Visual analytics for security threats detection in Ethereum consensus layer

被引:0
|
作者
Chen, Xuan [1 ]
Zhang, Xincan [2 ]
Wang, Zhaohan [3 ]
Yu, Kerun [4 ]
Kam-Kwai, Wong [5 ]
Guo, Haoyun [1 ]
Chen, Siming [1 ]
机构
[1] Fudan Univ, Sch Data Sci, Shanghai, Peoples R China
[2] Fudan Univ, Sch Econ, Shanghai, Peoples R China
[3] Fudan Univ, Sch Comp Sci, Shanghai, Peoples R China
[4] Fudan Univ, Dept Phys, Shanghai, Peoples R China
[5] HKSAR, Hong Kong Univ Sci & Technol, Hong Kong, Peoples R China
关键词
Ethereum; The consensus layer; The beacon chain; Security; BLOCKCHAIN; ATTACKS;
D O I
10.1007/s12650-024-00969-z
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Ethereum consensus layer provides the Proof of Stake (PoS) consensus algorithm with the beacon chain for the Ethereum blockchain network. However, the beacon chain is proved vulnerable to consensus-targeted attacks, which are difficult to detect. To address this issue, blockchain developers require an interactive tool to identify and mitigate potential security threats. Currently, most blockchain visualization solutions only display client logs or transaction records, making responding quickly to security threats challenging. This paper introduces the first visual analytics solution for security threat awareness on the Ethereum consensus layer. We cooperate with blockchain experts and investigate a top-down exploration approach, providing an overview of the general security level, as well as detailed consensus achievements in each slot. Our visual system lets users discover specific outcomes of the consensus execution and identify anomalies in the beacon chain historical data. Furthermore, the system includes two case studies of actual attacks to help developers better understand and mitigate potential security threats.
引用
收藏
页码:469 / 483
页数:15
相关论文
共 50 条
  • [41] MEV: Visual Analytics for Medication Error Detection
    Kakar, Tabassum
    Qin, Xiao
    Tapply, Cory M.
    Spring, Oliver
    Murphy, Derek
    Yun, Daniel
    Rundensteiner, Elke A.
    Harrison, Lane
    La, Thang
    Sahoo, Sanjay K.
    De, Suranjan
    PROCEEDINGS OF THE 14TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS - VOL 3: IVAPP, 2019, : 72 - 82
  • [42] Towards Visual Analytics Tasks for the Security Information and Event Management
    Novikova, Evgenia S.
    Bekeneva, Yana A.
    Shorov, Andrey V.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 90 - 93
  • [43] Visual analytics for event detection: Focusing on fraud
    Leite, Roger A.
    Gschwandtner, Theresia
    Miksch, Silvia
    Gstrein, Erich
    Kuntner, Johannes
    VISUAL INFORMATICS, 2018, 2 (04): : 198 - 212
  • [44] Operational security log analytics for enterprise breach detection
    Li, Zhou
    Oprea, Alina
    2016 IEEE CYBERSECURITY DEVELOPMENT (IEEE SECDEV 2016), 2016, : 15 - 22
  • [45] Spatial-Temporal Anomaly Detection using Security Visual Analytics via Entropy Graph and Eigen Matrix
    Sinda, Matthew
    Liao, Qi
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 511 - 518
  • [46] PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction
    Elsayed, Marwa A.
    Zulkernine, Mohammad
    IEEE ACCESS, 2020, 8 : 45184 - 45197
  • [47] Survey on 5G Physical Layer Security Threats and Countermeasures
    Harvanek, Michal
    Bolcek, Jan
    Kufa, Jan
    Polak, Ladislav
    Simka, Marek
    Marsalek, Roman
    SENSORS, 2024, 24 (17)
  • [48] Efficient Analysis and Detection of Intelligent Security Threats in Cloud Environment
    Park, Ji Su
    JOURNAL OF INTERNET TECHNOLOGY, 2024, 25 (04): : 629 - 635
  • [49] A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks
    Fragkiadakis, Alexandros G.
    Tragos, Elias Z.
    Askoxylakis, Ioannis G.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 428 - 445
  • [50] Semi-Automated Detection of Architectural Threats for Security Testing
    Al-Azzani, Sarah
    Bahsoon, Rami
    ESEC-FSE DOCTORAL SYMPOSIUM 2009, 2009, : 25 - 26