|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
Abstract
Due to the variety of applications it can be used for and the potential for disruption, block chain technology has attracted a lot of attention. One of the main reasons block chain is so popular is due to its distinctive structure: it is described as a computerized log file and kept as a series of connected groups, or blocks, and employs peer-to-peer networks and registers to keep transactions. In this paper, we define an encoder-decoder deep learning model-based anomaly detection system that is trained using aggregate data acquired by observing block chain activity. The effectiveness of our methodology in identifying attacks that have been disclosed publicly has been demonstrated through experiments on the whole history logs of the Ethereum Classic network. As far as we are aware, our strategy is the first to offer a complete and workable method to monitor the security of block chain transactions.
Keyword
Block chain, Attacks, Cyber security, Vulnerability, Anomaly detection
PDF Download (click here)
|
|
|
|
|