Abstract
The Ethereum consensus layer provides the Proof of Stake (PoS) consensus algorithm with the beacon chain for the Ethereum blockchain network. However, the beacon chain is proved vulnerable to consensus-targeted attacks, which are difficult to detect. To address this issue, blockchain developers require an interactive tool to identify and mitigate potential security threats. Currently, most blockchain visualization solutions only display client logs or transaction records, making responding quickly to security threats challenging. This paper introduces the first visual analytics solution for security threat awareness on the Ethereum consensus layer. We cooperate with blockchain experts and investigate a top-down exploration approach, providing an overview of the general security level, as well as detailed consensus achievements in each slot. Our visual system lets users discover specific outcomes of the consensus execution and identify anomalies in the beacon chain historical data. Furthermore, the system includes two case studies of actual attacks to help developers better understand and mitigate potential security threats.
Graphical abstract
Similar content being viewed by others
References
Buterin V, et al. (2014) A next-generation smart contract and decentralized application platform. white paper, 3(37):2–1
Buterin V, et al. (2020) Combining ghost and Casper. arXiv:2003.03052
Buterin V, Griffith V (2017) Casper the friendly finality gadget. arXiv:1710.09437
Casola V, De Benedictis A, Riccio A, Rivera D, Mallouli W, de Oca EM (2019) A security monitoring system for internet of things. Internet of Things 7:100080
Chan W, Olmsted A (2017) Ethereum transaction graph analysis. In: International conference for internet technology and secured transactions (ICITST), pp. 498–500. IEEE
Cheng S, Zhong W, Isaacs KE, Mueller K (2018) Visualizing the topology and data traffic of multi-dimensional torus interconnect networks. IEEE Access 6:57191–57204
Deirmentzoglou E, Papakyriakopoulos G, Patsakis C (2019) A survey on long-range attacks for proof of stake protocols. IEEE Access 7:28712–28725
Di Battista G, Di Donato V, Patrignani M, Pizzonia M, Roselli V, Tamassia R (2015) Bitconeview: visualization of flows in the bitcoin transaction graph. In: Proc. VizSec, pp. 1–8. IEEE
Fleder M, Kester MS, Pillai S (2015) Bitcoin transaction graph analysis. Computer Systems Security
Goodall JR et al (2019) Situ: Identifying and explaining suspicious behavior in networks. IEEE Trans Visual Comput Gr 25(1):204–214
jmcook.eth (2023) Ethereum PoS Attack and Defense. https://mirror.xyz/jmcook.eth/YqHargbVWVNRQqQpVpzrqEQ8IqwNUJDIpwRP7SS5FXs. (Online; Accessed)
Joachim Neu DT (2023) Ertem Nusret Tas. Avalanche Attack on Proof-of-Stake GHOST. https://ethresear.ch/t/avalanche-attack-on-proof-of-stake-ghost/11854. (Online; Accessed)
Kam-Kwai W, Wang X, Wang Y, He J, Zhang R, Qu H (2023) Anchorage: Visual analysis of satisfaction in customer service videos via anchor events. IEEE Transactions on Visualization and Computer Graphics
Lin Y et al (2021) Taxthemis: Interactive mining and exploration of suspicious tax evasion groups. IEEE Trans Visual Comput Gr 27(2):849–859
Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, p. 21260
Nakamura R (2023a) Analysis of bouncing attack on FFG. https://ethresear.ch/t/analysis-of-bouncing-attack-on-ffg/6113. (Online; Accessed)
Nakamura R (2023b) Prevention of bouncing attack on FFG. https://ethresear.ch/t/prevention-of-bouncing-attack-on-ffg/6114. (Online; Accessed)
Neu J (2023a) A balancing attack on Gasper. https://ethresear.ch/t/a-balancing-attack-on-gasper-the-current-candidate-for-eth2s-beacon-chain/8079. (Online; Accessed)
Neu J (2023b) Attacking Gasper without adversarial network delay. https://ethresear.ch/t/attacking-gasper-without-adversarial-network-delay/10187. (Online; Accessed)
Neuder M, Moroz DJ, Rao R, Parkes DC (2021) Low-cost attacks on ethereum 2.0 by sub-1/3 stakeholders. arXiv:2102.02247
Otsuki K, Nakamura R, Shudo K (2021) Impact of saving attacks on blockchain consensus. IEEE Access 9:133011–133022
Pham V, Dang T (2018) Cvexplorer: Multidimensional visualization for common vulnerabilities and exposures. In: IEEE International Conference on Big Data (Big Data), pp. 1296–1301
Putz B, Böhm F, Pernul G (2021) Hypersec: Visual analytics for blockchain security monitoring. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 165–180. Springer
Samreen NF, Alalfi MH (2021) A survey of security vulnerabilities in ethereum smart contracts. arXiv preprint arXiv:2105.06974
Shiravi H, Shiravi A, Ghorbani AA (2012) A survey of visualization systems for network security. IEEE Trans Visual Comput Gr 18(8):1313–1329
Simmonds A, Sandilands P, Ekert LV (2004) An ontology for network security attacks. In: Asian applied computing conference, pp. 317–323. Springer
Sun Y, Xiong H, Yiu SM, Lam KY (2019) Bitvis: An interactive visualization system for bitcoin accounts analysis. In: 2019 Crypto Valley conference on blockchain technology (CVCBT), pp. 21–25. IEEE
The Bitcoin Big Bang (2023) https://info.elliptic.co/hubfs/big-bang/bigbang-v1.html. (Online; Accessed)
Tovanich N, Soulié N, Heulot N, Isenberg P (2021) Miningvis: Visual analytics of the bitcoin mining economy. IEEE Trans Visual Comput Gr 28(1):868–878
TxStreet (2023) https://txstreet.com/v/eth. (Online; Accessed)
Wang R, Liu H, Wang H, Yang Q, Wu D (2019) Distributed security architecture based on blockchain for connected health: Architecture, challenges, and approaches. IEEE Wireless Commun 26(6):30–36
Wan Y, Xu K, Xue G, Wang F (2020) Iotargos: A multi-layer security monitoring system for internet-of-things in smart homes. In: INFOCOM Conference on Computer Communications, pp. 874–883. IEEE
Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32
Xia J-Z et al (2020) Supoolvisor: a visual analytics system for mining pool surveillance. Front Inf Technol Electr Eng 21(4):507–523
Yue X, Shu X, Zhu X, Du X, Yu Z, Papadopoulos D, Liu S (2018) Bitextract: Interactive visualization for extracting bitcoin exchange intelligence. Trans Visual Comput Gr 25(1):162–171
Zhao Y et al (2023) ASTF: visual abstractions of time-varying patterns in radio signals. IEEE Trans Visual Comput Gr 29(1):214–224
Zhao Y, Lv S, Long W, Fan Y, Yuan J, Jiang H, Zhou F (2023) Malicious webshell family dataset for webshell multi-classification research. Visual Informatics
Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: International congress on big data (BigData congress), pp. 557–564. IEEE
Zhou J et al (2023) Dpviscreator: Incorporating pattern constraints to privacy-preserving visualizations via differential privacy. IEEE Trans Visual Comput Gr 29(1):809–819
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Chen, X., Zhang, X., Wang, Z. et al. Visual analytics for security threats detection in Ethereum consensus layer. J Vis (2024). https://doi.org/10.1007/s12650-024-00969-z
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12650-024-00969-z