Detecting Malicious Accounts showing Adversarial Behavior in
Permissionless Blockchains
- URL: http://arxiv.org/abs/2101.11915v1
- Date: Thu, 28 Jan 2021 10:33:50 GMT
- Title: Detecting Malicious Accounts showing Adversarial Behavior in
Permissionless Blockchains
- Authors: Rachit Agarwal, Tanmay Thapliyal, Sandeep K. Shukla
- Abstract summary: Malicious activities have been flagged in multiple permissionless blockchains such as bitcoin.
We aim at automatically flagging blockchain accounts that originate such malicious exploitation of accounts of other participants.
We identify a robust supervised machine learning (ML) algorithm that is resistant to any bias induced by an over representation of certain malicious activity.
- Score: 4.506782035297339
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Different types of malicious activities have been flagged in multiple
permissionless blockchains such as bitcoin, Ethereum etc. While some malicious
activities exploit vulnerabilities in the infrastructure of the blockchain,
some target its users through social engineering techniques. To address these
problems, we aim at automatically flagging blockchain accounts that originate
such malicious exploitation of accounts of other participants. To that end, we
identify a robust supervised machine learning (ML) algorithm that is resistant
to any bias induced by an over representation of certain malicious activity in
the available dataset, as well as is robust against adversarial attacks. We
find that most of the malicious activities reported thus far, for example, in
Ethereum blockchain ecosystem, behaves statistically similar. Further, the
previously used ML algorithms for identifying malicious accounts show bias
towards a particular malicious activity which is over-represented. In the
sequel, we identify that Neural Networks (NN) holds up the best in the face of
such bias inducing dataset at the same time being robust against certain
adversarial attacks.
Related papers
- BlockFound: Customized blockchain foundation model for anomaly detection [47.04595143348698]
BlockFound is a customized foundation model for anomaly blockchain transaction detection.
We introduce a series of customized designs to model the unique data structure of blockchain transactions.
BlockFound is the only method that successfully detects anomalous transactions on Solana with high accuracy.
arXiv Detail & Related papers (2024-10-05T05:11:34Z) - MASKDROID: Robust Android Malware Detection with Masked Graph Representations [56.09270390096083]
We propose MASKDROID, a powerful detector with a strong discriminative ability to identify malware.
We introduce a masking mechanism into the Graph Neural Network based framework, forcing MASKDROID to recover the whole input graph.
This strategy enables the model to understand the malicious semantics and learn more stable representations, enhancing its robustness against adversarial attacks.
arXiv Detail & Related papers (2024-09-29T07:22:47Z) - Securing Proof of Stake Blockchains: Leveraging Multi-Agent Reinforcement Learning for Detecting and Mitigating Malicious Nodes [0.2982610402087727]
MRL-PoS+ is a novel consensus algorithm to enhance the security of PoS blockchains.
We show that MRL-PoS+ significantly improves the attack resilience of PoS blockchains.
arXiv Detail & Related papers (2024-07-30T17:18:03Z) - The Kosmosis Use-Case of Crypto Rug Pull Detection and Prevention [0.0]
Current methods to prevent crypto asset fraud are based on the analysis of transaction graphs within blockchain networks.
We propose the Kosmosis approach, which aims to incrementally construct a knowledge graph as new blockchain and social media data become available.
arXiv Detail & Related papers (2024-05-30T07:17:57Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain [0.18641315013048293]
This paper introduces MRL-PoS, a Proof-of-Stake consensus algorithm based on multi-agent reinforcement learning.
It incorporates a system of rewards and penalties to eliminate malicious nodes and incentivize honest ones.
arXiv Detail & Related papers (2023-12-14T16:58:18Z) - Transaction Fraud Detection via an Adaptive Graph Neural Network [64.9428588496749]
We propose an Adaptive Sampling and Aggregation-based Graph Neural Network (ASA-GNN) that learns discriminative representations to improve the performance of transaction fraud detection.
A neighbor sampling strategy is performed to filter noisy nodes and supplement information for fraudulent nodes.
Experiments on three real financial datasets demonstrate that the proposed method ASA-GNN outperforms state-of-the-art ones.
arXiv Detail & Related papers (2023-07-11T07:48:39Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Reputation-based PoS for the Restriction of Illicit Activities on
Blockchain: Algorand Usecase [2.94824047753242]
In recent times, different machine learning-based techniques can detect such criminal elements based on blockchain transaction data.
We propose a reputation-based methodology for response to the users detected carrying out the aforementioned illicit activities.
arXiv Detail & Related papers (2021-12-21T07:32:22Z) - Identification of Attack-Specific Signatures in Adversarial Examples [62.17639067715379]
We show that different attack algorithms produce adversarial examples which are distinct not only in their effectiveness but also in how they qualitatively affect their victims.
Our findings suggest that prospective adversarial attacks should be compared not only via their success rates at fooling models but also via deeper downstream effects they have on victims.
arXiv Detail & Related papers (2021-10-13T15:40:48Z) - Detecting Malicious Accounts in Permissionless Blockchains using
Temporal Graph Properties [4.506782035297339]
temporal nature of modeling accounts as nodes and transactions as directed edges in a directed graph -- for a blockchain.
Motivated by this, we introduce temporal features such as burst and attractiveness on top of several already used graph properties.
We train various Machine Learning (ML) algorithms to identify the algorithm that performs the best in detecting which accounts are malicious.
arXiv Detail & Related papers (2020-07-10T05:15:26Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.