Visual analytics for security threats detection in Ethereum consensus layer

被引:0
|
作者
Chen, Xuan [1 ]
Zhang, Xincan [2 ]
Wang, Zhaohan [3 ]
Yu, Kerun [4 ]
Kam-Kwai, Wong [5 ]
Guo, Haoyun [1 ]
Chen, Siming [1 ]
机构
[1] Fudan Univ, Sch Data Sci, Shanghai, Peoples R China
[2] Fudan Univ, Sch Econ, Shanghai, Peoples R China
[3] Fudan Univ, Sch Comp Sci, Shanghai, Peoples R China
[4] Fudan Univ, Dept Phys, Shanghai, Peoples R China
[5] HKSAR, Hong Kong Univ Sci & Technol, Hong Kong, Peoples R China
关键词
Ethereum; The consensus layer; The beacon chain; Security; BLOCKCHAIN; ATTACKS;
D O I
10.1007/s12650-024-00969-z
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Ethereum consensus layer provides the Proof of Stake (PoS) consensus algorithm with the beacon chain for the Ethereum blockchain network. However, the beacon chain is proved vulnerable to consensus-targeted attacks, which are difficult to detect. To address this issue, blockchain developers require an interactive tool to identify and mitigate potential security threats. Currently, most blockchain visualization solutions only display client logs or transaction records, making responding quickly to security threats challenging. This paper introduces the first visual analytics solution for security threat awareness on the Ethereum consensus layer. We cooperate with blockchain experts and investigate a top-down exploration approach, providing an overview of the general security level, as well as detailed consensus achievements in each slot. Our visual system lets users discover specific outcomes of the consensus execution and identify anomalies in the beacon chain historical data. Furthermore, the system includes two case studies of actual attacks to help developers better understand and mitigate potential security threats.
引用
收藏
页码:469 / 483
页数:15
相关论文
共 50 条
  • [31] Collaborative Detection of Cyber Security Threats in Big Data
    Zhang, Jiange
    Guo, Yuanbo
    Chen, Yue
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (02) : 186 - 193
  • [32] A Security Threats Taxonomy for Routing System Intrusion Detection
    Miao Fu
    Wang Zhenxing
    Guo Yi
    Zhang Liancheng
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 267 - 270
  • [33] Survey of IoT security research: threats, detection and defense
    Yang Y.
    Zhou W.
    Zhao S.
    Liu C.
    Zhang Y.
    Wang H.
    Wang W.
    Zhang Y.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 188 - 205
  • [34] Problems and Tools for the Detection of Threats to Personnel Security in the Region
    Kuznetsova, Natalia Victorovna
    Timofeeva, Anastasia Yuryevna
    EKONOMIKA REGIONA-ECONOMY OF REGION, 2016, 12 (04): : 1123 - 1134
  • [35] A Solution to Combat Cyber security Threats Involving Big Data Analytics in the Hadoop Ecosystem
    Lnenicka, Martin
    Capek, Jan
    Komarkova, Jitka
    Machova, Renata
    Cermakova, Ivana
    VISION 2020: SUSTAINABLE ECONOMIC DEVELOPMENT, INNOVATION MANAGEMENT, AND GLOBAL GROWTH, VOLS I-IX, 2017, 2017, : 1804 - 1812
  • [36] Visual Analytics for Production Line Failure Detection
    Arrieta, Unai
    Garcia, Ander
    Lorente, Mikel
    Maleta, Angel
    HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, HAIS 2020, 2020, 12344 : 61 - 72
  • [37] Visual analytics for the detection of anomalous maritime behavior
    Riveiro, Maria
    Falkman, Goran
    Ziemke, Tom
    PROCEEDINGS OF THE 12TH INTERNATIONAL INFORMATION VISUALISATION, 2008, : 273 - 279
  • [38] Constructive Visual Analytics for Text Similarity Detection
    Abdul-Rahman, A.
    Roe, G.
    Olsen, M.
    Gladstone, C.
    Whaling, R.
    Cronk, N.
    Morrissey, R.
    Chen, M.
    COMPUTER GRAPHICS FORUM, 2017, 36 (01) : 237 - 248
  • [39] Comprehensive Process Drift Detection with Visual Analytics
    Yeshchenko, Anton
    Di Ciccio, Claudio
    Mendling, Jan
    Polyvyanyy, Artem
    CONCEPTUAL MODELING, ER 2019, 2019, 11788 : 119 - 135
  • [40] Visual analytics for intrusion detection in spam emails
    Zhang, Jinson
    Huang, Mao Lin
    Hoang, Doan
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 178 - 186