Malicious Cyber Attacks on Blockchain Handled Using Machine Learning Algorithm
Communications in Computer and Information Science, ISSN: 1865-0937, Vol: 1970 CCIS, Page: 270-284
2024
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Conference Paper Description
Most powerful technology of the trending world is Blockchain. Because of it’s shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. It does not gets limited here, it is widely used in Financial Management and Accounting, Record management in government, Healthcare, Banking, supply chain and so on. In simple terms, Blockchain is a collection of useful information (data). No central authority has the single control on it. Each transaction is documented as a “block” of data as it happens. Every block is interconnected with those that came before and after it.Due to its decentralized nature, after each and every transaction the block information gets appended in the longest chain and is made transparent to everyone enhancing the trust. But Blockchain is suffering from many cyber attacks. Many solutions are made to increase the level of security. Even in Jan 2019 majority attack has happened in Ethereum classic. The most rare occurrence of the event is the 51% attack (majority attack) which take the control of the hashing rate or hashing power of the network, potentially causing a network disruption. Leading to the cause of Mining Monopoly. Most of the time this happens when the attacker blocks all transactions from a miner in their own private network before broadcasting their own version to the network. The other possibilities of this majority attack can break the basis terms like Reverse transaction, Double spending attack. The attacker takes the control of not confirming some transaction, changing the block rewards, stealing the coins and even creating the coins. The majority assault, also known as the 51% attack, aims to split the blockchain in order to invalidate completed transactions and tamper with data integrity. Our approach is to provide security of blockchain transactions by following the POS (proof of stake) and tightening the network strength by tracing out the anomalous behaviour in the transaction.Machine learning model helps us to draw the insights and overcome this by training and testing the entire Ethereum classic logs of transaction and by detection algorithm along with the automatic featured engineering helps to identify in prior the occurrence of this rare event.
Bibliographic Details
http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=85210516130&origin=inward; http://dx.doi.org/10.1007/978-3-031-75957-4_23; https://link.springer.com/10.1007/978-3-031-75957-4_23; https://dx.doi.org/10.1007/978-3-031-75957-4_23; https://link.springer.com/chapter/10.1007/978-3-031-75957-4_23
Springer Science and Business Media LLC
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know