Author:
Yan Chuyi,Zhang Chen,Lu Zhigang,Wang Zehui,Liu Yuling,Liu Baoxu
Abstract
AbstractWith the wide application and development of blockchain technology in various fields such as finance, government affairs and medical care, security incidents occur frequently on it, which brings great threats to users’ assets and information. Many researchers have worked on blockchain abnormal behavior awareness in respond to these threats. We summarize respectively the existing public blockchain and consortium blockchain abnormal behavior awareness methods and ideas in detail as the difference between the two types of blockchain. At the same time, we summarize and analyze the existing data sets related to mainstream blockchain security, and finally discuss possible future research directions. Therefore, this work can provide a reference for blockchain security awareness research.
Funder
National Key Research and Development Program of China
Youth Innovation Promotion Association CAS
the Strategic Priority Research Program of Chinese Academy of Sciences
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference91 articles.
1. Alangot B, Reijsbergen D, Venugopalan S, Szalachowski P (2020) Decentralized lightweight detection of eclipse attacks on bitcoin clients. In: 2020 IEEE international conference on blockchain (blockchain). IEEE, pp 337–342
2. Alharthi A, Ni Q, Jiang R (2021) A privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET. IEEE Access 9:87299–87309
3. Ao X, Liu Y, Qin Z, Sun Y, He Q (2021) Temporal high-order proximity aware behavior analysis on Ethereum. World Wide Web, pp 1–21
4. Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens C (2014) Drebin: Effective and explainable detection of android malware in your pocket. Ndss 14:23–26
5. Ateniese G, Faonio A, Magri B, De Medeiros B (2014) Certified bitcoins. In: International conference on applied cryptography and network security. Springer, pp 80–96
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献