Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties

06/25/2021
by   Rohit Kumar Sachan, et al.
0

The rise in the adoption of blockchain technology has led to increased illegal activities by cyber-criminals costing billions of dollars. Many machine learning algorithms are applied to detect such illegal behavior. These algorithms are often trained on the transaction behavior and, in some cases, trained on the vulnerabilities that exist in the system. In our approach, we study the feasibility of using metadata such as Domain Name (DN) associated with the account in the blockchain and identify whether an account should be tagged malicious or not. Here, we leverage the temporal aspects attached to the DNs. Our results identify 144930 DNs that show malicious behavior, and out of these, 54114 DNs show persistent malicious behavior over time. Nonetheless, none of these identified malicious DNs were reported in new officially tagged malicious blockchain DNs.

READ FULL TEXT

page 9

page 11

research
08/26/2021

Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain

The decentralization, redundancy, and pseudo-anonymity features have mad...
research
07/10/2020

Detecting Malicious Accounts in Permissionless Blockchains using Temporal Graph Properties

The temporal nature of modeling accounts as nodes and transactions as di...
research
01/28/2021

Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains

Different types of malicious activities have been flagged in multiple pe...
research
03/05/2021

Anomalicious: Automated Detection of Anomalous and Potentially Malicious Commits on GitHub

Security is critical to the adoption of open source software (OSS), yet ...
research
12/17/2022

Study on Domain Name System (DNS) Abuse: Technical Report

A safe and secure Domain Name System (DNS) is of paramount importance fo...
research
05/12/2023

The Case for the Anonymization of Offloaded Computation

Computation offloading (often to external computing resources over a net...
research
01/25/2023

Don't Lie to Me: Avoiding Malicious Explanations with STEALTH

STEALTH is a method for using some AI-generated model, without suffering...

Please sign up or login with your details

Forgot password? Click here to reset