Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning

被引:1
|
作者
Mughaid, Ala [1 ]
Obeidat, Ibrahim [1 ]
Shdaifat, Andaleeb [1 ]
Alhayjna, Razan [1 ]
AlZu'bi, Shadi [2 ]
机构
[1] Hashemite Univ, Fac prince Al Hussien bin Abdullah IT, Dept Informat Technol, POB 330127, Zarqa 13133, Jordan
[2] Al Zaytoonah Univ Jordan, Comp Sci Dept, Amman, Jordan
关键词
Cyber security; Blockchain; Smart contract; Machine learning; IPFS; BLOCKCHAIN;
D O I
10.1109/FMEC59375.2023.10305867
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, the use and development of a blockchain systems such as Ethereum has increased rapidly, and many systems have relied on a third party as an intermediary between the sender and the receiver. Despite the attempts of developers to protect smart contracts, smart contracts contain many vulnerabilities that hackers resort to exploiting and using due to the attack that caused many financial and economic losses, and with the increase of errors in smart contracts, there are many tools and methods. For the analysis of smart contracts, machine learning models have appeared that facilitate their discovery instead of extracting them manually. In this paper, We have built a model that attempts to cancel the third party and we used machine learning to identify valid and invalid smart contracts. We have used several models and compared them with previous results of previous work in the same field. The result of this research was as expected of height accuracy achieved with approximately.99%.
引用
收藏
页码:123 / 127
页数:5
相关论文
共 50 条
  • [41] Detecting the Security Level of Various Cryptosystems Using Machine Learning Models
    Shafique, Arslan
    Ahmed, Jameel
    Boulila, Wadii
    Ghandorh, Hamzah
    Ahmad, Jawad
    Rehman, Mujeeb Ur
    IEEE ACCESS, 2021, 9 : 9383 - 9393
  • [42] Detecting Advanced Persistent Threats using Fractal Dimension based Machine Learning Classification
    Siddiqui, Sana
    Khan, Muhammad Salman
    Ferens, Ken
    Kinsner, Witold
    IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2016, : 64 - 69
  • [43] Characterizing and Understanding Software Security Vulnerabilities in Machine Learning Libraries
    Harzevili, Nima Shiri
    Shin, Jiho
    Wang, Junjie
    Wang, Song
    Nagappan, Nachiappan
    2023 IEEE/ACM 20TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, 2023, : 27 - 38
  • [44] A Framework for Modeling and Detecting Security Vulnerabilities in Human-Machine Pair Programming
    Wang, Pingyan
    Liu, Shaoying
    Liu, Ai
    Zaidi, Fatiha
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (05): : 1129 - 1138
  • [45] Unraveling Ransomware: Detecting Threats with Advanced Machine Learning Algorithms
    Hammadeh, Karam
    Kavitha, M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (09) : 484 - 491
  • [46] The Use of Machine Learning Algorithms for Detecting Advanced Persistent Threats
    Eke, Hope Nkiruka
    Petrovski, Andrei
    Ahriz, Hatem
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [47] Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review
    Tirulo, Aschalew
    Chauhan, Siddhartha
    Dutta, Kamlesh
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 24 (3-4) : 284 - 321
  • [48] A Machine-Learning-Blockchain-Based Authentication Using Smart Contracts for an IoHT System
    Gaur, Rajkumar
    Prakash, Shiva
    Kumar, Sanjay
    Abhishek, Kumar
    Msahli, Mounira
    Wahid, Abdul
    SENSORS, 2022, 22 (23)
  • [49] Security Vulnerabilities of User Authentication Scheme Using Smart Card
    Pippal, Ravi Singh
    Jaidhar, C. D.
    Tapaswi, Shashikala
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 106 - 113
  • [50] Machine Learning Based Security for Smart Cities
    Amaizu, Gabriel Chukwunonso
    Lee, Jae-Min
    Kim, Dong-Seong
    2022 27TH ASIA PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2022): CREATING INNOVATIVE COMMUNICATION TECHNOLOGIES FOR POST-PANDEMIC ERA, 2022, : 572 - 573