R. Saravanan, S. Santhiya, K. Shalini, V.S Sreeparvathy
{"title":"Comparative Study Analysis of MachineLearning Algorithms for Anomaly Detection in Blockchain","authors":"R. Saravanan, S. Santhiya, K. Shalini, V.S Sreeparvathy","doi":"10.1109/ICDCECE57866.2023.10150785","DOIUrl":null,"url":null,"abstract":"Anomaly detection is one of the challenging problems encountered by the modern network security industry. In these last years, Blockchain technologies have been widely used in several application fields to improve data privacy and trustworthiness and security of systems. Despite being an effective tool, the blockchain is not impervious to cyberattacks. For instance, a successful 51% attack on Ethereum Classic exposed security flaws in the technology. Attacks can be viewed from a statistical standpoint as an aberrant finding that strongly deviates from the norm. Machine learning is a science whose objective is to discover insights, trends, and anomalies in massive data sets; as a result, it can be used to detect blockchain attacks. In this work, we define a federated learning-based anomaly detection system that is trained using aggregate data gathered from observing blockchain activity on the end device itself. Experiments on the whole historical logs of the Ethereum Classic network demonstrate our model’s ability to accurately identify assaults that have been made public while also automatically signing digital transactions for further protection. Therefore, it is necessary to create an anomaly detection system that can monitor networks for any dangerous actions and produce findings for the management authority in the end device itself. Several classification techniques and machine learning algorithms have been taken into consideration in our suggested article to categorize the accurate model.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDCECE57866.2023.10150785","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Anomaly detection is one of the challenging problems encountered by the modern network security industry. In these last years, Blockchain technologies have been widely used in several application fields to improve data privacy and trustworthiness and security of systems. Despite being an effective tool, the blockchain is not impervious to cyberattacks. For instance, a successful 51% attack on Ethereum Classic exposed security flaws in the technology. Attacks can be viewed from a statistical standpoint as an aberrant finding that strongly deviates from the norm. Machine learning is a science whose objective is to discover insights, trends, and anomalies in massive data sets; as a result, it can be used to detect blockchain attacks. In this work, we define a federated learning-based anomaly detection system that is trained using aggregate data gathered from observing blockchain activity on the end device itself. Experiments on the whole historical logs of the Ethereum Classic network demonstrate our model’s ability to accurately identify assaults that have been made public while also automatically signing digital transactions for further protection. Therefore, it is necessary to create an anomaly detection system that can monitor networks for any dangerous actions and produce findings for the management authority in the end device itself. Several classification techniques and machine learning algorithms have been taken into consideration in our suggested article to categorize the accurate model.