Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning

被引:1
|
作者
Mughaid, Ala [1 ]
Obeidat, Ibrahim [1 ]
Shdaifat, Andaleeb [1 ]
Alhayjna, Razan [1 ]
AlZu'bi, Shadi [2 ]
机构
[1] Hashemite Univ, Fac prince Al Hussien bin Abdullah IT, Dept Informat Technol, POB 330127, Zarqa 13133, Jordan
[2] Al Zaytoonah Univ Jordan, Comp Sci Dept, Amman, Jordan
关键词
Cyber security; Blockchain; Smart contract; Machine learning; IPFS; BLOCKCHAIN;
D O I
10.1109/FMEC59375.2023.10305867
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, the use and development of a blockchain systems such as Ethereum has increased rapidly, and many systems have relied on a third party as an intermediary between the sender and the receiver. Despite the attempts of developers to protect smart contracts, smart contracts contain many vulnerabilities that hackers resort to exploiting and using due to the attack that caused many financial and economic losses, and with the increase of errors in smart contracts, there are many tools and methods. For the analysis of smart contracts, machine learning models have appeared that facilitate their discovery instead of extracting them manually. In this paper, We have built a model that attempts to cancel the third party and we used machine learning to identify valid and invalid smart contracts. We have used several models and compared them with previous results of previous work in the same field. The result of this research was as expected of height accuracy achieved with approximately.99%.
引用
收藏
页码:123 / 127
页数:5
相关论文
共 50 条
  • [31] Machine Learning Security: Threats, Countermeasures, and Evaluations
    Xue, Mingfu
    Yuan, Chengxiang
    Wu, Heyi
    Zhang, Yushu
    Liu, Weiqiang
    IEEE ACCESS, 2020, 8 : 74720 - 74742
  • [32] Survivability of industrial internet of things using machine learning and smart contracts
    Priyadarshini, Ishaani
    Kumar, Raghvendra
    Alkhayyat, Ahmed
    Sharma, Rohit
    Yadav, Kusum
    Alkwai, Lulwah M.
    Kumar, Sachin
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 107
  • [33] Detecting Security Threats Using Mobile Devices
    Li, J. Jenny
    Abbate, Peter
    Vega, Brian
    2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY - COMPANION (QRS-C 2015), 2015, : 40 - 45
  • [34] Elicitation of security threats and vulnerabilities in Insurance chatbots using STRIDE
    Bokolo, Zilungile
    Daramola, Olawande
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [35] Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts
    Xue, Yinxing
    Ma, Mingliang
    Lin, Yun
    Sui, Yulei
    Ye, Jiaming
    Peng, Tianyong
    2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), 2020, : 1029 - 1040
  • [36] Machine learning security and privacy: a review of threats and countermeasures
    Paracha, Anum
    Arshad, Junaid
    Farah, Mohamed Ben
    Ismail, Khalid
    EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01)
  • [37] Clairvoyance: Cross-contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts
    Ye, Jiaming
    Ma, Mingliang
    Lin, Yun
    Sui, Yulei
    Xue, Yinxing
    2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2020), 2020, : 274 - 275
  • [38] Defects and Vulnerabilities in Smart Contracts, a Classification using the NIST Bugs Framework
    Wesley Dingman
    Aviel Cohen
    Nick Ferrara
    Adam Lynch
    Patrick Jasinski
    Paul E. Black
    Lin Deng
    International Journal of Networked and Distributed Computing, 2019, 7 : 121 - 132
  • [39] Defects and Vulnerabilities in Smart Contracts, a Classification using the NIST Bugs Framework
    Dingman, Wesley
    Cohen, Aviel
    Ferrara, Nick
    Lynch, Adam
    Jasinski, Patrick
    Black, Paul E.
    Deng, Lin
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2019, 7 (03) : 121 - 132
  • [40] A Machine Learning Approach for Detecting Unemployment Using the Smart Metering Infrastructure
    Montanez, Casimiro A. Curbelo
    Hurst, William
    IEEE ACCESS, 2020, 8 : 22525 - 22536