Visual analytics for security threats detection in Ethereum consensus layer

被引:0
|
作者
Chen, Xuan [1 ]
Zhang, Xincan [2 ]
Wang, Zhaohan [3 ]
Yu, Kerun [4 ]
Kam-Kwai, Wong [5 ]
Guo, Haoyun [1 ]
Chen, Siming [1 ]
机构
[1] Fudan Univ, Sch Data Sci, Shanghai, Peoples R China
[2] Fudan Univ, Sch Econ, Shanghai, Peoples R China
[3] Fudan Univ, Sch Comp Sci, Shanghai, Peoples R China
[4] Fudan Univ, Dept Phys, Shanghai, Peoples R China
[5] HKSAR, Hong Kong Univ Sci & Technol, Hong Kong, Peoples R China
关键词
Ethereum; The consensus layer; The beacon chain; Security; BLOCKCHAIN; ATTACKS;
D O I
10.1007/s12650-024-00969-z
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Ethereum consensus layer provides the Proof of Stake (PoS) consensus algorithm with the beacon chain for the Ethereum blockchain network. However, the beacon chain is proved vulnerable to consensus-targeted attacks, which are difficult to detect. To address this issue, blockchain developers require an interactive tool to identify and mitigate potential security threats. Currently, most blockchain visualization solutions only display client logs or transaction records, making responding quickly to security threats challenging. This paper introduces the first visual analytics solution for security threat awareness on the Ethereum consensus layer. We cooperate with blockchain experts and investigate a top-down exploration approach, providing an overview of the general security level, as well as detailed consensus achievements in each slot. Our visual system lets users discover specific outcomes of the consensus execution and identify anomalies in the beacon chain historical data. Furthermore, the system includes two case studies of actual attacks to help developers better understand and mitigate potential security threats.
引用
收藏
页码:469 / 483
页数:15
相关论文
共 50 条
  • [1] Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures
    Duan, Li
    Sun, Yangyang
    Zhang, Kejia
    Ding, Yong
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [2] Visual Analytics for Network Security
    Shurkhovetskyy, Georgiy
    Bahey, Ahmed
    Ghoniem, Mohammad
    2012 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2012, : 301 - 302
  • [3] Detection of previously unknown Advanced Persistent Threats through Visual Analytics with the MASFAD framework
    Nikolov, Georgi
    Mees, Wim
    2023 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS, ICMCIS, 2023,
  • [4] Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey
    Salahdine, Fatima
    Kaabouch, Naima
    PHYSICAL COMMUNICATION, 2020, 39 (39)
  • [5] Visual Analytics for cyber security and intelligence
    Lavigne, Valerie
    Gouin, Denis
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2014, 11 (02): : 175 - 199
  • [6] Idea: Visual Analytics for Web Security
    Le Pochat, Victor
    Van Goethem, Tom
    Joosen, Wouter
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018, 2018, 10953 : 124 - 132
  • [7] Enhanced Anomaly Detection in Ethereum: Unveiling and Classifying Threats With Machine Learning
    Ehsan, Alvena
    Iqbal, Zahid
    Abuowaida, Suhaila
    Aljaidi, Mohammad
    Zia, Hafiz Usman
    Alshdaifat, Nawaf
    Alshammry, Nizal Khalf
    IEEE ACCESS, 2024, 12 : 176440 - 176456
  • [8] Security Threats in the Application layer in IOT Applications
    Swamy, Sowmya Nagasimha
    Jadhav, Dipti
    Kulkarni, Nikita
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 477 - 480
  • [9] Detection of Security Threats to Modern Websites
    Ivanov, D. V.
    Moskvin, D. A.
    Kubrin, G. S.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 963 - 968
  • [10] Detection of Security Threats to Modern Websites
    D. V. Ivanov
    D. A. Moskvin
    G. S. Kubrin
    Automatic Control and Computer Sciences, 2019, 53 : 963 - 968