FRAD: Front-Running Attacks Detection on Ethereum using Ternary
Classification Model
- URL: http://arxiv.org/abs/2311.14514v1
- Date: Fri, 24 Nov 2023 14:42:29 GMT
- Title: FRAD: Front-Running Attacks Detection on Ethereum using Ternary
Classification Model
- Authors: Yuheng Zhang, Pin Liu, Guojun Wang, Peiqiang Li, Wanyi Gu, Houji Chen,
Xuelei Liu, and Jinyao Zhu
- Abstract summary: Front-running attacks, a unique form of security threat, pose significant challenges to the integrity of blockchain transactions.
In these attack scenarios, malicious actors monitor other users' transaction activities, then strategically submit their own transactions with higher fees.
We introduce a novel detection method named FRAD (Front-Running Attacks Detection on using Ternary Classification Model)
Our experimental validation reveals that the Multilayer Perceptron (MLP) classifier offers the best performance in detecting front-running attacks, achieving an impressive accuracy rate of 84.59% and F1-score of 84.60%.
- Score: 3.929929061618338
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: With the evolution of blockchain technology, the issue of transaction
security, particularly on platforms like Ethereum, has become increasingly
critical. Front-running attacks, a unique form of security threat, pose
significant challenges to the integrity of blockchain transactions. In these
attack scenarios, malicious actors monitor other users' transaction activities,
then strategically submit their own transactions with higher fees. This ensures
their transactions are executed before the monitored transactions are included
in the block. The primary objective of this paper is to delve into a
comprehensive classification of transactions associated with front-running
attacks, which aims to equip developers with specific strategies to counter
each type of attack. To achieve this, we introduce a novel detection method
named FRAD (Front-Running Attacks Detection on Ethereum using Ternary
Classification Model). This method is specifically tailored for transactions
within decentralized applications (DApps) on Ethereum, enabling accurate
classification of front-running attacks involving transaction displacement,
insertion, and suppression. Our experimental validation reveals that the
Multilayer Perceptron (MLP) classifier offers the best performance in detecting
front-running attacks, achieving an impressive accuracy rate of 84.59% and
F1-score of 84.60%.
Related papers
- BlockFound: Customized blockchain foundation model for anomaly detection [47.04595143348698]
BlockFound is a customized foundation model for anomaly blockchain transaction detection.
We introduce a series of customized designs to model the unique data structure of blockchain transactions.
BlockFound is the only method that successfully detects anomalous transactions on Solana with high accuracy.
arXiv Detail & Related papers (2024-10-05T05:11:34Z) - AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning [93.77763753231338]
Adversarial Contrastive Prompt Tuning (ACPT) is proposed to fine-tune the CLIP image encoder to extract similar embeddings for any two intermediate adversarial queries.
We show that ACPT can detect 7 state-of-the-art query-based attacks with $>99%$ detection rate within 5 shots.
We also show that ACPT is robust to 3 types of adaptive attacks.
arXiv Detail & Related papers (2024-08-04T09:53:50Z) - Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability [61.549465258257115]
We propose a novel and severer backdoor attack, TransTroj, which enables the backdoors embedded in PTMs to efficiently transfer in the model supply chain.
Experimental results show that our method significantly outperforms SOTA task-agnostic backdoor attacks.
arXiv Detail & Related papers (2024-01-29T04:35:48Z) - LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts [15.071155232677643]
Decentralized Finance (DeFi) incidents have resulted in financial damages exceeding 3 billion US dollars.
Current detection tools face significant challenges in identifying attack activities effectively.
We propose a new direction for detecting DeFi attacks that focuses on identifying adversarial contracts.
arXiv Detail & Related papers (2024-01-14T11:39:33Z) - Can We Trust the Unlabeled Target Data? Towards Backdoor Attack and Defense on Model Adaptation [120.42853706967188]
We explore the potential backdoor attacks on model adaptation launched by well-designed poisoning target data.
We propose a plug-and-play method named MixAdapt, combining it with existing adaptation algorithms.
arXiv Detail & Related papers (2024-01-11T16:42:10Z) - Collaborative Learning Framework to Detect Attacks in Transactions and Smart Contracts [26.70294159598272]
This paper presents a novel collaborative learning framework designed to detect attacks in blockchain transactions and smart contracts.
Our framework exhibits the capability to classify various types of blockchain attacks, including intricate attacks at the machine code level.
Our framework achieves a detection accuracy of approximately 94% through extensive simulations and 91% in real-time experiments with a throughput of over 2,150 transactions per second.
arXiv Detail & Related papers (2023-08-30T07:17:20Z) - Transferable Attack for Semantic Segmentation [59.17710830038692]
adversarial attacks, and observe that the adversarial examples generated from a source model fail to attack the target models.
We propose an ensemble attack for semantic segmentation to achieve more effective attacks with higher transferability.
arXiv Detail & Related papers (2023-07-31T11:05:55Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - FIRST: FrontrunnIng Resilient Smart ConTracts [3.5061201620029876]
In some cases, the inherently transparent and unregulated nature of cryptocurrencies leads to verifiable attacks on users of these applications.
One such attack is frontrunning, where a malicious entity leverages the knowledge of currently unprocessed financial transactions.
We propose FIRST, a framework that prevents frontrunning attacks and is built using cryptographic protocols.
arXiv Detail & Related papers (2022-04-02T23:30:13Z) - Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users [0.0]
We propose and implement user profiling techniques based on quasi-identifiers.
We describe a malicious value-fingerprinting attack, a variant of the Danaan-gift attack, applicable for the confidential transaction overlays.
arXiv Detail & Related papers (2020-05-28T14:33:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.