Fortifying the Blockchain Fortress: A Machine Learning Paradigm for Enhanced Security

Year : 2024 | Volume : 11 | Issue : 02 | Page : 33 40
    By

    Ramya B.N.,

  • Vani,

  • Ushashri Gunti,

  • Tara V.K.,

  • Hina Nazneen,

  1. Assistant Professor, Department of Artificial Intelligence and Machine Learning, Jyothy Institute of Technology, Bengaluru, Karnataka, India
  2. Student, Department of Information Science and Engineering, City Engineering College, Bengaluru, Karnataka, India
  3. Assistant Professor, Department of Artificial Intelligence and Machine Learning, Jyothy Institute of Technology, Bengaluru, Karnataka, India
  4. Student, Department of Computer Science and Engineering, City Engineering College, Bengaluru, Karnataka, India
  5. Student, Department of Computer Science and Engineering, City Engineering College, Bengaluru, Karnataka, India

Abstract

Blockchain technology has emerged as a revolutionary tool in the digital landscape, enabling secure and transparent transactions across a decentralized network. Despite its robust security features, blockchain systems remain vulnerable to anomalies and malicious activities. The detection of these anomalies using machine learning has become essential for protecting blockchain networks and ensuring their integrity. This project delves into the application of machine learning techniques to detect abnormal patterns within blockchain data, with a specific focus on utilizing the XGBoost classifier. By analyzing large volumes of blockchain transactions, the XGBoost classifier is employed to identify irregularities that could indicate potential security threats. Our approach achieved an accuracy of 84%, demonstrating the efficacy of machine learning in detecting and mitigating these threats. Furthermore, this research underscores the pivotal role of machine learning in enhancing the resilience and reliability of blockchain networks. By proactively identifying anomalies, machine learning helps to maintain the trustworthiness and stability of blockchain systems, contributing to a safer digital ecosystem. The findings of this project not only highlight the importance of advanced analytics in cybersecurity but also pave the way for future innovations in safeguarding decentralized technologies.

Keywords: Blockchain networks, machine learning, XGBoost classifier, anomaly detection, blockchain transactions, artificial intelligence

[This article belongs to Journal of Artificial Intelligence Research & Advances ]

How to cite this article:
Ramya B.N., Vani, Ushashri Gunti, Tara V.K., Hina Nazneen. Fortifying the Blockchain Fortress: A Machine Learning Paradigm for Enhanced Security. Journal of Artificial Intelligence Research & Advances. 2024; 11(02):33-40.
How to cite this URL:
Ramya B.N., Vani, Ushashri Gunti, Tara V.K., Hina Nazneen. Fortifying the Blockchain Fortress: A Machine Learning Paradigm for Enhanced Security. Journal of Artificial Intelligence Research & Advances. 2024; 11(02):33-40. Available from: https://journals.stmjournals.com/joaira/article=2024/view=155824


References

  1. Ahmad H, Kasasbeh B, Aldabaybah B, Rawashdeh E. Class balancing framework for credit card fraud detection based on clustering and similarity-based selection (SBS). Int J Inf Technol. 2023 Jan; 15(1): 325–33.
  2. Ahsan R, Shi W, Ma X, Lee Croft W. A comparative analysis of CGAN‐based oversampling for anomaly detection. IET Cyber‐Physical Systems (CPS): Theory & Applications. 2022 Mar; 7(1): 40–50.
  3. Alarab I, Prakoonwit S, Nacer MI. Comparative analysis using supervised learning methods for anti-money laundering in bitcoin. In Proceedings of the 2020 5th international conference on machine learning technologies. 2020 Jun 19; 11–17.
  4. Biau G, Scornet E. A random forest guided tour. Test. 2016 Jun; 25: 197–227.
  5. Ahmed F, Hasan M, Hossain MS, Andersson K. Comparative performance of tree based machine learning classifiers in product backorder prediction. In International Conference on Intelligent Computing & Optimization. Cham: Springer International Publishing; 2022 Oct 21; 572–584.
  6. Alsowail RA. An insider threat detection model using one-hot encoding and near-miss under-sampling techniques. In Proceedings of International Joint Conference on Advances in Computational Intelligence: IJCACI 2021. Singapore: Springer Nature Singapore; 2022 May 19; 183–196.
  7. Arya GD, Harika KV, Rahul DV, Narasimhan S, Ashok A. Analysis of unsupervised learning algorithms for anomaly mining with Bitcoin. In Machine Intelligence and Smart Systems: Proceedings of MISS 2020. Singapore: Springer; 2021; 365–373.
  8. Ashfaq T, Khalid R, Yahaya AS, Aslam S, Azar AT, Alsafari S, Hameed IA. A machine learning and blockchain based efficient fraud detection mechanism. Sensors. 2022 Sep 21; 22(19): 7162.
  9. Chen B, Wei F, Gu C. Bitcoin theft detection based on supervised machine learning algorithms. Secur Commun Netw. 2021; 2021(1): 6643763.
  10. Yin HS, Vatrapu R. A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning. In 2017 IEEE international conference on big data (Big Data). 2017 Dec 11; 3690–3699.
  11. Singh A. Anomaly detection in the Ethereum network. A thesis for the degree of Master of Technology. Kanpur: Indian Institute of Technology; 2019 Jun.
  12. Lorenz J, Silva MI, Aparício D, Ascensão JT, Bizarro P. Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity. In Proceedings of the first ACM international conference on AI in finance. 2020 Oct 15; 1–8.
  13. Pham T, Lee S. Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941. 2016 Nov 12.
  14. Sayadi S, Rejeb SB, Choukair Z. Anomaly detection model over blockchain electronic transactions. In 2019 IEEE 15th international wireless communications & mobile computing conference (IWCMC). 2019 Jun 24; 895–900.
  15. Monamo P, Marivate V, Twala B. Unsupervised learning for robust Bitcoin fraud detection. In 2016 IEEE Information Security for South Africa (ISSA). 2016 Aug 17; 129–134.
  16. Scicchitano F, Liguori A, Guarascio M, Ritacco E, Manco G. A deep learning approach for detecting security attacks on blockchain. In CEUR Workshop Proceedings (CEUR-WS). 2020; 2597: 212–222.
  17. Hirshman J, Huang Y, Macke S. Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network. Technical report, Stanford University. 2013.
  18. Alarab I, Prakoonwit S. Effect of data resampling on feature importance in imbalanced blockchain data: Comparison studies of resampling techniques. Data Sci Manag. 2022 Jun 1; 5(2): 66–76.
  19. Taneja S, Suri B, Kothari C. Application of balancing techniques with ensemble approach for credit card fraud detection. In 2019 IEEE International Conference on Computing, Power and Communication Technologies (GUCON). 2019 Sep 27; 753–758.
  20. Chen T, He T, Benesty M, Khotilovich V, Tang Y, Cho H, Chen K. Xgboost: extreme gradient boosting. R package version 0.4–2. 2015; 1(4): 1–4.
  21. Chen Z, Van Khoa LD, Teoh EN, Nazir A, Karuppiah EK, Lam KS. Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: a review. Knowl Inf Syst. 2018 Nov; 57: 245–85.
  22. Dornadula VN, Geetha S. Credit card fraud detection using machine learning algorithms. Procedia Comput Sci. 2019 Jan 1; 165: 631–41.
  23. El Hajjami S, Malki J, Berrada M, Fourka B. Machine learning for anomaly detection. performance study considering anomaly distribution in an imbalanced dataset. In 2020 IEEE 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech). 2020 Nov 24; 1–8.
  24. Ganganwar V. An overview of classification algorithms for imbalanced datasets. Int J Emerg Technol Adv Eng. 2012 Apr; 2(4): 42–7.
  25. Gosain A, Sardana S. Handling class imbalance problem using oversampling techniques: A review. In 2017 IEEE international conference on advances in computing, communications and informatics (ICACCI). 2017 Sep 13; 79–85.
  26. Han J, Woo J, Hong JW. Oversampling techniques for detecting bitcoin illegal transactions. In 2020 IEEE 21st Asia-Pacific Network Operations and Management Symposium (APNOMS). 2020 Sep 22; 330–333.
  27. Hassan MU, Rehmani MH, Chen J. Anomaly detection in blockchain networks: A comprehensive survey. IEEE Commun Surv Tutor. 2022 Sep 12; 25(1): 289–318.
  28. Itoo F, Meenakshi, Singh S. Comparison and analysis of logistic regression, Naïve Bayes and KNN machine learning algorithms for credit card fraud detection. Int J Inf Technol. 2021 Aug; 13(4): 1503–11.
  29. King JE. Binary logistic regression. In: Best practices in quantitative methods. SAGE Publications, California, United States Inc.; 2008; 358–84.
  30. Li Y, Cai Y, Tian H, Xue G, Zheng Z. Identifying illicit addresses in bitcoin network. In Blockchain and Trustworthy Systems: Second International Conference, BlockSys 2020, Dali, China, August 6–7, 2020, Revised Selected Papers 2. Singapore: Springer; 2020; 99–111.
  31. Liu XY, Wu J, Zhou ZH. Exploratory undersampling for class-imbalance learning. IEEE Trans Syst Man Cybern, Part B (Cybernetics). 2008 Dec 16; 39(2): 539–50.
  32. Lundberg SM, Lee SI. A unified approach to interpreting model predictions. NIPS’17: Proceedings of the 31st International Conference on Neural Information Processing Systems. 2017; Pages 4768 -4777.
  33. Monrat AA, Schelén O, Andersson K. A survey of blockchain from the perspectives of applications, challenges, and opportunities. Ieee 2019 Aug 19; 7: 117134–51.
  34. Nakamoto S. (2008). Bitcoin: A peer-to-peer electronic cash system. Available form https://assets.pubpub.org/d8wct41f/31611263538139.pdf
  35. Natekin A, Knoll A. Gradient boosting machines, a tutorial. Front Neurorobot. 2013 Dec 4; 7: 21.
  36. Nofer M, Gomber P, Hinz O, Schiereck D. Blockchain. Bus Inf Syst Eng. 2017 Jun; 59: 183–7.
  37. Pham NT, Foo E, Suriadi S, Jeffrey H, Lahza HF. Improving performance of intrusion detection system using ensemble methods and feature selection. In Proceedings of the Australasian computer science week multiconference. 2018 Jan 29; 1–6.
  38. Prasetiyo B, Muslim MA, Baroroh N. Evaluation performance recall and F2 score of credit card fraud detection unbalanced dataset using SMOTE oversampling technique. In J Phys: Conf Ser. 2021 Jun 1; 1918(4): 042002. IOP Publishing.
  39. Rajagopal S, Kundapur PP, Hareesha KS. A stacking ensemble for network intrusion detection using heterogeneous datasets. Secur Commun Netw. 2020; 2020(1): 4586875.
  40. Rashid M, Kamruzzaman J, Imam T, Wibowo S, Gordon S. A tree-based stacking ensemble technique with feature selection for network intrusion detection. Appl Intell. 2022 Jul; 52(9): 9768–81.
  41. Ribeiro MT, Singh S, Guestrin C. “Why should i trust you?” Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. 2016 Aug 13; 1135–1144.
  42. Rojas R. AdaBoost and the super bowl of classifiers a tutorial introduction to adaptive boosting. Freie University, Berlin, Tech. Rep. 2009 Dec; 1(1): 1–6.
  43. Rout N, Mishra D, Mallick MK. Handling imbalanced data: a survey. In International Proceedings on Advances in Soft Computing, Intelligent Systems and Applications: ASISA 2016. Singapore: Springer; 2018; 431–443.
  44. Saad M, Cook V, Nguyen L, Thai MT, Mohaisen A. Partitioning attacks on bitcoin: Colliding space, time, and logic. In 2019 IEEE 39th international conference on distributed computing systems (ICDCS). 2019 Jul 7; 1175–1187.
  45. Saripuddin M, Suliman A, Syarmila Sameon S, Jorgensen BN. Random undersampling on imbalance time series data for anomaly detection. In Proceedings of the 2021 4th International Conference on Machine Learning and Machine Intelligence. 2021 Sep 17; 151–156.
  46. Sarker IH. Data science and analytics: an overview from data-driven smart computing, decision-making and applications perspective. SN Comput Sci. 2021 Sep; 2(5): 377.
  47. Sarker IH. Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects. Ann Data Sci. 2023 Dec; 10(6): 1473–98.
  48. Shafiq O. Anomaly detection in blockchain. Master’s thesis: Master’s Degree Programme in Computational Big Data Analytics. Finland: Tampere University; Available from https://trepo.tuni.fi/handle/10024/118552
  49. Sharma H, Kumar S. A survey on decision tree algorithms of classification in data mining. Int J Sci Res (IJSR). 2016 Apr 5; 5(4): 2094–7.
  50. Signorini M, Pontecorvi M, Kanoun W, Di Pietro R. Advise: anomaly detection tool for blockchain systems. In 2018 IEEE World Congress on Services (SERVICES). 2018 Jul 2; 65–66.
  51. Tikhomirov S. Ethereum: state of knowledge and research perspectives. InFoundations and Practice of Security: 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers 10. Springer International Publishing. 2018; 206–221.
  52. Ward IR, Wang L, Lu J, Bennamoun M, Dwivedi G, Sanfilippo FM. Explainable artificial intelligence for pharmacovigilance: What features are important when predicting adverse outcomes? Comput Methods Programs Biomed. 2021 Nov 1; 212: 106415.
  53. Xia Y, Chen K, Yang Y. Multi-label classification with weighted classifier selection and stacked ensemble. Inf Sci. 2021 May 1; 557: 421–42.
  54. Xuan S, Liu G, Li Z, Zheng L, Wang S, Jiang C. Random forest for credit card fraud detection. In 2018 IEEE 15th international conference on networking, sensing and control (ICNSC). 2018 Mar 27; 1–6.
  55. Yaga D, Mell P, Roby N, Scarfone K. Blockchain technology overview. arXiv preprint arXiv:1906.11078. 2019 Jun 26.
  56. Yang TH, Lin YT, Wu CL, Wang CY. Voting-based ensemble model for network anomaly detection. In ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2021 Jun 6; 8543–8547.
  57. Yang W, Zhang Y, Ye K, Li L, Xu CZ. Ffd: A federated learning based method for credit card fraud detection. InBig Data–BigData 2019: 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings 8. Springer International Publishing. 2019; 18–32.
  58. Zheng Z, Dai HN, Wu J. Blockchain intelligence: When blockchain meets artificial intelligence. arXiv preprint arXiv:1912.06485. 2019 Dec 11.
  59. Zhou Y, Cheng G, Jiang S, Dai M. Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw. 2020 Jun 19; 174: 107247.

Regular Issue Subscription Review Article
Volume 11
Issue 02
Received 01/05/2024
Accepted 14/05/2024
Published 10/07/2024


Login


My IP

PlumX Metrics