Skip to main content
Log in

Visual analytics for security threats detection in Ethereum consensus layer

  • Regular Paper
  • Published:
Journal of Visualization Aims and scope Submit manuscript

Abstract

The Ethereum consensus layer provides the Proof of Stake (PoS) consensus algorithm with the beacon chain for the Ethereum blockchain network. However, the beacon chain is proved vulnerable to consensus-targeted attacks, which are difficult to detect. To address this issue, blockchain developers require an interactive tool to identify and mitigate potential security threats. Currently, most blockchain visualization solutions only display client logs or transaction records, making responding quickly to security threats challenging. This paper introduces the first visual analytics solution for security threat awareness on the Ethereum consensus layer. We cooperate with blockchain experts and investigate a top-down exploration approach, providing an overview of the general security level, as well as detailed consensus achievements in each slot. Our visual system lets users discover specific outcomes of the consensus execution and identify anomalies in the beacon chain historical data. Furthermore, the system includes two case studies of actual attacks to help developers better understand and mitigate potential security threats.

Graphical abstract

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. https://github.com/AmbitionCX/EthVis.

  2. https://medium.com/prysmatic-labs/eth2-mainnet-incident-retrospective-f0338814340c.

  3. https://beaconcha.in/epoch/121471.

  4. https://github.com/ethereum/consensus-specs/pull/2878.

References

  • Buterin V, et al. (2014) A next-generation smart contract and decentralized application platform. white paper, 3(37):2–1

  • Buterin V, et al. (2020) Combining ghost and Casper. arXiv:2003.03052

  • Buterin V, Griffith V (2017) Casper the friendly finality gadget. arXiv:1710.09437

  • Casola V, De Benedictis A, Riccio A, Rivera D, Mallouli W, de Oca EM (2019) A security monitoring system for internet of things. Internet of Things 7:100080

    Article  Google Scholar 

  • Chan W, Olmsted A (2017) Ethereum transaction graph analysis. In: International conference for internet technology and secured transactions (ICITST), pp. 498–500. IEEE

  • Cheng S, Zhong W, Isaacs KE, Mueller K (2018) Visualizing the topology and data traffic of multi-dimensional torus interconnect networks. IEEE Access 6:57191–57204

    Article  Google Scholar 

  • Deirmentzoglou E, Papakyriakopoulos G, Patsakis C (2019) A survey on long-range attacks for proof of stake protocols. IEEE Access 7:28712–28725

    Article  Google Scholar 

  • Di Battista G, Di Donato V, Patrignani M, Pizzonia M, Roselli V, Tamassia R (2015) Bitconeview: visualization of flows in the bitcoin transaction graph. In: Proc. VizSec, pp. 1–8. IEEE

  • Fleder M, Kester MS, Pillai S (2015) Bitcoin transaction graph analysis. Computer Systems Security

  • Goodall JR et al (2019) Situ: Identifying and explaining suspicious behavior in networks. IEEE Trans Visual Comput Gr 25(1):204–214

    Article  Google Scholar 

  • jmcook.eth (2023) Ethereum PoS Attack and Defense. https://mirror.xyz/jmcook.eth/YqHargbVWVNRQqQpVpzrqEQ8IqwNUJDIpwRP7SS5FXs. (Online; Accessed)

  • Joachim Neu DT (2023) Ertem Nusret Tas. Avalanche Attack on Proof-of-Stake GHOST. https://ethresear.ch/t/avalanche-attack-on-proof-of-stake-ghost/11854. (Online; Accessed)

  • Kam-Kwai W, Wang X, Wang Y, He J, Zhang R, Qu H (2023) Anchorage: Visual analysis of satisfaction in customer service videos via anchor events. IEEE Transactions on Visualization and Computer Graphics

  • Lin Y et al (2021) Taxthemis: Interactive mining and exploration of suspicious tax evasion groups. IEEE Trans Visual Comput Gr 27(2):849–859

    Article  MathSciNet  Google Scholar 

  • Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, p. 21260

  • Nakamura R (2023a) Analysis of bouncing attack on FFG. https://ethresear.ch/t/analysis-of-bouncing-attack-on-ffg/6113. (Online; Accessed)

  • Nakamura R (2023b) Prevention of bouncing attack on FFG. https://ethresear.ch/t/prevention-of-bouncing-attack-on-ffg/6114. (Online; Accessed)

  • Neu J (2023a) A balancing attack on Gasper. https://ethresear.ch/t/a-balancing-attack-on-gasper-the-current-candidate-for-eth2s-beacon-chain/8079. (Online; Accessed)

  • Neu J (2023b) Attacking Gasper without adversarial network delay. https://ethresear.ch/t/attacking-gasper-without-adversarial-network-delay/10187. (Online; Accessed)

  • Neuder M, Moroz DJ, Rao R, Parkes DC (2021) Low-cost attacks on ethereum 2.0 by sub-1/3 stakeholders. arXiv:2102.02247

  • Otsuki K, Nakamura R, Shudo K (2021) Impact of saving attacks on blockchain consensus. IEEE Access 9:133011–133022

    Article  Google Scholar 

  • Pham V, Dang T (2018) Cvexplorer: Multidimensional visualization for common vulnerabilities and exposures. In: IEEE International Conference on Big Data (Big Data), pp. 1296–1301

  • Putz B, Böhm F, Pernul G (2021) Hypersec: Visual analytics for blockchain security monitoring. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 165–180. Springer

  • Samreen NF, Alalfi MH (2021) A survey of security vulnerabilities in ethereum smart contracts. arXiv preprint arXiv:2105.06974

  • Shiravi H, Shiravi A, Ghorbani AA (2012) A survey of visualization systems for network security. IEEE Trans Visual Comput Gr 18(8):1313–1329

    Article  Google Scholar 

  • Simmonds A, Sandilands P, Ekert LV (2004) An ontology for network security attacks. In: Asian applied computing conference, pp. 317–323. Springer

  • Sun Y, Xiong H, Yiu SM, Lam KY (2019) Bitvis: An interactive visualization system for bitcoin accounts analysis. In: 2019 Crypto Valley conference on blockchain technology (CVCBT), pp. 21–25. IEEE

  • The Bitcoin Big Bang (2023) https://info.elliptic.co/hubfs/big-bang/bigbang-v1.html. (Online; Accessed)

  • Tovanich N, Soulié N, Heulot N, Isenberg P (2021) Miningvis: Visual analytics of the bitcoin mining economy. IEEE Trans Visual Comput Gr 28(1):868–878

    Article  Google Scholar 

  • TxStreet (2023) https://txstreet.com/v/eth. (Online; Accessed)

  • Wang R, Liu H, Wang H, Yang Q, Wu D (2019) Distributed security architecture based on blockchain for connected health: Architecture, challenges, and approaches. IEEE Wireless Commun 26(6):30–36

    Article  Google Scholar 

  • Wan Y, Xu K, Xue G, Wang F (2020) Iotargos: A multi-layer security monitoring system for internet-of-things in smart homes. In: INFOCOM Conference on Computer Communications, pp. 874–883. IEEE

  • Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32

    Google Scholar 

  • Xia J-Z et al (2020) Supoolvisor: a visual analytics system for mining pool surveillance. Front Inf Technol Electr Eng 21(4):507–523

    Article  Google Scholar 

  • Yue X, Shu X, Zhu X, Du X, Yu Z, Papadopoulos D, Liu S (2018) Bitextract: Interactive visualization for extracting bitcoin exchange intelligence. Trans Visual Comput Gr 25(1):162–171

    Article  Google Scholar 

  • Zhao Y et al (2023) ASTF: visual abstractions of time-varying patterns in radio signals. IEEE Trans Visual Comput Gr 29(1):214–224

    Google Scholar 

  • Zhao Y, Lv S, Long W, Fan Y, Yuan J, Jiang H, Zhou F (2023) Malicious webshell family dataset for webshell multi-classification research. Visual Informatics

  • Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: International congress on big data (BigData congress), pp. 557–564. IEEE

  • Zhou J et al (2023) Dpviscreator: Incorporating pattern constraints to privacy-preserving visualizations via differential privacy. IEEE Trans Visual Comput Gr 29(1):809–819

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuan Chen.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, X., Zhang, X., Wang, Z. et al. Visual analytics for security threats detection in Ethereum consensus layer. J Vis (2024). https://doi.org/10.1007/s12650-024-00969-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12650-024-00969-z

Keywords

Navigation