Skip to main content

Deep Autoencoder Ensembles for Anomaly Detection on Blockchain

  • Conference paper
  • First Online:
Foundations of Intelligent Systems (ISMIS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 12117))

Included in the following conference series:

Abstract

Distributed Ledger technologies are becoming a standard for the management of online transactions, mainly due to their capability to ensure data privacy, trustworthiness and security. Still, they are not immune to security issues, as witnessed by recent successful cyber-attacks. Under a statistical perspective, attacks can be characterized as anomalous observations concerning the underlying activity. In this work, we propose an Ensemble Deep Learning approach to detect deviant behaviors on Blockchain where the base learner, an encoder-decoder model, is strengthened by iteratively learning and aggregating multiple instances, to compute an outlier score for each observation. Our experiments on historical logs of the Ethereum Classic network and synthetic data prove the capability of our model to effectively detect cyber-attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://ethereumclassic.org/.

  2. 2.

    See http://tiny.cc/fri3iz.

  3. 3.

    https://bit.ly/32QRz00.

  4. 4.

    https://github.com/francescoscicchitano/Anomaly_Detection_On_Blockchain.

  5. 5.

    http://shorturl.at/giz14.

  6. 6.

    https://bit.ly/30Qs9P8.

  7. 7.

    http://cryptonomist.ch/2019/01/07/ethereum-classic-attacco-del-51/.

References

  1. Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on Ethereum smart contracts (SoK). In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 164–186. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54455-6_8

    Chapter  Google Scholar 

  2. Bogner, A.: Seeing is understanding: anomaly detection in blockchains with visualized features. In: UbiComp 2017, pp. 5–8. ACM (2017)

    Google Scholar 

  3. Corizzo, R., Ceci, M., Japkowicz, N.: Anomaly detection and repair for accurate predictions in geo-distributed big data. Big Data Res. 16, 18–35 (2019)

    Article  Google Scholar 

  4. Dey, S.: Securing majority-attack in blockchain using machine learning and algorithmic game theory: a proof of work. CoRR, abs/1806.05477 (2018)

    Google Scholar 

  5. El Ioini, N., Pahl, C.: A review of distributed ledger technologies. In: Panetto, H., Debruyne, C., Proper, H.A., Ardagna, C.A., Roman, D., Meersman, R. (eds.) OTM 2018. LNCS, vol. 11230, pp. 277–288. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-02671-4_16

    Chapter  Google Scholar 

  6. Graves, A.: Supervised Sequence Labelling with Recurrent Neural Networks. SCI, vol. 385. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-24797-2

    Book  MATH  Google Scholar 

  7. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)

    Article  Google Scholar 

  8. Huang, G., Li, Y., Pleiss, G., Liu, Z., Hopcroft, J.E., Weinberger, K.Q.: Snapshot ensembles: train 1, get M for free. In: 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, 24–26 April 2017, Conference Track Proceedings (2017)

    Google Scholar 

  9. Munir, M., Siddiqui, M.S.A., Dengel, A., Ahmed, S.: DeepAnT: a deep learning approach for unsupervised anomaly detection in time series. IEEE Access 7, 1991–2005 (2018)

    Article  Google Scholar 

  10. Scicchitano, F., Liguori, A., Guarascio, M., Ritacco, E., Manco, G.: A deep learning approach for detecting security attacks on blockchain. In: Italian Conference on Cybersecurity, ITASEC (2020). CEUR-WS, http://ceur-ws.org/Vol-2597/paper-19.pdf

  11. Ye, C., Li, G., Cai, H., Gu, Y., Fukuda, A.: Analysis of security in blockchain: case study in 51%-attack detecting. In: 2018 5th International Conference on Dependable Systems and Their Applications (DSA), pp. 15–24 (2018)

    Google Scholar 

Download references

Acknowledgment

This work has been partially supported by MIUR - PON Research and Innovation 2014–2020 under project Secure Open Nets.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Massimo Guarascio .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Scicchitano, F., Liguori, A., Guarascio, M., Ritacco, E., Manco, G. (2020). Deep Autoencoder Ensembles for Anomaly Detection on Blockchain. In: Helic, D., Leitner, G., Stettinger, M., Felfernig, A., RaÅ›, Z.W. (eds) Foundations of Intelligent Systems. ISMIS 2020. Lecture Notes in Computer Science(), vol 12117. Springer, Cham. https://doi.org/10.1007/978-3-030-59491-6_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59491-6_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59490-9

  • Online ISBN: 978-3-030-59491-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics