Vis enkel innførsel

dc.contributor.authorXu, Guangquan
dc.contributor.authorGuo, Bingjiang
dc.contributor.authorSu, Chunhua
dc.contributor.authorZheng, Xi
dc.contributor.authorLiang, Kaitai
dc.contributor.authorWong, Duncan
dc.contributor.authorWang, Hao
dc.date.accessioned2019-10-08T09:07:16Z
dc.date.available2019-10-08T09:07:16Z
dc.date.created2019-09-21T14:49:18Z
dc.date.issued2019
dc.identifier.issn0167-4048
dc.identifier.urihttp://hdl.handle.net/11250/2620806
dc.description.abstractBlockchain security has been drawing a tremendous attention from industry and academic due to its prevalence on real-world applications in these years, such as distributed blockchain-based storage systems. Since being deployed in distributed and decentralized network, blockchain applications may be vulnerable to various types of network attacks. This paper deals with “eclipse attacks” enabling a malicious actor to isolate a system user by taking control of all outgoing connections. Although being known from practical blockchain applications, eclipse attacks, so far, are hard to be detected. To solve this problem, this paper designs an eclipse-attack detection model for Ethereum platform, ETH-EDS, based on random forest classification algorithm. Specifically, via the collection and investigation over the normal and attack data packets (across the network), we find out that the information in the attack packets includes the tags packets_size, access_frequencies and access_time, which may help us effectively detect the attack. After training the data packets which we collect from the network, our ETH-EDS is able to detect malicious actor with high probability. Our experimental analysis presents evidence to show that the detection of malicious network node (i.e., the malicious actor) is with high accuracy.nb_NO
dc.language.isoengnb_NO
dc.publisherElseviernb_NO
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titleAm I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereumnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.journalComputers & securitynb_NO
dc.identifier.doi10.1016/j.cose.2019.101604
dc.identifier.cristin1727470
dc.description.localcode© 2019. This is the authors’ accepted and refereed manuscript to the article. Locked until 3.9.2021 due to copyright restrictions. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/nb_NO
cristin.unitcode194,63,10,0
cristin.unitnameInstitutt for datateknologi og informatikk
cristin.ispublishedfalse
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal