FRAD: Front-Running Attacks Detection on Ethereum using Ternary
Classification Model
- URL: http://arxiv.org/abs/2311.14514v1
- Date: Fri, 24 Nov 2023 14:42:29 GMT
- Title: FRAD: Front-Running Attacks Detection on Ethereum using Ternary
Classification Model
- Authors: Yuheng Zhang, Pin Liu, Guojun Wang, Peiqiang Li, Wanyi Gu, Houji Chen,
Xuelei Liu, and Jinyao Zhu
- Abstract summary: Front-running attacks, a unique form of security threat, pose significant challenges to the integrity of blockchain transactions.
In these attack scenarios, malicious actors monitor other users' transaction activities, then strategically submit their own transactions with higher fees.
We introduce a novel detection method named FRAD (Front-Running Attacks Detection on using Ternary Classification Model)
Our experimental validation reveals that the Multilayer Perceptron (MLP) classifier offers the best performance in detecting front-running attacks, achieving an impressive accuracy rate of 84.59% and F1-score of 84.60%.
- Score: 3.929929061618338
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: With the evolution of blockchain technology, the issue of transaction
security, particularly on platforms like Ethereum, has become increasingly
critical. Front-running attacks, a unique form of security threat, pose
significant challenges to the integrity of blockchain transactions. In these
attack scenarios, malicious actors monitor other users' transaction activities,
then strategically submit their own transactions with higher fees. This ensures
their transactions are executed before the monitored transactions are included
in the block. The primary objective of this paper is to delve into a
comprehensive classification of transactions associated with front-running
attacks, which aims to equip developers with specific strategies to counter
each type of attack. To achieve this, we introduce a novel detection method
named FRAD (Front-Running Attacks Detection on Ethereum using Ternary
Classification Model). This method is specifically tailored for transactions
within decentralized applications (DApps) on Ethereum, enabling accurate
classification of front-running attacks involving transaction displacement,
insertion, and suppression. Our experimental validation reveals that the
Multilayer Perceptron (MLP) classifier offers the best performance in detecting
front-running attacks, achieving an impressive accuracy rate of 84.59% and
F1-score of 84.60%.
Related papers
- GasTrace: Detecting Sandwich Attack Malicious Accounts in Ethereum [0.7529855084362796]
We propose a cascade classification framework GasTrace to identify and prevent sandwich attacks.
GasTrace performs an accuracy of 96.73% and an F1 score of 95.71% for identifying sandwich attack accounts.
arXiv Detail & Related papers (2024-05-30T11:55:21Z) - Can We Trust the Unlabeled Target Data? Towards Backdoor Attack and Defense on Model Adaptation [120.42853706967188]
We explore the potential backdoor attacks on model adaptation launched by well-designed poisoning target data.
We propose a plug-and-play method named MixAdapt, combining it with existing adaptation algorithms.
arXiv Detail & Related papers (2024-01-11T16:42:10Z) - Securing Blockchain Systems: A Novel Collaborative Learning Framework to Detect Attacks in Transactions and Smart Contracts [26.85360925398753]
This paper presents a novel collaborative learning framework designed to detect attacks in blockchain transactions and smart contracts.
Our framework exhibits the capability to classify various types of blockchain attacks, including intricate attacks at the machine code level.
Our framework achieves a detection accuracy of approximately 94% through extensive simulations and real-time experiments with a throughput of over 2,150 transactions per second.
arXiv Detail & Related papers (2023-08-30T07:17:20Z) - Transferable Attack for Semantic Segmentation [59.17710830038692]
adversarial attacks, and observe that the adversarial examples generated from a source model fail to attack the target models.
We propose an ensemble attack for semantic segmentation to achieve more effective attacks with higher transferability.
arXiv Detail & Related papers (2023-07-31T11:05:55Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Object-fabrication Targeted Attack for Object Detection [54.10697546734503]
adversarial attack for object detection contains targeted attack and untargeted attack.
New object-fabrication targeted attack mode can mislead detectors tofabricate extra false objects with specific target labels.
arXiv Detail & Related papers (2022-12-13T08:42:39Z) - FIRST: FrontrunnIng Resilient Smart ConTracts [3.5061201620029876]
In some cases, the inherently transparent and unregulated nature of cryptocurrencies leads to verifiable attacks on users of these applications.
One such attack is frontrunning, where a malicious entity leverages the knowledge of currently unprocessed financial transactions.
We propose FIRST, a framework that prevents frontrunning attacks and is built using cryptographic protocols.
arXiv Detail & Related papers (2022-04-02T23:30:13Z) - MixNet for Generalized Face Presentation Attack Detection [63.35297510471997]
We have proposed a deep learning-based network termed as textitMixNet to detect presentation attacks.
The proposed algorithm utilizes state-of-the-art convolutional neural network architectures and learns the feature mapping for each attack category.
arXiv Detail & Related papers (2020-10-25T23:01:13Z) - Label-Only Membership Inference Attacks [67.46072950620247]
We introduce label-only membership inference attacks.
Our attacks evaluate the robustness of a model's predicted labels under perturbations.
We find that training models with differential privacy and (strong) L2 regularization are the only known defense strategies.
arXiv Detail & Related papers (2020-07-28T15:44:31Z) - Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users [0.0]
We propose and implement user profiling techniques based on quasi-identifiers.
We describe a malicious value-fingerprinting attack, a variant of the Danaan-gift attack, applicable for the confidential transaction overlays.
arXiv Detail & Related papers (2020-05-28T14:33:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.