학술논문

Comparative Study Analysis of MachineLearning Algorithms for Anomaly Detection in Blockchain
Document Type
Conference
Source
2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE) Distributed Computing and Electrical Circuits and Electronics (ICDCECE), 2023 International Conference on. :1-6 Apr, 2023
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineered Materials, Dielectrics and Plasmas
Engineering Profession
Fields, Waves and Electromagnetics
Photonics and Electrooptics
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Measurement
Machine learning algorithms
Federated learning
Network security
Market research
Blockchains
Classification algorithms
Anomaly Detection
Blockchain
Machine learning
Classification Techniques
Attacks
Security
Language
Abstract
Anomaly detection is one of the challenging problems encountered by the modern network security industry. In these last years, Blockchain technologies have been widely used in several application fields to improve data privacy and trustworthiness and security of systems. Despite being an effective tool, the blockchain is not impervious to cyberattacks. For instance, a successful 51% attack on Ethereum Classic exposed security flaws in the technology. Attacks can be viewed from a statistical standpoint as an aberrant finding that strongly deviates from the norm. Machine learning is a science whose objective is to discover insights, trends, and anomalies in massive data sets; as a result, it can be used to detect blockchain attacks. In this work, we define a federated learning-based anomaly detection system that is trained using aggregate data gathered from observing blockchain activity on the end device itself. Experiments on the whole historical logs of the Ethereum Classic network demonstrate our model’s ability to accurately identify assaults that have been made public while also automatically signing digital transactions for further protection. Therefore, it is necessary to create an anomaly detection system that can monitor networks for any dangerous actions and produce findings for the management authority in the end device itself. Several classification techniques and machine learning algorithms have been taken into consideration in our suggested article to categorize the accurate model.