2023
DOI: 10.3390/a16080366
|View full text |Cite
|
Sign up to set email alerts
|

Machine-Learning Techniques for Predicting Phishing Attacks in Blockchain Networks: A Comparative Study

Abstract: Security in the blockchain has become a topic of concern because of the recent developments in the field. One of the most common cyberattacks is the so-called phishing attack, wherein the attacker tricks the miner into adding a malicious block to the chain under genuine conditions to avoid detection and potentially destroy the entire blockchain. The current attempts at detection include the consensus protocol; however, it fails when a genuine miner tries to add a new block to the blockchain. Zero-trust policie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Zero-trust policies are gradually being introduced as a method, but their deployment is still ongoing and requires a considerable amount of time. A more accurate approach to phishing attack detection involves the use of machine learning models with specific features to automatically classify attempts as phishing attacks or legitimate ones [135]. In the context of preventing phishing attacks in blockchain, federated decision trees may be employed to consolidate information from various miners or nodes, collaboratively constructing a model capable of identifying phishing attacks.…”
Section: Discussionmentioning
confidence: 99%
“…Zero-trust policies are gradually being introduced as a method, but their deployment is still ongoing and requires a considerable amount of time. A more accurate approach to phishing attack detection involves the use of machine learning models with specific features to automatically classify attempts as phishing attacks or legitimate ones [135]. In the context of preventing phishing attacks in blockchain, federated decision trees may be employed to consolidate information from various miners or nodes, collaboratively constructing a model capable of identifying phishing attacks.…”
Section: Discussionmentioning
confidence: 99%
“…This research employed well-established evaluation metrics, including accuracy, fmeasure, the area under the curve (AUC), and Matthew's correlation coefficient (MCC), to assess and contrast the predictive capabilities of the various investigated models. The selection of these performance indicators was based on their frequent utilization in prior studies in the assessment of rule-based and ML-based software risk prediction models [43][44][45]. Furthermore, these metrics are reported to be dependable collectively, as they consider all areas of the confusion matrix produced for each developed model [46,47].…”
Section: Methodsmentioning
confidence: 99%
“…Deep learning (DL) algorithms exhibit potential superiority over ML counterparts, as evidenced by the exceptional performance of models like bidirectional encoder representations from transformers (BERT) and long short-term memory (LSTM) in phishing detection [25]. However, not all DL algorithms fare better, as demonstrated by Joshi et al [26], highlighting the need for a nuanced comparison against other methodologies like Random Forest (RF) and Extreme Gradient Boost (XG Boost).…”
Section: Related Workmentioning
confidence: 99%