Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains

01/28/2021
by   Rachit Agarwal, et al.
20

Different types of malicious activities have been flagged in multiple permissionless blockchains such as bitcoin, Ethereum etc. While some malicious activities exploit vulnerabilities in the infrastructure of the blockchain, some target its users through social engineering techniques. To address these problems, we aim at automatically flagging blockchain accounts that originate such malicious exploitation of accounts of other participants. To that end, we identify a robust supervised machine learning (ML) algorithm that is resistant to any bias induced by an over representation of certain malicious activity in the available dataset, as well as is robust against adversarial attacks. We find that most of the malicious activities reported thus far, for example, in Ethereum blockchain ecosystem, behaves statistically similar. Further, the previously used ML algorithms for identifying malicious accounts show bias towards a particular malicious activity which is over-represented. In the sequel, we identify that Neural Networks (NN) holds up the best in the face of such bias inducing dataset at the same time being robust against certain adversarial attacks.

READ FULL TEXT

page 8

page 10

page 12

page 13

research
07/10/2020

Detecting Malicious Accounts in Permissionless Blockchains using Temporal Graph Properties

The temporal nature of modeling accounts as nodes and transactions as di...
research
08/26/2021

Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain

The decentralization, redundancy, and pseudo-anonymity features have mad...
research
08/21/2019

Detecting Fraudulent Accounts on Blockchain: A Supervised Approach

Applications of blockchain technologies got a lot of attention in recent...
research
06/25/2021

Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties

The rise in the adoption of blockchain technology has led to increased i...
research
02/13/2020

Characterizing EOSIO Blockchain

EOSIO has become one of the most popular blockchain platforms since its ...
research
04/24/2019

A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists

This paper focuses on reporting of Internet malicious activity (or mal-a...
research
07/30/2022

BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects

Due to the open-source nature of the blockchain ecosystem, it is common ...

Please sign up or login with your details

Forgot password? Click here to reset