519 Hits in 2.0 sec

BAD: Blockchain Anomaly Detection [article]

Matteo Signorini, Matteo Pontecorvi, Wael Kanoun, Roberto Di Pietro
2020 arXiv   pre-print
However, no proposal has addressed attacks targeting blockchain-based systems. In this paper we present BAD: the first Blockchain Anomaly Detection solution.  ...  Our proposal is validated via both experimental results and theoretical complexity analysis, that highlight the quality and viability of our Blockchain Anomaly Detection solution.  ...  We detailed BAD, and provided an analysis of its overhead, as well as a prototype implementation, showing as an example its effectiveness in detecting the dreadful eclipse attack.  ... 
arXiv:1807.03833v3 fatcat:3tvo5rpbrncgpalrq3erwqkml4

BAD: A Blockchain Anomaly Detection Solution

Matteo Signorini, Matteo Pontecorvi, Wael Kanoun, Roberto Di Pietro
2020 IEEE Access  
BAD: A Blockchain Anomaly Detection SOLUTION The core idea behind Blockchain Anomaly Detection (BAD) consists in providing a new decentralized system based on the blockchain technology which leverages  ...  CONCLUSION In this paper we proposed BAD: the first Blockchain Anomaly Detection solution. In particular, BAD allows to detect anomalous transactions and to prevent them from being further spread.  ... 
doi:10.1109/access.2020.3025622 fatcat:zy5zztkgdbfqhbjo7idkmi7paq

Anomaly Detection Model Over Blockchain Electronic Transactions

2019 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)  
In this work, we propose a new model for anomaly detection over bitcoin electronic transactions.  ...  with the same type of anomalies.  ...  Signorini and al [5] proposes a Blockchain anomaly detection (BAD) solution exploiting blockchain metadata to collect malicious activity.  ... 
doi:10.1109/iwcmc.2019.8766765 dblp:conf/iwcmc/SayadiRC19 fatcat:zmelhhqo7bbztcdgntdezdm6te

Anomaly Detection in Blockchain Networks: A Comprehensive Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
2021 arXiv   pre-print
For this, we first discuss that how anomaly detection can aid in ensuring security of blockchain based applications.  ...  Therefore, nowadays anomaly detection models are playing an important role in protection of modern blockchain networks.  ...  named it a 'BAD'.  ... 
arXiv:2112.06089v1 fatcat:o6z2f7gunvd3fnxhfwmb57qwhm

BCEAD: A Blockchain-Empowered Ensemble Anomaly Detection for Wireless Sensor Network via Isolation Forest

Xiong Yang, Yuling Chen, Xiaobin Qian, Tao Li, Xiao Lv, Weizhi Meng
2021 Security and Communication Networks  
Therefore, we propose a blockchain-based ensemble anomaly detection (BCEAD), which stores the model of a typical anomaly detection algorithm (isolated forest) in the blockchain for distributed anomaly  ...  Moreover, the blockchain guarantees the trust environment of the network, making the detection algorithm resistant to internal attacks.  ...  Anomaly Detection and Blockchain.  ... 
doi:10.1155/2021/9430132 fatcat:bysh6iqeubarvgm4lhhzxjjzvi

Cyber-Physical System Architecture for Minimizing the Possibility of Producing Bad Products in a Manufacturing System [chapter]

Salvador Cobos Guzman, Maria Dolores Cima Cabal, Francisco Machio Regidor, Lucia Alonso Virgos
2019 Innovative Design and Operation of Digital Manufacturing Equipment - Trends and Prospect of Manufacturing Intelligence [Working Title]  
The combination of the previous techniques will be implemented in the architecture proposed for minimizing the possibility of producing bad products.  ...  ., detecting anomalies).  ...  The objective is to detect those unnecessary activities or processes [5] .  ... 
doi:10.5772/intechopen.88461 fatcat:5ve3unld4bgtzdo7s3fr3vvoam

Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges

Salam Al-E'mari, Mohammed Anbar, Yousef Sanjalawe, Selvakumar Manickam, Iznan Hasbullah
2022 Computer systems science and engineering  
To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology  ...  Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance.  ...  [72] proposed a model called BAD, which is a blockchain anomaly detection approach for the Bitcoin network.  ... 
doi:10.32604/csse.2022.017941 fatcat:fms7ruts4bb2titxseevonsjzq

A New Network Intrusion Detection System based on Blockchain

Fu Jinhua, Xu Mixue, Huang Yongzhong, Tao Hongwei
2019 International Journal of Performability Engineering  
In this paper, a new network intrusion detection system is designed based on blockchain, which can enable users to share feature libraries over the whole network by means of P2P network transmission.  ...  Blockchain, which is a new network system of decentralization, de-trust, tamper-proof, anti-counterfeiting, and traceability, plays an important role in the transmission and sharing of high-value data.  ...  At present, it is mainly divided into anomaly-based network intrusion detection and feature-based network intrusion detection.  ... 
doi:10.23940/ijpe.19.12.p10.31873195 fatcat:eeoleslvdjbxpeudr7syfiy54u

Evaluating a blockchain-based network performance for the intrusion detection system

I.A. Burmaka, Chernihiv National University of Technology, V.V. Lytvynov, I.S. Skiter, S.V. Lytvyn, Chernihiv National University of Technology, Institute of Mathematical Machines and Systems Problems National Academy of Science of Ukraine, Chernihiv National University of Technology
2020 Mathematical machines and systems  
Modeling results will help us to find optimal use cases for the blockchain-based intrusion detection systems.  ...  Also the main difference between blockchain usage for intrusion detection system and cryptocurrency is that cryptocurrency has in average stable amounts of data for recording when intrusion detection system  ...  Also IDSs can be classified as signature-based IDS and anomaly-based IDS by detection mechanism [2] .  ... 
doi:10.34121/1028-9763-2020-1-99-109 fatcat:s5j7mpsb5nehhhzrel3ophadhq

An Intelligent Transaction Migration Scheme for RAFT-based Private Blockchain in Internet of Things Applications

Lu Hou, Xiaojun Xu, Kan Zheng, Xianbin Wang
2021 IEEE Communications Letters  
However, reducing the latency of storing data on blockchain remains a challenge, especially when an anomalytriggered data flow in a certain area exceeds the block generation speed.  ...  This letter proposes an intelligent transaction migration scheme for RAFT-based private blockchain in IoT applications to migrate transactions in busy areas to idle regions intelligently.  ...  When an anomaly is detected in some area, the IoT system needs to increase the measurement frequency of terminals to obtain high-resolution sensing data for better decisions.  ... 
doi:10.1109/lcomm.2021.3079201 fatcat:j2w6quzfczhr5aapicewrpb62q

Smart Grid Nontechnical Loss Detection Based on Power Gateway Consortium Blockchain

Xudong He, Jian Wang, Jiqiang Liu, Enze Yuan, Kailun Wang, Zhen Han, Yinghui Zhang
2021 Security and Communication Networks  
A hierarchical grid gateway blockchain is proposed and designed, and a new decentralized management MDMS system is constructed.  ...  The intelligent contract combined with the elliptic curve encryption technology is used to detect the storage and the acquisition of power data, and the detection of NTL problems is realized.  ...  [21] proposed a blockchain-based anomaly detection method (BAD).  ... 
doi:10.1155/2021/9501572 fatcat:3ppxmsr4qfbyngxjyyg4lakika

PIRATE: A Blockchain-based Secure Framework of Distributed Machine Learning in 5G Networks [article]

Sicong Zhou, Huawei Huang, Wuhui Chen, Zibin Zheng, Song Guo
2019 arXiv   pre-print
Therefore, to provide the byzantine-resilience for distributed learning in 5G era, this article proposes a secure computing framework based on the sharding-technique of blockchain, namely PIRATE.  ...  A pretrained anomaly detection model would assign a weight to each gradient according to the anomaly score.  ...  To protect both the gradient aggregation and model parameters, the proposed approach utilizes a sharding-based blockchain protocol and gradient anomaly-detection [7] .  ... 
arXiv:1912.07860v1 fatcat:f77hexw7ybbb5nfhleujbaji5q

Automotive Vulnerability Analysis for Deep Learning Blockchain Consensus Algorithm

Seong-Kyu Kim
2021 Electronics  
Therefore, this study wrote a paper that detects anomalies in such cars by field.  ...  In addition, in automobile security, an algorithm was studied to predict normal and abnormal values using LSTM-based anomaly detection techniques on the premise that automobile communication networks are  ...  In this study, the concept of anomaly detection was summarized, and artificial intelligence-based anomaly detection techniques were directly applied to various fields.  ... 
doi:10.3390/electronics11010119 fatcat:xy6u4be5offcnnjcndoeqd3p5u

Analysis for the Evaluation and Security Management of a Database in a Public Organization to Mitigate Cyber Attacks

Segundo M. Toapanta, Omar A. Escalante, Luis E. Mafla, Rocio M. Arellano
2020 IEEE Access  
The authors proposed a database anomaly detection model; by processing instructions that are set in events, here they helped detect anomaly, then viewed suspicious users, and sent a report of user activities  ...  of possible anomalies.  ... 
doi:10.1109/access.2020.3022746 fatcat:emjh6u6oizej3gkiws7e6gedfq

A Data Quarantine Model to Secure Data in Edge Computing [article]

Poornima Mahadevappa, Raja Kumar Murugesan
2021 arXiv   pre-print
All the existing frameworks adopt a security framework to handle data integrity attacks by including anomaly detections on the existing edge nodes or adding blockchain to identify the attack.  ...  Currently, there are many data integrity verification solutions to secure the data in edge computing, such as using blockchain devices, data assessments, collaborative methods or statistical anomaly detections  ... 
arXiv:2111.07672v1 fatcat:5w735f5dw5bnrjsttswuv5tozq
« Previous Showing results 1 — 15 out of 519 results