2022
DOI: 10.1109/tnsm.2022.3173598
|View full text |Cite
|
Sign up to set email alerts
|

A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 38 publications
0
9
0
Order By: Relevance
“…Most of the research studies analysis anomalies in ledger applications, cryptocurrencies, and specific types of attacks like DoS, Sybil or Double Spending etc. A machine learning‐based security technique using Blockchain network traffic statistics is attempted in Reference 97. The presented method consists of two phases, data collection, and anomaly detection.…”
Section: Resultsmentioning
confidence: 99%
“…Most of the research studies analysis anomalies in ledger applications, cryptocurrencies, and specific types of attacks like DoS, Sybil or Double Spending etc. A machine learning‐based security technique using Blockchain network traffic statistics is attempted in Reference 97. The presented method consists of two phases, data collection, and anomaly detection.…”
Section: Resultsmentioning
confidence: 99%
“… Kim et al. 179 NN-DTW A grid of 1800 trade prices is used to calculate intraday realized volatility over a 30min trade by trade moving window. The NN DTW model correctly identifies 90% of suspected illegal transactions in the validation sample and achieves a type I error rate of 38% on average.…”
Section: Overview Of Cryptocurrencymentioning
confidence: 99%
“…Kim et al. 179 proposed a security mechanism based on analyzing blockchain network traffic statistics to detect malicious events through data collection and anomaly detection functions.…”
Section: Deep Learning In Cryptocurrencymentioning
confidence: 99%
“…The L-space approach refers to the construction of an L-space network, which is based on an actual geospatial network with major road intersections as nodes and traffic lines as edges [14][15]. In contrast to the L-space approach, the P-space approach considers traffic lines as nodes of the network and urban areas as edges.…”
Section: Line Network Structure Constructionmentioning
confidence: 99%