A Survey on Blockchain Anomaly Detection Using Data Mining Techniques

被引:9
作者
Li, Ji [1 ]
Gu, Chunxiang [1 ,2 ]
Wei, Fushan [1 ]
Chen, Xi [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[2] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
来源
BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019 | 2020年 / 1156卷
基金
中国国家自然科学基金;
关键词
Blockchain; Anomaly detection; Data mining; Graph analysis; Network security;
D O I
10.1007/978-981-15-2777-7_40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the more and more extensive application of blockchain, blockchain security has been widely concerned by the society and deeply studied by scholars, of which anomaly detection is an important problem. Data mining techniques, including conventional machine learning, deep learning and graph learning, have been concentrated for anomaly detection in the last few years. This paper presents a systematic survey of the blockchain anomaly detection results using data mining techniques. The anomaly detection methods are classified into 2 main categories, namely universal detection methods and specific detection methods, which contain 8 subclasses. For each subclass, the corresponding research are listed and compared, presenting a systematic and categorized overview of the current perspectives for blockchain anomaly detection. In addition, this paper contributes in discussing the advantages and disadvantages for the data mining techniques employed, and suggesting future directions for anomaly detection methods. This survey helps researchers to have a general comprehension of the anomaly detection field and its application in blockchain data.
引用
收藏
页码:491 / 504
页数:14
相关论文
共 51 条
[1]  
Prado-Romero MA, 2018, LECT NOTES COMPUT SC, V10657, P534, DOI 10.1007/978-3-319-75193-1_64
[2]  
[Авдошин С.М. Avdoshin S.M.], 2018, [Труды Института системного программирования РАН, Trudy Instituta sistemnogo programmirovaniya RAN], V30, P89
[3]   Blockchain Transaction Analysis Using Dominant [J].
Awan, Malik Khurram ;
Cortesi, Agostino .
COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (CISIM 2017), 2017, 10244 :229-239
[4]  
Back H, 2019, INT CONF UBIQ FUTUR, P713, DOI [10.1109/ICUFN.2019.8806126, 10.1109/icufn.2019.8806126]
[5]   A general framework for blockchain analytics [J].
Bartoletti, Massimo ;
Lande, Stefano ;
Pompianu, Livio ;
Bracciali, Andrea .
SERIAL 2017: THE 1ST WORKSHOP ON SCALABLE AND RESILIENT INFRASTRUCTURES FOR DISTRIBUTED LEDGERS, 2017,
[6]   Data mining for detecting Bitcoin Ponzi schemes [J].
Bartoletti, Massimo ;
Pes, Barbara ;
Serusi, Sergio .
2018 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT), 2018, :75-84
[7]   Improving Bitcoin Ownership Identification Using Transaction Patterns Analysis [J].
Chang, Tao-Hung ;
Svetinovic, Davor .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2020, 50 (01) :9-20
[8]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[9]  
Chen T, 2018, IEEE INFOCOM SER, P1484, DOI 10.1109/INFOCOM.2018.8486401
[10]  
Chen WL, 2019, IEEE INFOCOM SER, P964, DOI [10.1109/INFOCOM.2019.8737364, 10.1109/infocom.2019.8737364]