BAD: A Blockchain Anomaly Detection Solution

Anomaly detection tools play a role of paramount importance in protecting networks and systems from unforeseen attacks, usually by automatically recognizing and filtering out anomalous activities. Over the years, different approaches have been designed, all focused on lowering the false positive rat...

Full description

Bibliographic Details
Main Authors: Matteo Signorini, Matteo Pontecorvi, Wael Kanoun, Roberto Di Pietro
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9201454/
id doaj-ddd4bf7b24d94bfdaf97c6f52096499e
record_format Article
spelling doaj-ddd4bf7b24d94bfdaf97c6f52096499e2021-03-30T03:57:20ZengIEEEIEEE Access2169-35362020-01-01817348117349010.1109/ACCESS.2020.30256229201454BAD: A Blockchain Anomaly Detection SolutionMatteo Signorini0Matteo Pontecorvi1Wael Kanoun2Roberto Di Pietro3https://orcid.org/0000-0003-1909-0336NOKIA Bell Labs, Nozay, FranceNOKIA Bell Labs, Nozay, FranceThales, Dubai, UAECollege of Science and Engineering, ICT Division, Hamad Bin Khalifa University, Doha, QatarAnomaly detection tools play a role of paramount importance in protecting networks and systems from unforeseen attacks, usually by automatically recognizing and filtering out anomalous activities. Over the years, different approaches have been designed, all focused on lowering the false positive rate. However, no proposal has addressed attacks specifically targeting blockchain-based systems. In this paper, we present BAD: Blockchain Anomaly Detection. This is the first solution, to the best of our knowledge, that is tailored to detect anomalies in blockchain-based systems. BAD is a complete framework, relying on several components leveraging, at its core, blockchain meta-data in order to collect potentially malicious activities. BAD enjoys some unique features: (i) it is distributed (thus avoiding any central point of failure); (ii) it is tamper-proof (making it impossible for a malicious software to remove or to alter its own traces); (iii) it is trusted (any behavioral data is collected and verified by the majority of the network); and, (iv) it is private (avoiding any third party to collect/analyze/store sensitive information). Our proposal is described in detail and validated via both experimental results and analysis, that highlight the quality and viability of our Blockchain Anomaly Detection solution.https://ieeexplore.ieee.org/document/9201454/Blockchain technologysecurityintrusion detection systemsdistributed systems
collection DOAJ
language English
format Article
sources DOAJ
author Matteo Signorini
Matteo Pontecorvi
Wael Kanoun
Roberto Di Pietro
spellingShingle Matteo Signorini
Matteo Pontecorvi
Wael Kanoun
Roberto Di Pietro
BAD: A Blockchain Anomaly Detection Solution
IEEE Access
Blockchain technology
security
intrusion detection systems
distributed systems
author_facet Matteo Signorini
Matteo Pontecorvi
Wael Kanoun
Roberto Di Pietro
author_sort Matteo Signorini
title BAD: A Blockchain Anomaly Detection Solution
title_short BAD: A Blockchain Anomaly Detection Solution
title_full BAD: A Blockchain Anomaly Detection Solution
title_fullStr BAD: A Blockchain Anomaly Detection Solution
title_full_unstemmed BAD: A Blockchain Anomaly Detection Solution
title_sort bad: a blockchain anomaly detection solution
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description Anomaly detection tools play a role of paramount importance in protecting networks and systems from unforeseen attacks, usually by automatically recognizing and filtering out anomalous activities. Over the years, different approaches have been designed, all focused on lowering the false positive rate. However, no proposal has addressed attacks specifically targeting blockchain-based systems. In this paper, we present BAD: Blockchain Anomaly Detection. This is the first solution, to the best of our knowledge, that is tailored to detect anomalies in blockchain-based systems. BAD is a complete framework, relying on several components leveraging, at its core, blockchain meta-data in order to collect potentially malicious activities. BAD enjoys some unique features: (i) it is distributed (thus avoiding any central point of failure); (ii) it is tamper-proof (making it impossible for a malicious software to remove or to alter its own traces); (iii) it is trusted (any behavioral data is collected and verified by the majority of the network); and, (iv) it is private (avoiding any third party to collect/analyze/store sensitive information). Our proposal is described in detail and validated via both experimental results and analysis, that highlight the quality and viability of our Blockchain Anomaly Detection solution.
topic Blockchain technology
security
intrusion detection systems
distributed systems
url https://ieeexplore.ieee.org/document/9201454/
work_keys_str_mv AT matteosignorini badablockchainanomalydetectionsolution
AT matteopontecorvi badablockchainanomalydetectionsolution
AT waelkanoun badablockchainanomalydetectionsolution
AT robertodipietro badablockchainanomalydetectionsolution
_version_ 1724182568239104000