Cryptocurrencies Emerging Threats and Defensive Mechanisms: A Systematic Literature Review

Cryptocurrencies have been a target for cybercriminal activities because of the pseudo-anonymity and privacy they offer. Researchers have been actively working on analyzing and developing innovative defensive mechanisms to prevent these activities. A significant challenge facing researchers is colle...

Full description

Bibliographic Details
Main Authors: Emad Badawi, Guy-Vincent Jourdan
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9243940/
id doaj-4d41cbde8c5e417f92b4f17b2202496b
record_format Article
spelling doaj-4d41cbde8c5e417f92b4f17b2202496b2021-03-30T03:50:49ZengIEEEIEEE Access2169-35362020-01-01820002120003710.1109/ACCESS.2020.30348169243940Cryptocurrencies Emerging Threats and Defensive Mechanisms: A Systematic Literature ReviewEmad Badawi0https://orcid.org/0000-0001-9336-8012Guy-Vincent Jourdan1Faculty of Engineering, University of Ottawa, Ottawa, CanadaFaculty of Engineering, University of Ottawa, Ottawa, CanadaCryptocurrencies have been a target for cybercriminal activities because of the pseudo-anonymity and privacy they offer. Researchers have been actively working on analyzing and developing innovative defensive mechanisms to prevent these activities. A significant challenge facing researchers is collecting datasets to train defensive systems to detect and analyze these cyberattacks. Our aims in this systematic review are to explore and aggregate the state of the art threats that have emerged with cryptocurrencies and the defensive mechanisms that have been proposed. We also discuss the threats type, scale, and how efficient the defensive mechanisms are in providing early detection and prevention. We also list out the resources that have been used to collect datasets, and we identify the publicly available ones. In this study, we extracted 1,221 articles from four top scientific and engineering databases and libraries in Computer Science: IEEE Xplore, ACM Digital Library, Elsevier's Scopus, and Crarivate's Web of Science. We defined inclusion, exclusion, and quality of assessment criteria, and after a detailed review process, 66 publications were included in the final review. Our analysis revealed that the literature contains a significant amount of research to detect and analyze several attack types, such as the high yield investment programs and pump and dump. These attacks have been used to steal millions of USD, abuse millions of connected devices, and have created even more significant loss in denial of services and productivity losses. We have found that the researchers use various sources to collect training datasets. Many authors have made their dataset publicly available. We have created a list of these datasets, which we have made available along with other supplementary websites, tools, and libraries that can be used in the data collection and analysis process.https://ieeexplore.ieee.org/document/9243940/BlockchaincryptocurrencycryptojackingcyberattackfraudHYIP
collection DOAJ
language English
format Article
sources DOAJ
author Emad Badawi
Guy-Vincent Jourdan
spellingShingle Emad Badawi
Guy-Vincent Jourdan
Cryptocurrencies Emerging Threats and Defensive Mechanisms: A Systematic Literature Review
IEEE Access
Blockchain
cryptocurrency
cryptojacking
cyberattack
fraud
HYIP
author_facet Emad Badawi
Guy-Vincent Jourdan
author_sort Emad Badawi
title Cryptocurrencies Emerging Threats and Defensive Mechanisms: A Systematic Literature Review
title_short Cryptocurrencies Emerging Threats and Defensive Mechanisms: A Systematic Literature Review
title_full Cryptocurrencies Emerging Threats and Defensive Mechanisms: A Systematic Literature Review
title_fullStr Cryptocurrencies Emerging Threats and Defensive Mechanisms: A Systematic Literature Review
title_full_unstemmed Cryptocurrencies Emerging Threats and Defensive Mechanisms: A Systematic Literature Review
title_sort cryptocurrencies emerging threats and defensive mechanisms: a systematic literature review
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description Cryptocurrencies have been a target for cybercriminal activities because of the pseudo-anonymity and privacy they offer. Researchers have been actively working on analyzing and developing innovative defensive mechanisms to prevent these activities. A significant challenge facing researchers is collecting datasets to train defensive systems to detect and analyze these cyberattacks. Our aims in this systematic review are to explore and aggregate the state of the art threats that have emerged with cryptocurrencies and the defensive mechanisms that have been proposed. We also discuss the threats type, scale, and how efficient the defensive mechanisms are in providing early detection and prevention. We also list out the resources that have been used to collect datasets, and we identify the publicly available ones. In this study, we extracted 1,221 articles from four top scientific and engineering databases and libraries in Computer Science: IEEE Xplore, ACM Digital Library, Elsevier's Scopus, and Crarivate's Web of Science. We defined inclusion, exclusion, and quality of assessment criteria, and after a detailed review process, 66 publications were included in the final review. Our analysis revealed that the literature contains a significant amount of research to detect and analyze several attack types, such as the high yield investment programs and pump and dump. These attacks have been used to steal millions of USD, abuse millions of connected devices, and have created even more significant loss in denial of services and productivity losses. We have found that the researchers use various sources to collect training datasets. Many authors have made their dataset publicly available. We have created a list of these datasets, which we have made available along with other supplementary websites, tools, and libraries that can be used in the data collection and analysis process.
topic Blockchain
cryptocurrency
cryptojacking
cyberattack
fraud
HYIP
url https://ieeexplore.ieee.org/document/9243940/
work_keys_str_mv AT emadbadawi cryptocurrenciesemergingthreatsanddefensivemechanismsasystematicliteraturereview
AT guyvincentjourdan cryptocurrenciesemergingthreatsanddefensivemechanismsasystematicliteraturereview
_version_ 1724182737100734464