A Survey on Blockchain Anomaly Detection Using Data Mining Techniques

被引:6
|
作者
Li, Ji [1 ]
Gu, Chunxiang [1 ,2 ]
Wei, Fushan [1 ]
Chen, Xi [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[2] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchain; Anomaly detection; Data mining; Graph analysis; Network security;
D O I
10.1007/978-981-15-2777-7_40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the more and more extensive application of blockchain, blockchain security has been widely concerned by the society and deeply studied by scholars, of which anomaly detection is an important problem. Data mining techniques, including conventional machine learning, deep learning and graph learning, have been concentrated for anomaly detection in the last few years. This paper presents a systematic survey of the blockchain anomaly detection results using data mining techniques. The anomaly detection methods are classified into 2 main categories, namely universal detection methods and specific detection methods, which contain 8 subclasses. For each subclass, the corresponding research are listed and compared, presenting a systematic and categorized overview of the current perspectives for blockchain anomaly detection. In addition, this paper contributes in discussing the advantages and disadvantages for the data mining techniques employed, and suggesting future directions for anomaly detection methods. This survey helps researchers to have a general comprehension of the anomaly detection field and its application in blockchain data.
引用
收藏
页码:491 / 504
页数:14
相关论文
共 50 条
  • [1] Survey on Anomaly Detection using Data Mining Techniques
    Agrawal, Shikha
    Agrawal, Jitendra
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 708 - 713
  • [2] Synergy of Blockchain Technology and Data Mining Techniques for Anomaly Detection
    Kamisalic, Aida
    Kramberger, Renata
    Fister, Iztok, Jr.
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (17):
  • [3] A Survey on Malware Detection Using Data Mining Techniques
    Ye, Yanfang
    Li, Tao
    Adjeroh, Donald
    Iyengar, S. Sitharama
    [J]. ACM COMPUTING SURVEYS, 2017, 50 (03)
  • [4] A survey of data mining and social network analysis based anomaly detection techniques
    Kaur, Ravneet
    Singh, Sarbjeet
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2016, 17 (02) : 199 - 216
  • [5] Real Anomaly Detection in Telecommunication Multidimensional Data Using Data Mining Techniques
    Choros, Kazimierz
    [J]. COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, PT I, 2010, 6421 : 11 - 19
  • [6] Anomaly Detection in Admission or Selection Examinations using Data Mining Techniques
    Ashaduzzaman, Md
    Roy, Shanto
    Zaman, Shihabuz
    Ferdaus, Abu Ahmed
    [J]. 2020 2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR INDUSTRY 4.0 (STI), 2020,
  • [7] A Survey of Tax Risk Detection Using Data Mining Techniques
    Zheng, Qinghua
    Xu, Yiming
    Liu, Huixiang
    Shi, Bin
    Wang, Jiaxiang
    Dong, Bo
    [J]. ENGINEERING, 2024, 34 : 43 - 59
  • [8] Anomaly Detection Techniques in Data Mining-A Review
    Lakshmi, K. N.
    Neema, N.
    Muddasir, N. Mohammed
    Prashanth, M., V
    [J]. INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 799 - 804
  • [9] Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques
    Agarwal, Basant
    Mittal, Namita
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 996 - 1003
  • [10] Anomaly Detection in Blockchain Networks Using Unsupervised Learning: A Survey
    Cholevas, Christos
    Angeli, Eftychia
    Sereti, Zacharoula
    Mavrikos, Emmanouil
    Tsekouras, George E.
    [J]. ALGORITHMS, 2024, 17 (05)