, Sarad ;
Szalachowski, Pawel .
2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020), 2020, :337-342
[2]   A Privacy-Preservation Framework Based on Biometrics Blockchain (BBC) to Prevent Attacks in VANET [J].
Alharthi, Abdullah ;
Ni, Qiang ;
Jiang, Richard .
IEEE ACCESS, 2021, 9 :87299-87309
[3]   Temporal high-order proximity aware behavior analysis on Ethereum [J].
Ao, Xiang ;
Liu, Yang ;
Qin, Zidi ;
Sun, Yi ;
He, Qing .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (05) :1565-1585
[4]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[5]  
Ateniese G, 2014, LECT NOTES COMPUT SC, V8479, P80, DOI 10.1007/978-3-319-07536-5_6
[6]  
Attorney O, 2019, MANHATTAN US ATTORNE
[7]   Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact [J].
Bartoletti, Massimo ;
Carta, Salvatore ;
Cimoli, Tiziana ;
Saia, Roberto .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 :259-277
[8]   OverSim: A flexible overlay network simulation framework [J].
Baumgart, Ingmar ;
Heep, Bernhard ;
Krause, Stephan .
2007 IEEE GLOBAL INTERNET SYMPOSIUM, 2007, :79-84
[9]  
Beam community, 2020, BEAM SCAL CONF CRYPT
[10]  
Chen C., 2020, CHINA IND INF TECHNO, V2020, P54