BAD: Blockchain Anomaly Detection

07/10/2018
by   Matteo Signorini, et al.
0

Anomaly detection tools play a role of paramount importance in protecting networks and systems from unforeseen attacks, usually by automatically recognizing and filtering out anomalous activities. Over the years, different approaches have been designed, all focused on lowering the false positive rate. However, no proposal has addressed attacks targeting blockchain-based systems. In this paper we present BAD: the first Blockchain Anomaly Detection solution. BAD leverages blockchain meta-data, named forks, in order to collect potentially malicious activities in the network/system. BAD enjoys the following features: (i) it is distributed (thus avoiding any central point of failure), (ii) it is tamper-proof (making not possible for a malicious software to remove or to alter its own traces), (iii) it is trusted (any behavioral data is collected and verified by the majority of the network) and (iv) it is private (avoiding any third party to collect/analyze/store sensitive information). Our proposal is validated via both experimental results and theoretical complexity analysis, that highlight the quality and viability of our Blockchain Anomaly Detection solution.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/15/2020

Securing Manufacturing Using Blockchain

Due to the rise of Industrial Control Systems (ICSs) cyber-attacks in th...
research
12/11/2021

Anomaly Detection in Blockchain Networks: A Comprehensive Survey

Over the past decade, blockchain technology has attracted a huge attenti...
research
11/11/2019

RAD: On-line Anomaly Detection for Highly Unreliable Data

Classification algorithms have been widely adopted to detect anomalies f...
research
12/25/2022

Anomaly Detection of Underwater Gliders Verified by Deployment Data

This paper utilizes an anomaly detection algorithm to check if underwate...
research
04/14/2022

Detecting Anomalous LAN Activities under Differential Privacy

Anomaly detection has emerged as a popular technique for detecting malic...
research
11/02/2018

An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets

Botnets (networks of compromised computers) are often used for malicious...
research
06/03/2021

Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks

Motivated by the recent surge of criminal activities with cross-cryptocu...

Please sign up or login with your details

Forgot password? Click here to reset