Detecting Malicious Accounts showing Adversarial Behavior in
Permissionless Blockchains
- URL: http://arxiv.org/abs/2101.11915v1
- Date: Thu, 28 Jan 2021 10:33:50 GMT
- Title: Detecting Malicious Accounts showing Adversarial Behavior in
Permissionless Blockchains
- Authors: Rachit Agarwal, Tanmay Thapliyal, Sandeep K. Shukla
- Abstract summary: Malicious activities have been flagged in multiple permissionless blockchains such as bitcoin.
We aim at automatically flagging blockchain accounts that originate such malicious exploitation of accounts of other participants.
We identify a robust supervised machine learning (ML) algorithm that is resistant to any bias induced by an over representation of certain malicious activity.
- Score: 4.506782035297339
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Different types of malicious activities have been flagged in multiple
permissionless blockchains such as bitcoin, Ethereum etc. While some malicious
activities exploit vulnerabilities in the infrastructure of the blockchain,
some target its users through social engineering techniques. To address these
problems, we aim at automatically flagging blockchain accounts that originate
such malicious exploitation of accounts of other participants. To that end, we
identify a robust supervised machine learning (ML) algorithm that is resistant
to any bias induced by an over representation of certain malicious activity in
the available dataset, as well as is robust against adversarial attacks. We
find that most of the malicious activities reported thus far, for example, in
Ethereum blockchain ecosystem, behaves statistically similar. Further, the
previously used ML algorithms for identifying malicious accounts show bias
towards a particular malicious activity which is over-represented. In the
sequel, we identify that Neural Networks (NN) holds up the best in the face of
such bias inducing dataset at the same time being robust against certain
adversarial attacks.
Related papers
- The Kosmosis Use-Case of Crypto Rug Pull Detection and Prevention [0.0]
Current methods to prevent crypto asset fraud are based on the analysis of transaction graphs within blockchain networks.
We propose the Kosmosis approach, which aims to incrementally construct a knowledge graph as new blockchain and social media data become available.
arXiv Detail & Related papers (2024-05-30T07:17:57Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain [0.18641315013048293]
This paper introduces MRL-PoS, a Proof-of-Stake consensus algorithm based on multi-agent reinforcement learning.
It incorporates a system of rewards and penalties to eliminate malicious nodes and incentivize honest ones.
arXiv Detail & Related papers (2023-12-14T16:58:18Z) - Securing Blockchain Systems: A Novel Collaborative Learning Framework to Detect Attacks in Transactions and Smart Contracts [26.85360925398753]
This paper presents a novel collaborative learning framework designed to detect attacks in blockchain transactions and smart contracts.
Our framework exhibits the capability to classify various types of blockchain attacks, including intricate attacks at the machine code level.
Our framework achieves a detection accuracy of approximately 94% through extensive simulations and real-time experiments with a throughput of over 2,150 transactions per second.
arXiv Detail & Related papers (2023-08-30T07:17:20Z) - Transaction Fraud Detection via an Adaptive Graph Neural Network [64.9428588496749]
We propose an Adaptive Sampling and Aggregation-based Graph Neural Network (ASA-GNN) that learns discriminative representations to improve the performance of transaction fraud detection.
A neighbor sampling strategy is performed to filter noisy nodes and supplement information for fraudulent nodes.
Experiments on three real financial datasets demonstrate that the proposed method ASA-GNN outperforms state-of-the-art ones.
arXiv Detail & Related papers (2023-07-11T07:48:39Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and the Binance Smart Chain (BNB) [50.888293380932616]
We study the ecosystem of the tokens and liquidity pools, highlighting analogies and differences between the two blockchains.
We estimate the lifetime of the tokens, discovering that about 60% of them are active for less than one day.
We present an exit scam fraud and quantify its prevalence on both blockchains.
arXiv Detail & Related papers (2022-06-16T14:20:19Z) - Reputation-based PoS for the Restriction of Illicit Activities on
Blockchain: Algorand Usecase [2.94824047753242]
In recent times, different machine learning-based techniques can detect such criminal elements based on blockchain transaction data.
We propose a reputation-based methodology for response to the users detected carrying out the aforementioned illicit activities.
arXiv Detail & Related papers (2021-12-21T07:32:22Z) - Identification of Attack-Specific Signatures in Adversarial Examples [62.17639067715379]
We show that different attack algorithms produce adversarial examples which are distinct not only in their effectiveness but also in how they qualitatively affect their victims.
Our findings suggest that prospective adversarial attacks should be compared not only via their success rates at fooling models but also via deeper downstream effects they have on victims.
arXiv Detail & Related papers (2021-10-13T15:40:48Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z) - Detecting Malicious Accounts in Permissionless Blockchains using
Temporal Graph Properties [4.506782035297339]
temporal nature of modeling accounts as nodes and transactions as directed edges in a directed graph -- for a blockchain.
Motivated by this, we introduce temporal features such as burst and attractiveness on top of several already used graph properties.
We train various Machine Learning (ML) algorithms to identify the algorithm that performs the best in detecting which accounts are malicious.
arXiv Detail & Related papers (2020-07-10T05:15:26Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.