Fortifying the Blockchain Fortress: A Machine Learning Paradigm for Enhanced Security

Year : 2024 | Volume :11 | Issue : 02 | Page : –
By

Ramya B. N.,

Vani,

Ushashri Gunti,

Tara V. K.,

Hina Nazneen,

  1. Assistant Professor Department of Artificial Intelligence and Machine Learning, Jyothy Institute of Technology, Bharath Karnataka India
  2. Student Department of Information Science and Engineering, City Engineering College, Bengaluru Karnataka India
  3. Assistant Professor Department of Artificial Intelligence and Machine Learning, Jyothy Institute of Technology, Bharath Karnataka India
  4. Student Department of Computer Science and Engineering, City Engineering College, Bengaluru Karnataka India
  5. Student Department of Computer Science and Engineering, City Engineering College, Bengaluru Karnataka India

Abstract

Blockchain technology has emerged as a revolutionary tool in the digital landscape, enabling secure and transparent transactions across a decentralized network. Despite its robust security features, blockchain systems remain vulnerable to anomalies and malicious activities. The detection of these anomalies using machine learning has become essential for protecting blockchain networks and ensuring their integrity.
This project delves into the application of machine learning techniques to detect abnormal patterns within blockchain data, with a specific focus on utilizing the XGBoost classifier. By analyzing large volumes of blockchain transactions, the XGBoost classifier is employed to identify irregularities that could indicate potential security threats. Our approach achieved an accuracy of 84%, demonstrating the efficacy of machine learning in detecting and mitigating these threats.
Furthermore, this research underscores the pivotal role of machine learning in enhancing the resilience and reliability of blockchain networks. By proactively identifying anomalies, machine learning helps to maintain the trustworthiness and stability of blockchain systems, contributing to a safer digital ecosystem. The findings of this project not only highlight the importance of advanced analytics in cybersecurity but also pave the way for future innovations in safeguarding decentralized technologies.

Keywords: blockchain networks, Machine learning, XGBoost classifier, Anamoly detection, blockchain transactions, Artificial Intelligence

[This article belongs to Journal of Artificial Intelligence Research & Advances(joaira)]

How to cite this article: Ramya B. N., Vani, Ushashri Gunti, Tara V. K., Hina Nazneen. Fortifying the Blockchain Fortress: A Machine Learning Paradigm for Enhanced Security. Journal of Artificial Intelligence Research & Advances. 2024; 11(02):-.
How to cite this URL: Ramya B. N., Vani, Ushashri Gunti, Tara V. K., Hina Nazneen. Fortifying the Blockchain Fortress: A Machine Learning Paradigm for Enhanced Security. Journal of Artificial Intelligence Research & Advances. 2024; 11(02):-. Available from: https://journals.stmjournals.com/joaira/article=2024/view=155824



References

  1. Ahmad H, Kasasbeh B, Aldabaybah B, Rawashdeh E. Class balancing framework for credit card fraud detection based on clustering and similarity-based selection (SBS). International Journal of Information Technology. 2023 Jan;15(1):325-33.
  2. Ahmed F, Hasan M, Hossain MS, Andersson K. Comparative performance of tree based machine learning classifiers in product backorder prediction. InInternational Conference on Intelligent Computing & Optimization 2022 Oct 21 (pp. 572-584). Cham: Springer International Publishing.
  3. Ahsan R, Shi W, Ma X, Lee Croft W. A comparative analysis of CGAN‐based oversampling for anomaly detection. IET Cyber‐Physical Systems: Theory & Applications. 2022 Mar;7(1):40-50.
  4. Alarab I, Prakoonwit S. Effect of data resampling on feature importance in imbalanced blockchain data: Comparison studies of resampling techniques. Data Science and Management. 2022 Jun 1;5(2):66-76.
  5. Alarab I, Prakoonwit S, Nacer MI. Comparative analysis using supervised learning methods for anti-money laundering in bitcoin. InProceedings of the 2020 5th international conference on machine learning technologies 2020 Jun 19 (pp. 11-17).
  6. Alsowail RA. An insider threat detection model using one-hot encoding and near-miss under-sampling techniques. InProceedings of International Joint Conference on Advances in Computational Intelligence: IJCACI 2021 2022 May 19 (pp. 183-196). Singapore: Springer Nature Singapore.
  7. Arya GD, Harika KV, Rahul DV, Narasimhan S, Ashok A. Analysis of unsupervised learning algorithms for anomaly mining with Bitcoin. InMachine Intelligence and Smart Systems: Proceedings of MISS 2020 2021 (pp. 365-373). Springer Singapore.
  8. Ashfaq T, Khalid R, Yahaya AS, Aslam S, Azar AT, Alsafari S, Hameed IA. A machine learning and blockchain based efficient fraud detection mechanism. Sensors. 2022 Sep 21;22(19):7162.
  9. Biau G, Scornet E. A random forest guided tour. Test. 2016 Jun;25:197-227.
  10. Chen B, Wei F, Gu C. Bitcoin theft detection based on supervised machine learning algorithms. Security and Communication Networks. 2021;2021(1):6643763.
  11. Chen T, He T, Benesty M, Khotilovich V, Tang Y, Cho H, Chen K. Xgboost: extreme gradient boosting. R package version 0.4–2, 1 (4), 1–4.
  12. Chen Z, Van Khoa LD, Teoh EN, Nazir A, Karuppiah EK, Lam KS. Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: a review. Knowledge and Information Systems. 2018 Nov;57:245-85.
  13. Dornadula VN, Geetha S. Credit card fraud detection using machine learning algorithms. Procedia computer science. 2019 Jan 1;165:631-41.
  14. El Hajjami S, Malki J, Berrada M, Fourka B. Machine learning for anomaly detection. performance study considering anomaly distribution in an imbalanced dataset. In2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech) 2020 Nov 24 (pp. 1-8). IEEE.
  15. Ganganwar V. An overview of classification algorithms for imbalanced datasets. International Journal of Emerging Technology and Advanced Engineering. 2012 Apr;2(4):42-7.
  16. Gosain A, Sardana S. Handling class imbalance problem using oversampling techniques: A review. In2017 international conference on advances in computing, communications and informatics (ICACCI) 2017 Sep 13 (pp. 79-85). IEEE.
  17. Han J, Woo J, Hong JW. Oversampling techniques for detecting bitcoin illegal transactions. In2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) 2020 Sep 22 (pp. 330-333). IEEE.
  18. Hassan MU, Rehmani MH, Chen J. Anomaly detection in blockchain networks: A comprehensive survey. IEEE Communications Surveys & Tutorials. 2022 Sep 12;25(1):289-318.
  19. Hirshman J, Huang Y, Macke S. Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network. Technical report, Stanford University. 2013.
  20. Itoo F, Meenakshi, Singh S. Comparison and analysis of logistic regression, Naïve Bayes and KNN machine learning algorithms for credit card fraud detection. International Journal of Information Technology. 2021 Aug;13(4):1503-11.
  21. King JE. Binary logistic regression. Best practices in quantitative methods. 2008:358-84.
  22. Li Y, Cai Y, Tian H, Xue G, Zheng Z. Identifying illicit addresses in bitcoin network. InBlockchain and Trustworthy Systems: Second International Conference, BlockSys 2020, Dali, China, August 6–7, 2020, Revised Selected Papers 2 2020 (pp. 99-111). Springer Singapore.
  23. Liu XY, Wu J, Zhou ZH. Exploratory undersampling for class-imbalance learning. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics). 2008 Dec 16;39(2):539-50.
  24. Lorenz J, Silva MI, Aparício D, Ascensão JT, Bizarro P. Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity. InProceedings of the first ACM international conference on AI in finance 2020 Oct 15 (pp. 1-8).
  25. Lundberg SM, Lee SI. A unified approach to interpreting model predictions. Advances in neural information processing systems. 2017;30.
  26. Monamo P, Marivate V, Twala B. Unsupervised learning for robust Bitcoin fraud detection. In2016 Information Security for South Africa (ISSA) 2016 Aug 17 (pp. 129-134). IEEE.
  27. Monrat AA, Schelén O, Andersson K. A survey of blockchain from the perspectives of applications, challenges, and opportunities. Ieee Access. 2019 Aug 19;7:117134-51.
  28. Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. 2008. Available form https://assets.pubpub.org/d8wct41f/31611263538139.pdf
  29. Natekin A, Knoll A. Gradient boosting machines, a tutorial. Frontiers in neurorobotics. 2013 Dec 4;7:21.
  30. Nofer M, Gomber P, Hinz O, Schiereck D. Blockchain. Business & information systems engineering. 2017 Jun;59:183-7.
  31. Pham NT, Foo E, Suriadi S, Jeffrey H, Lahza HF. Improving performance of intrusion detection system using ensemble methods and feature selection. InProceedings of the Australasian computer science week multiconference 2018 Jan 29 (pp. 1-6).
  32. Pham T, Lee S. Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941. 2016 Nov 12.
  33. Prasetiyo B, Muslim MA, Baroroh N. Evaluation performance recall and F2 score of credit card fraud detection unbalanced dataset using SMOTE oversampling technique. InJournal of physics: conference series 2021 Jun 1 (Vol. 1918, No. 4, p. 042002). IOP Publishing.
  34. Rajagopal S, Kundapur PP, Hareesha KS. A stacking ensemble for network intrusion detection using heterogeneous datasets. Security and Communication Networks. 2020;2020(1):4586875.
  35. Rashid M, Kamruzzaman J, Imam T, Wibowo S, Gordon S. A tree-based stacking ensemble technique with feature selection for network intrusion detection. Applied Intelligence. 2022 Jul;52(9):9768-81.
  36. Ribeiro MT, Singh S, Guestrin C. ” Why should i trust you?” Explaining the predictions of any classifier. InProceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining 2016 Aug 13 (pp. 1135-1144).
  37. Rojas R. AdaBoost and the super bowl of classifiers a tutorial introduction to adaptive boosting. Freie University, Berlin, Tech. Rep. 2009 Dec;1(1):1-6.
  38. Rout N, Mishra D, Mallick MK. Handling imbalanced data: a survey. InInternational Proceedings on Advances in Soft Computing, Intelligent Systems and Applications: ASISA 2016 2018 (pp. 431-443). Springer Singapore.
  39. Saad M, Cook V, Nguyen L, Thai MT, Mohaisen A. Partitioning attacks on bitcoin: Colliding space, time, and logic. In2019 IEEE 39th international conference on distributed computing systems (ICDCS) 2019 Jul 7 (pp. 1175-1187). IEEE.
  40. Saripuddin M, Suliman A, Syarmila Sameon S, Jorgensen BN. Random undersampling on imbalance time series data for anomaly detection. InProceedings of the 2021 4th International Conference on Machine Learning and Machine Intelligence 2021 Sep 17 (pp. 151-156).
  41. Sarker IH. Data science and analytics: an overview from data-driven smart computing, decision-making and applications perspective. SN Computer Science. 2021 Sep;2(5):377.
  42. Sarker IH. Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects. Annals of Data Science. 2023 Dec;10(6):1473-98.
  43. Sayadi S, Rejeb SB, Choukair Z. Anomaly detection model over blockchain electronic transactions. In2019 15th international wireless communications & mobile computing conference (IWCMC) 2019 Jun 24 (pp. 895-900). IEEE.
  44. Scicchitano F, Liguori A, Guarascio M, Ritacco E, Manco G. A deep learning approach for detecting security attacks on blockchain. InCEUR Workshop Proceedings 2020 (Vol. 2597, pp. 212-222). CEUR-WS.
  45. Shafiq O. Anomaly detection in blockchain (Master’s thesis). 2019. Available from https://trepo.tuni.fi/handle/10024/118552
  46. Sharma H, Kumar S. A survey on decision tree algorithms of classification in data mining. International Journal of Science and Research (IJSR). 2016 Apr 5;5(4):2094-7.
  47. Signorini M, Pontecorvi M, Kanoun W, Di Pietro R. Advise: anomaly detection tool for blockchain systems. In2018 IEEE World Congress on Services (SERVICES) 2018 Jul 2 (pp. 65-66). IEEE.
  48. Singh A. Anomaly detection in the Ethereum network. A thesis for the degree of Master of Technology/Indian Institute of Technology Kanpur. 2019 Jun.
  49. Taneja S, Suri B, Kothari C. Application of balancing techniques with ensemble approach for credit card fraud detection. In2019 International Conference on Computing, Power and Communication Technologies (GUCON) 2019 Sep 27 (pp. 753-758). IEEE.
  50. Tikhomirov S. Ethereum: state of knowledge and research perspectives. InFoundations and Practice of Security: 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers 10 2018 (pp. 206-221). Springer International Publishing.
  51. Ward IR, Wang L, Lu J, Bennamoun M, Dwivedi G, Sanfilippo FM. Explainable artificial intelligence for pharmacovigilance: What features are important when predicting adverse outcomes?. Computer Methods and Programs in Biomedicine. 2021 Nov 1;212:106415.
  52. Xia Y, Chen K, Yang Y. Multi-label classification with weighted classifier selection and stacked ensemble. Information Sciences. 2021 May 1;557:421-42.
  53. Xuan S, Liu G, Li Z, Zheng L, Wang S, Jiang C. Random forest for credit card fraud detection. In2018 IEEE 15th international conference on networking, sensing and control (ICNSC) 2018 Mar 27 (pp. 1-6). IEEE.
  54. Yaga D, Mell P, Roby N, Scarfone K. Blockchain technology overview. arXiv preprint arXiv:1906.11078. 2019 Jun 26.
  55. Yang TH, Lin YT, Wu CL, Wang CY. Voting-based ensemble model for network anomaly detection. InICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2021 Jun 6 (pp. 8543-8547). IEEE.
  56. Yang W, Zhang Y, Ye K, Li L, Xu CZ. Ffd: A federated learning based method for credit card fraud detection. InBig Data–BigData 2019: 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings 8 2019 (pp. 18-32). Springer International Publishing.
  57. Yin HS, Vatrapu R. A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning. In2017 IEEE international conference on big data (Big Data) 2017 Dec 11 (pp. 3690-3699). IEEE.
  58. Zheng Z, Dai HN, Wu J. Blockchain intelligence: When blockchain meets artificial intelligence. arXiv preprint arXiv:1912.06485. 2019 Dec 11.
  59. Zhou Y, Cheng G, Jiang S, Dai M. Building an efficient intrusion detection system based on feature selection and ensemble classifier. Computer networks. 2020 Jun 19;174:107247.

Regular Issue Subscription Review Article
Volume 11
Issue 02
Received May 1, 2024
Accepted May 14, 2024
Published July 10, 2024