skip to main content
10.1145/3123024.3123157acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Seeing is understanding: anomaly detection in blockchains with visualized features

Published: 11 September 2017 Publication History

Abstract

Modern IoT solutions are often an intricate system of interdependent components. Traditional monitoring techniques may not be sufficient to ensure the correct operation of those systems. We present an on-line machine learning approach for anomaly detection that is optimized for interpretability. The aim is to make it as intuitive as possible for human operators to derive insights about the system. To this end we combine characteristics of the system into sets of features that can be rendered graphically. Our solution builds on open source components and applies to any time series of numerical data. This work originated within a larger project on connected mobility that uses Blockchain technology to guarantee data integrity. Hence we demonstrate some results at the example of the public Ethereum blockchain. Further work will extend the solution to more general sensor data from the IoT realm.

References

[1]
Vitalik Buterin. 2014. A Next-Generation Smart Contract and Decentralized Application Platform. (2014). https://github.com/ethereum/wiki/wiki/White-Paper Accessed: 29-May-2017.
[2]
Phil Daian. 2016. Analysis of the DAO exploit. (2016). http://hackingdistributed.com/2016/06/18/analysis-of-the-dao-exploit/ Accessed: 29-May-2017.
[3]
Elasticsearch. 2017. The Open Source Elastic Stack. (2017). https://www.elastic.co/products Accessed: 29-May-2017.
[4]
Thai Pham and Steven Lee. 2016a. Anomaly Detection in Bitcoin Network Using Unsupervised Learning Methods. (2016). https://arxiv.org/abs/1611.03941 Accessed: 29-May-2017.
[5]
Thai Pham and Steven Lee. 2016b. Anomaly Detection in the Bitcoin System - A Network Perspective. (2016). https://arxiv.org/abs/1611.03942 Accessed: 29-May-2017.

Cited By

View all
  • (2024)ASOD: an adaptive stream outlier detection method using online strategyJournal of Cloud Computing10.1186/s13677-024-00682-013:1Online publication date: 5-Jul-2024
  • (2024)A comprehensive survey of smart contract security: State of the art and research directionsJournal of Network and Computer Applications10.1016/j.jnca.2024.103882226(103882)Online publication date: Jun-2024
  • (2023)Visualization with Prediction Scheme for Early DDoS Detection in EthereumSensors10.3390/s2324976323:24(9763)Online publication date: 11-Dec-2023
  • Show More Cited By

Index Terms

  1. Seeing is understanding: anomaly detection in blockchains with visualized features

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    UbiComp '17: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers
    September 2017
    1089 pages
    ISBN:9781450351904
    DOI:10.1145/3123024
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 September 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anomaly detection
    2. block-chain
    3. ethereum
    4. machine learning
    5. visualization

    Qualifiers

    • Research-article

    Conference

    UbiComp '17

    Acceptance Rates

    Overall Acceptance Rate 764 of 2,912 submissions, 26%

    Upcoming Conference

    UbiComp '24

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)27
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 15 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)ASOD: an adaptive stream outlier detection method using online strategyJournal of Cloud Computing10.1186/s13677-024-00682-013:1Online publication date: 5-Jul-2024
    • (2024)A comprehensive survey of smart contract security: State of the art and research directionsJournal of Network and Computer Applications10.1016/j.jnca.2024.103882226(103882)Online publication date: Jun-2024
    • (2023)Visualization with Prediction Scheme for Early DDoS Detection in EthereumSensors10.3390/s2324976323:24(9763)Online publication date: 11-Dec-2023
    • (2023)NFTDisk: Visual Detection of Wash Trading in NFT MarketsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581466(1-15)Online publication date: 19-Apr-2023
    • (2023)Anomaly Detection in Blockchain Transactions: A Comparative Study of Isolation Forest, K-Means Clustering, and LSTM Models2023 IEEE Technology & Engineering Management Conference - Asia Pacific (TEMSCON-ASPAC)10.1109/TEMSCON-ASPAC59527.2023.10531556(1-7)Online publication date: 14-Dec-2023
    • (2023)Anomaly Detection in Blockchain Networks: A Comprehensive SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2022.320564325:1(289-318)Online publication date: Sep-2024
    • (2023)Importance of anti-money laundering regulations among prosumers for a cybersecure decentralized financeJournal of Business Research10.1016/j.jbusres.2022.113558157(113558)Online publication date: Mar-2023
    • (2023)Illegal activity detection on bitcoin transaction using deep learningSoft Computing10.1007/s00500-022-07779-127:9(5503-5520)Online publication date: 5-Jan-2023
    • (2023)Mitigation of Trust-Related Issues in Cryptocurrency Payments Using Machine Learning: A ReviewSecurity, Privacy and Data Analytics10.1007/978-981-99-3569-7_6(73-83)Online publication date: 19-Aug-2023
    • (2022)Mitigating Frontrunning Attacks in EthereumProceedings of the Fourth ACM International Symposium on Blockchain and Secure Critical Infrastructure10.1145/3494106.3528682(115-124)Online publication date: 30-May-2022
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media