Abstract
Distributed Ledger technologies are becoming a standard for the management of online transactions, mainly due to their capability to ensure data privacy, trustworthiness and security. Still, they are not immune to security issues, as witnessed by recent successful cyber-attacks. Under a statistical perspective, attacks can be characterized as anomalous observations concerning the underlying activity. In this work, we propose an Ensemble Deep Learning approach to detect deviant behaviors on Blockchain where the base learner, an encoder-decoder model, is strengthened by iteratively learning and aggregating multiple instances, to compute an outlier score for each observation. Our experiments on historical logs of the Ethereum Classic network and synthetic data prove the capability of our model to effectively detect cyber-attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on Ethereum smart contracts (SoK). In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 164–186. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54455-6_8
Bogner, A.: Seeing is understanding: anomaly detection in blockchains with visualized features. In: UbiComp 2017, pp. 5–8. ACM (2017)
Corizzo, R., Ceci, M., Japkowicz, N.: Anomaly detection and repair for accurate predictions in geo-distributed big data. Big Data Res. 16, 18–35 (2019)
Dey, S.: Securing majority-attack in blockchain using machine learning and algorithmic game theory: a proof of work. CoRR, abs/1806.05477 (2018)
El Ioini, N., Pahl, C.: A review of distributed ledger technologies. In: Panetto, H., Debruyne, C., Proper, H.A., Ardagna, C.A., Roman, D., Meersman, R. (eds.) OTM 2018. LNCS, vol. 11230, pp. 277–288. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-02671-4_16
Graves, A.: Supervised Sequence Labelling with Recurrent Neural Networks. SCI, vol. 385. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-24797-2
Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)
Huang, G., Li, Y., Pleiss, G., Liu, Z., Hopcroft, J.E., Weinberger, K.Q.: Snapshot ensembles: train 1, get M for free. In: 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, 24–26 April 2017, Conference Track Proceedings (2017)
Munir, M., Siddiqui, M.S.A., Dengel, A., Ahmed, S.: DeepAnT: a deep learning approach for unsupervised anomaly detection in time series. IEEE Access 7, 1991–2005 (2018)
Scicchitano, F., Liguori, A., Guarascio, M., Ritacco, E., Manco, G.: A deep learning approach for detecting security attacks on blockchain. In: Italian Conference on Cybersecurity, ITASEC (2020). CEUR-WS, http://ceur-ws.org/Vol-2597/paper-19.pdf
Ye, C., Li, G., Cai, H., Gu, Y., Fukuda, A.: Analysis of security in blockchain: case study in 51%-attack detecting. In: 2018 5th International Conference on Dependable Systems and Their Applications (DSA), pp. 15–24 (2018)
Acknowledgment
This work has been partially supported by MIUR - PON Research and Innovation 2014–2020 under project Secure Open Nets.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Scicchitano, F., Liguori, A., Guarascio, M., Ritacco, E., Manco, G. (2020). Deep Autoencoder Ensembles for Anomaly Detection on Blockchain. In: Helic, D., Leitner, G., Stettinger, M., Felfernig, A., RaÅ›, Z.W. (eds) Foundations of Intelligent Systems. ISMIS 2020. Lecture Notes in Computer Science(), vol 12117. Springer, Cham. https://doi.org/10.1007/978-3-030-59491-6_43
Download citation
DOI: https://doi.org/10.1007/978-3-030-59491-6_43
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59490-9
Online ISBN: 978-3-030-59491-6
eBook Packages: Computer ScienceComputer Science (R0)