Chaos Engineering of Ethereum Blockchain Clients
- URL: http://arxiv.org/abs/2111.00221v2
- Date: Sun, 18 Jun 2023 00:43:29 GMT
- Title: Chaos Engineering of Ethereum Blockchain Clients
- Authors: Long Zhang, Javier Ron, Benoit Baudry, and Martin Monperrus
- Abstract summary: We present ChaosETH, a chaos engineering approach for resilience assessment of blockchain clients.
Our results reveal a broad spectrum of resilience characteristics of clients w.r.t. system call invocation errors, ranging from direct crashes to full resilience.
- Score: 13.131269677617286
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this paper, we present ChaosETH, a chaos engineering approach for
resilience assessment of Ethereum blockchain clients. ChaosETH operates in the
following manner: First, it monitors Ethereum clients to determine their normal
behavior. Then, it injects system call invocation errors into one single
Ethereum client at a time, and observes the behavior resulting from
perturbation. Finally, ChaosETH compares the behavior recorded before, during,
and after perturbation to assess the impact of the injected system call
invocation errors. The experiments are performed on the two most popular
Ethereum client implementations: GoEthereum and Nethermind. We assess the
impact of 22 different system call errors on those Ethereum clients with
respect to 15 application-level metrics. Our results reveal a broad spectrum of
resilience characteristics of Ethereum clients w.r.t. system call invocation
errors, ranging from direct crashes to full resilience. The experiments clearly
demonstrate the feasibility of applying chaos engineering principles to
blockchain systems.
Related papers
- BlockFound: Customized blockchain foundation model for anomaly detection [47.04595143348698]
BlockFound is a customized foundation model for anomaly blockchain transaction detection.
We introduce a series of customized designs to model the unique data structure of blockchain transactions.
BlockFound is the only method that successfully detects anomalous transactions on Solana with high accuracy.
arXiv Detail & Related papers (2024-10-05T05:11:34Z) - Enhancing Ethereum Fraud Detection via Generative and Contrastive Self-supervision [4.497245600377944]
We present a dual self-supervision enhanced fraud detection framework, named Meta-IFD.
This framework initially introduces a generative self-supervision mechanism to augment the interaction features of accounts, followed by a contrastive self-supervision mechanism to differentiate various behavior patterns.
The source code will be released on GitHub soon.
arXiv Detail & Related papers (2024-08-01T15:30:43Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web [39.96427593096699]
We identify 2,564 illicit sites with 1,189 illicit blockchain addresses, which account for 90.8 BTC in revenue.
Our exploration suggests that illicit activities on the dark web have strong correlations, which can guide us to identify new illicit blockchain addresses and onions.
arXiv Detail & Related papers (2024-01-09T16:35:25Z) - FRAD: Front-Running Attacks Detection on Ethereum using Ternary
Classification Model [3.929929061618338]
Front-running attacks, a unique form of security threat, pose significant challenges to the integrity of blockchain transactions.
In these attack scenarios, malicious actors monitor other users' transaction activities, then strategically submit their own transactions with higher fees.
We introduce a novel detection method named FRAD (Front-Running Attacks Detection on using Ternary Classification Model)
Our experimental validation reveals that the Multilayer Perceptron (MLP) classifier offers the best performance in detecting front-running attacks, achieving an impressive accuracy rate of 84.59% and F1-score of 84.60%.
arXiv Detail & Related papers (2023-11-24T14:42:29Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection [29.518411879700263]
BERT4ETH is a pre-trained Transformer account representation extractor for detecting various fraud behaviors.
BERT4ETH features the superior modeling capability of Transformer to capture the dynamic sequential patterns inherent in transactions.
Our empirical evaluation demonstrates that BERT4ETH outperforms state-of-the-art methods with significant enhancements in terms of the phishing account detection and de-anonymization tasks.
arXiv Detail & Related papers (2023-03-29T20:30:52Z) - Highly Available Blockchain Nodes With N-Version Design [13.131269677617286]
This paper introduces the concept of N-version blockchain nodes.
N-version nodes rely on simultaneous execution of different implementations of the same blockchain protocol.
We show that N-ETH is able to mitigate the effects of unstable execution environments and significantly enhance availability under environment faults.
arXiv Detail & Related papers (2023-03-25T11:16:17Z) - Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB) [50.888293380932616]
We study the ecosystem of the tokens and liquidity pools.
We find that about 60% of tokens are active for less than one day.
We estimate that 1-day rug pulls generated $240 million in profits.
arXiv Detail & Related papers (2022-06-16T14:20:19Z) - Lightweight Collaborative Anomaly Detection for the IoT using Blockchain [40.52854197326305]
Internet of things (IoT) devices tend to have many vulnerabilities which can be exploited by an attacker.
Unsupervised techniques, such as anomaly detection, can be used to secure these devices in a plug-and-protect manner.
We present a distributed IoT simulation platform, which consists of 48 Raspberry Pis.
arXiv Detail & Related papers (2020-06-18T14:50:08Z) - Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users [0.0]
We propose and implement user profiling techniques based on quasi-identifiers.
We describe a malicious value-fingerprinting attack, a variant of the Danaan-gift attack, applicable for the confidential transaction overlays.
arXiv Detail & Related papers (2020-05-28T14:33:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.