Visualization with Prediction Scheme for Early DDoS Detection in Ethereum †
Abstract
:1. Introduction
2. Related Works
2.1. Visualization for Blockchain-Based Systems
2.2. Prediction for Blockchain Values
3. Backgrounds
3.1. Blockchain Structure
- Single point of failure: In centralized security systems, essential information, including security-required data and keys, is stored on a central server. If an attacker breaches the central server and gains control, they can illegally access and modify the stored data. Furthermore, an attack on the central server can lead to a complete system shutdown. Consequently, the central server becomes a prime target for attackers, and real-world security breaches on central servers are well-documented.
- Concentration of power: In most security systems, the central server has administrator authority. Therefore, the system manager possesses unrestricted access to data, enabling them to view and modify data as they see fit. Even without malicious intent, if the central server is compromised, all data on the server is at risk. These issues arise because administrative power is concentrated solely within the central server.
3.2. DDoS on Blockchain
4. System Architecture
- Blockchain Server: The blockchain server is a powerful computer that runs a blockchain, generating various data. This server must be connected to the internet. Among the data generated, some are related to the blockchain, and others are not. The DApp, which will be explained in the next paragraph, collects data that are essential for predicting future attacks. In this paper, we use Ethereum for a private blockchain and employ Geth to build the blockchain network. The collected data are closely related to attack attempts. For example, represents the amount of gas used to create a new block.
- Decentralized Application (DApp): The DApp is a web application that operates directly on the blockchain or communicates directly with the blockchain RPC interface as a decentralized client [33]. The DApp’s purpose in this paper is to collect blockchain information related to various attacks. The collected data for this paper are listed in Table 2. Additionally, for this work, we build the DApp with Node.js v18.16.1 and Web3 v0.20.6.
- Database: After the DApp collects data for intrusion detection, it sends the data to the database. The database collects information from the initial state to the current state of the blockchain. Furthermore, this database stores future data expected by the prediction module. Afterward, the collected and expected data are delivered to the monitoring tool to visualize the current state and check for any attacks.
- Prediction Module: The prediction module in this work aims to forecast the future values based on the current and past values on the blockchain server. The prediction module receives the current and past values for the blockchain server’s status from the database. After the prediction, the future values are sent back to the database. The detailed procedure for the prediction module will be shown in Section 5.
- Monitoring Tool: After the database collects not only past and current data but also expected future data, it sends them to the monitoring tool. The monitoring tool displays this data through plots over time. Additionally, our monitoring tool issues a warning when it suspects an intrusion attack based on abnormally high future values. In this work, we build the monitoring tool with Node.js v18.16.1 and Grafana v9.2.1.
5. Proposed Detection Scheme
5.1. Data Collection
5.2. Prediction with Future Values
5.3. Detection with Statistical Method
6. Discussion
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Zhang, Y.; Xu, C.; Lin, X.; Shen, X. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors. IEEE Trans. Cloud Comput. 2021, 9, 923–937. [Google Scholar] [CrossRef]
- Li, S.; Xu, C.; Zhang, Y.; Du, Y.; Chen, K. Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage. IEEE Trans. Serv. Comput. 2023, 16, 134–146. [Google Scholar] [CrossRef]
- Zheng, P.; Zheng, Z.; Luo, X.; Chen, X.; Liu, X. A Detailed and Real-Time Performance Monitoring Framework for Blockchain Systems. In Proceedings of the 2018 IEEE/ACM 40th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP), Gothenburg, Sweden, 25 May–3 June 2018; pp. 134–143. [Google Scholar]
- Ji, S.H.; Baek, E.J.; Shin, M.G.; Park, J.S.; Kim, M.S. A Study on the Prediction of Number of Bitcoin Network Transactions Based on Machine Learning. KNOM Rev. 2019, 22, 68–76. [Google Scholar]
- Jeyasheela Rakkini, S.; Geetha, K. Block Mining reward prediction with Polynomial Regression, Long short-term memory, and Prophet API for Ethereum blockchain miners. ITM Web Conf. 2021, 37, 01004. [Google Scholar] [CrossRef]
- Available online: https://etherscan.io/ (accessed on 18 October 2023).
- Available online: http://ethviewer.live/ (accessed on 18 October 2023).
- Song, J.; Nang, J.; Jang, J. Design of Anomaly Detection and Visualization Tool for IoT Blockchain. In Proceedings of the 2018 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 12–14 December 2018; pp. 1464–1465. [Google Scholar] [CrossRef]
- Tharani, J.S.; Charles, E.Y.A.; Hóu, Z.; Palaniswami, M.; Muthukkumarasamy, V. Graph Based Visualisation Techniques for Analysis of Blockchain Transactions. In Proceedings of the 2021 IEEE 46th Conference on Local Computer Networks (LCN), Virtually, 4–7 October 2021; pp. 427–430. [Google Scholar] [CrossRef]
- Shrestha, A.K.; Vassileva, J. Bitcoin Blockchain Transactions Visualization. In Proceedings of the 2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB), Fuzhou, China, 15–17 November 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Kim, Y.; Park, D.; Eom, H.; Ko, K.; Park, Y. Implementation of Blockchain Visualization with Prediction for DDoS. In Proceedings of the 2023 11th International Conference on Green and Human Information Technology (ICGHIT), Bangkok, Thailand, 31 January–2 February 2023. [Google Scholar]
- Haslhofer, B.; Karl, R.; Filtz, E. O Bitcoin Where Art Thou? Insight into Large-Scale Transaction Graphs. In Proceedings of the International Conference on Semantic Systems, Leipzig, Germany, 12–15 September 2016. [Google Scholar]
- Reid, F.; Harrigan, M. An Analysis of Anonymity in the Bitcoin System. In Security and Privacy in Social Networks; Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A., Eds.; Springer: New York, NY, USA, 2013; pp. 197–223. [Google Scholar] [CrossRef]
- Zhao, C.; Guan, Y. A Graph-Based Investigation of Bitcoin Transactions. In Proceedings of the International Conference on Digital Forensics, Seoul, Republic of Korea, 6–8 October 2015. [Google Scholar]
- Hu, T.; Liu, X.; Chen, T.; Zhang, X.; Huang, X.; Niu, W.; Lu, J.; Zhou, K.; Liu, Y. Transaction-based classification and detection approach for Ethereum smart contract. Inf. Process. Manag. 2021, 58, 102462. [Google Scholar] [CrossRef]
- Patel, V.; Pan, L.; Rajasegarar, S. Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network. In Proceedings of the International Conference on Network and System Security, Melbourne, Australia, 25–27 November 2020; pp. 132–148. [Google Scholar]
- Delgado-Segura, S.; Bakshi, S.; Pérez-Solà, C.; Litton, J.; Pachulski, A.; Miller, A.; Bhattacharjee, B. TxProbe: Discovering Bitcoin’s Network Topology Using Orphan Transactions. In Financial Cryptography and Data Security; Goldberg, I., Moore, T., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 550–566. [Google Scholar]
- Johnson, B.; Laszka, A.; Grossklags, J.; Vasek, M.; Moore, T. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools. In Financial Cryptography and Data Security; Böhme, R., Brenner, M., Moore, T., Smith, M., Eds.; Springer: Berlin/Heidelberg, Germany, 2014; pp. 72–86. [Google Scholar]
- Miller, A.K.; Litton, J.; Pachulski, A.; Gupta, N.; Levin, D.; Spring, N.; Bhattacharjee, B. Discovering Bitcoin’s Public Topology and Influential Nodes; University of Maryland: College Park, MD, USA, 2015; Available online: https://www.cs.umd.edu/projects/coinscope/coinscope.pdf (accessed on 18 October 2023).
- Maeng, S.; Essaid, M.; Lee, C.; Park, S.; Ju, H. Visualization of Ethereum P2P network topology and peer properties. Int. J. Netw. Manag. 2021, 31, e2175. [Google Scholar] [CrossRef]
- Dinh, T.T.A.; Wang, J.; Chen, G.; Liu, R.; Ooi, B.C.; Tan, K.L. BLOCKBENCH: A Framework for Analyzing Private Blockchains. In Proceedings of the 2017 ACM International Conference on Management of Data (SIGMOD ’17), New York, NY, USA, 21–25 August 2017; pp. 1085–1100. [Google Scholar] [CrossRef]
- Kalodner, H.; Möser, M.; Lee, K.; Goldfeder, S.; Plattner, M.; Chator, A.; Narayanan, A. BlockSci: Design and applications of a blockchain analysis platform. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), Anaheim, CA, USA, 12–14 August 2020; pp. 2721–2738. [Google Scholar]
- Weber, I.; Gramoli, V.; Ponomarev, A.; Staples, M.; Holz, R.; Tran, A.B.; Rimba, P. On Availability for Blockchain-Based Systems. In Proceedings of the 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), Hong Kong, 26–29 September 2017; pp. 64–73. [Google Scholar] [CrossRef]
- Marino, B.; Juels, A. Setting Standards for Altering and Undoing Smart Contracts. In Rule Technologies. Research, Tools, and Applications, Proceedings of the 10th International Symposium, RuleML 2016, Stony Brook, NY, USA, 6–9 July 2016; Alferes, J.J., Bertossi, L., Governatori, G., Fodor, P., Roman, D., Eds.; Springer International Publishing: Cham, Switzerland, 2016; pp. 151–166. [Google Scholar]
- Chen, T.; Li, X.; Luo, X.; Zhang, X. Under-optimized smart contracts devour your money. In Proceedings of the 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), Klagenfurt, Austria, 20–24 February 2017; pp. 442–446. [Google Scholar] [CrossRef]
- Salah, K.; Rehman, M.H.U.; Nizamuddin, N.; Al-Fuqaha, A. Blockchain for AI: Review and Open Research Challenges. IEEE Access 2019, 7, 10127–10149. [Google Scholar] [CrossRef]
- Krichen, M.; Ammi, M.; Mihoub, A.; Almutiq, M. Blockchain for Modern Applications: A Survey. Sensors 2022, 22, 5274. [Google Scholar] [CrossRef] [PubMed]
- Kouhizadeh, M.; Sarkis, J. Blockchain Practices, Potentials, and Perspectives in Greening Supply Chains. Sustainability 2018, 10, 3652. [Google Scholar] [CrossRef]
- Bodziony, N.; Jemioło, P.; Kluza, K.; Ogiela, M.R. Blockchain-Based Address Alias System. J. Theor. Appl. Electron. Commer. Res. 2021, 16, 1280–1296. [Google Scholar] [CrossRef]
- Available online: https://cryptopotato.com/solana-network-suffers-another-reported-ddos-attack/ (accessed on 10 October 2023).
- Essaid, M.; Kim, D.; Maeng, S.H.; Park, S.; Ju, H.T. A Collaborative DDoS Mitigation Solution Based on Ethereum Smart Contract and RNN-LSTM. In Proceedings of the 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), Sejong, Republic of Korea, 18–20 September 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Abou El Houda, Z.; Hafid, A.S.; Khoukhi, L. Cochain-SC: An Intra- and Inter-Domain Ddos Mitigation Scheme Based on Blockchain Using SDN and Smart Contract. IEEE Access 2019, 7, 98893–98907. [Google Scholar] [CrossRef]
- Zhang, L.; Kim, D. A Peer-to-Peer Smart Food Delivery Platform Based on Smart Contract. Electronics 2022, 11, 1806. [Google Scholar] [CrossRef]
- Sayadi, S.; Ben Rejeb, S.; Choukair, Z. Anomaly Detection Model Over Blockchain Electronic Transactions. In Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 895–900. [Google Scholar] [CrossRef]
- Bogner, A. Seeing is Understanding: Anomaly Detection in Blockchains with Visualized Features. In Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and of the 2017 ACM International Symposium on Wearable Computers (UbiComp ’17), New York, NY, USA, 11–15 September 2017; pp. 5–8. [Google Scholar] [CrossRef]
Date | Blockchain | Attack |
---|---|---|
February 2021 | EXMO | Service stopped for 5 h |
December 2021 | Solina | Network was offline for 17 h |
December 2021 | Arbitrum | Network was offline for 45 min |
2022 | Solina | DDoS was occurred for 3 times |
Collected Data | Meaning |
---|---|
Each block’s number | |
An integer value how difficult it is to mine a block | |
A total gas used by all transactions in a block | |
The size of a block | |
An unix timestamp when a block was collected | |
An integer value of how difficult it is to mine whole blocks from initial block to the current block | |
The number of transactions in a block |
MSE | ||
---|---|---|
Accuracy | Precision | Recall | F1-Score | |
---|---|---|---|---|
Value |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Park, Y.; Kim, Y. Visualization with Prediction Scheme for Early DDoS Detection in Ethereum. Sensors 2023, 23, 9763. https://doi.org/10.3390/s23249763
Park Y, Kim Y. Visualization with Prediction Scheme for Early DDoS Detection in Ethereum. Sensors. 2023; 23(24):9763. https://doi.org/10.3390/s23249763
Chicago/Turabian StylePark, Younghoon, and Yejin Kim. 2023. "Visualization with Prediction Scheme for Early DDoS Detection in Ethereum" Sensors 23, no. 24: 9763. https://doi.org/10.3390/s23249763
APA StylePark, Y., & Kim, Y. (2023). Visualization with Prediction Scheme for Early DDoS Detection in Ethereum. Sensors, 23(24), 9763. https://doi.org/10.3390/s23249763