Anomaly detection in blockchain using network representation and machine learning

被引:21
|
作者
Martin, Kevin [1 ]
Rahouti, Mohamed [2 ]
Ayyash, Moussa [3 ]
Alsmadi, Izzat [4 ]
机构
[1] Syracuse Univ, Engn & Comp Sci, Syracuse, NY USA
[2] Fordham Univ, Dept Comp & Informat Sci, Lincoln Ctr Campus,113 West 60th St, New York, NY 10023 USA
[3] Chicago State Univ, Comp Informat & Math Sci & Technol, Chicago, IL USA
[4] Texas A&M Univ, Dept Comp & Cyber Secur, San Antonio, TX USA
关键词
blockchain; cryptocurrency; graph algorithms; machine learning; network embedding;
D O I
10.1002/spy2.192
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The vast majority of digital currency transactions rely on a blockchain framework to ensure quick and accurate execution. As such, understanding how a blockchain works is vital to understanding the dynamics of cryptocurrency operations. One of the key benefits of this type of system is the exhaustive records captured in a given marketplace. The interwoven movement between agents can effectively be expressed as a graph via the extraction of historical data from the blockchain. By looking at a specific blockchain as an interaction of its agents, network representation learning can be leveraged to examine these relationships. Furthermore, the analysis of a graph structure can be enhanced through the application of modern and sophisticated machine learning techniques. Leveraging the automated nature of these methods can create meaningful observations of the input network. In this paper, we utilize several machine learning models to detect anomalous transactions in various digital currency markets. We find that supervised learning techniques yield encouraging results, whereas unsupervised learning techniques struggle more with the classification.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Secure and transparent energy management using blockchain and machine learning anomaly detection: A case study of the Ausgrid dataset
    Moumni, Nourchen
    Chaabane, Faten
    Drira, Fadoua
    Boutaleb, Youssef
    COMPUTERS & INDUSTRIAL ENGINEERING, 2025, 203
  • [42] A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking
    Kim, Jinoh
    Nakashima, Makiya
    Fan, Wenjun
    Wuthier, Simeon
    Zhou, Xiaobo
    Kim, Ikkyun
    Chang, Sang-Yoon
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 3619 - 3632
  • [43] Network Encryption Traffic Anomaly Detection Based on Integrated Machine Learning
    Yang, Xiaoqing
    Angkawisittpan, Niwat
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2025, 32 (02): : 713 - 722
  • [44] Unsupervised machine learning for network-centric anomaly detection in IoT
    Bhatia, Randeep
    Benno, Steven
    Esteban, Jairo
    Lakshman, T., V
    Grogan, John
    BIG-DAMA'19: PROCEEDINGS OF THE 3RD ACM CONEXT WORKSHOP ON BIG DATA, MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR DATA COMMUNICATION NETWORKS, 2019, : 42 - 48
  • [45] Network anomaly detection using deep learning techniques
    Hooshmand, Mohammad Kazim
    Hosahalli, Doreswamy
    CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2022, 7 (02) : 228 - 243
  • [46] Machine Learning Enhanced Entropy-Based Network Anomaly Detection
    Timcenko, Valentina
    Gajin, Slavko
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2021, 21 (04) : 51 - 60
  • [47] Corporate network anomaly detection methodology utilizing machine learning algorithms
    Baisholan, Nazerke
    Baisholanova, Karlygash
    Kubayev, Kazila
    Alimzhanova, Zhanna
    Baimuldina, Nazira
    SMART SCIENCE, 2024, 12 (04) : 666 - 678
  • [48] Analysis of Machine Learning Application in Campus Network Traffic Anomaly Detection
    Li R.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [49] Vulnerability Assessment for Machine Learning Based Network Anomaly Detection System
    Ogawa, Yuji
    Kimura, Tomotaka
    Cheng, Jun
    2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TAIWAN), 2020,
  • [50] Android Anomaly Detection System Using Machine Learning Classification
    Kurniawan, Harry
    Rosmansyah, Yusep
    Dabarsyah, Budiman
    5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS 2015, 2015, : 288 - 293