Reputation-based PoS for the Restriction of Illicit Activities on
Blockchain: Algorand Usecase
- URL: http://arxiv.org/abs/2112.11024v3
- Date: Thu, 25 Aug 2022 05:40:24 GMT
- Title: Reputation-based PoS for the Restriction of Illicit Activities on
Blockchain: Algorand Usecase
- Authors: Mayank Pandey, Rachit Agarwal, Sandeep Kumar Shukla, Nishchal Kumar
Verma
- Abstract summary: In recent times, different machine learning-based techniques can detect such criminal elements based on blockchain transaction data.
We propose a reputation-based methodology for response to the users detected carrying out the aforementioned illicit activities.
- Score: 2.94824047753242
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In cryptocurrency-based permissionless blockchain networks, the decentralized
structure enables any user to join and operate across different regions. The
criminal entities exploit it by using cryptocurrency transactions on the
blockchain to facilitate activities such as money laundering, gambling, and
ransomware attacks. In recent times, different machine learning-based
techniques can detect such criminal elements based on blockchain transaction
data. However, there is no provision within the blockchain to deal with such
elements. We propose a reputation-based methodology for response to the users
detected carrying out the aforementioned illicit activities. We select Algorand
blockchain to implement our methodology by incorporating it within the
consensus protocol. The theoretical results obtained prove the restriction and
exclusion of criminal elements through block proposal rejection and attenuation
of the voting power as a validator for such entities. Further, we analyze the
efficacy of our method and show that it puts no additional strain on the
communication resources.
Related papers
- BlockFound: Customized blockchain foundation model for anomaly detection [47.04595143348698]
BlockFound is a customized foundation model for anomaly blockchain transaction detection.
We introduce a series of customized designs to model the unique data structure of blockchain transactions.
BlockFound is the only method that successfully detects anomalous transactions on Solana with high accuracy.
arXiv Detail & Related papers (2024-10-05T05:11:34Z) - Securing Proof of Stake Blockchains: Leveraging Multi-Agent Reinforcement Learning for Detecting and Mitigating Malicious Nodes [0.2982610402087727]
MRL-PoS+ is a novel consensus algorithm to enhance the security of PoS blockchains.
We show that MRL-PoS+ significantly improves the attack resilience of PoS blockchains.
arXiv Detail & Related papers (2024-07-30T17:18:03Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - The Kosmosis Use-Case of Crypto Rug Pull Detection and Prevention [0.0]
Current methods to prevent crypto asset fraud are based on the analysis of transaction graphs within blockchain networks.
We propose the Kosmosis approach, which aims to incrementally construct a knowledge graph as new blockchain and social media data become available.
arXiv Detail & Related papers (2024-05-30T07:17:57Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - Chainlet Orbits: Topological Address Embedding for the Bitcoin
Blockchain [15.099255988459602]
Rise of cryptocurrencies like Bitcoin, which enable transactions with a degree of pseudonymity, has led to a surge in various illicit activities.
We introduce an effective solution called Chainlet Orbits to embed Bitcoin addresses by leveraging their topological characteristics in transactions.
Our approach enables the use of interpretable and explainable machine learning models in as little as 15 minutes for most days on the Bitcoin transaction network.
arXiv Detail & Related papers (2023-05-18T21:16:59Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Detecting Malicious Accounts showing Adversarial Behavior in
Permissionless Blockchains [4.506782035297339]
Malicious activities have been flagged in multiple permissionless blockchains such as bitcoin.
We aim at automatically flagging blockchain accounts that originate such malicious exploitation of accounts of other participants.
We identify a robust supervised machine learning (ML) algorithm that is resistant to any bias induced by an over representation of certain malicious activity.
arXiv Detail & Related papers (2021-01-28T10:33:50Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - How to Not Get Caught When You Launder Money on Blockchain? [20.970223434542508]
Public blockchains have become a hotbed of research for developing AI tools to detect and trace users and transactions that are related to e-crime.
We argue that following a few select strategies can make money laundering on blockchain virtually undetectable with most of the existing tools and algorithms.
arXiv Detail & Related papers (2020-09-22T02:12:15Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.