Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection

Wenjun Fan, Hsiang Jen Hong, Jinoh Kim, Simeon James Wuthier, Makiya Nakashima, Xiaobo Zhou, Edward Chow, Sang Yoon Chang

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

The distributed cryptocurrency networking is critical because the information delivered through it drives the mining consensus protocol and the rest of the operations. However, the cryptocurrency peer-to-peer (P2P) network remains vulnerable, and the existing security approaches are either ineffective or inefficient because of the permissionless requirement and the broadcasting overhead. We design and build a Lightweight and Identifier-Oblivious eNgine (LION) for the anomaly detection of the cryptocurrency networking. LION is not only effective in permissionless networking but is also lightweight and practical for the computation-intensive miners. We build LION for anomaly detection and use traffic analyses so that it minimally affects the mining rate and is substantially superior in its computational efficiency than the previous approaches based on machine learning. We implement a LION prototype on an active Bitcoin node to show that LION yields less than 1% of mining rate reduction subject to our prototype, in contrast to the state-of-the-art machine-learning approaches costing 12% or more depending on the algorithms subject to our prototype as well, while having detection accuracy of greater than 97% F1-score against the attack prototypes and real-world anomalies. LION therefore can be deployed on the existing miners without the need to introduce new entities in the cryptocurrency ecosystem.

Original languageEnglish
Pages (from-to)1302-1318
Number of pages17
JournalIEEE Transactions on Dependable and Secure Computing
Volume20
Issue number2
DOIs
Publication statusPublished - 23 Feb 2022

Keywords

  • Blockchain
  • P2P network
  • anomaly detection
  • bitcoin
  • cryptocurrency
  • statistical analysis
  • traffic analysis

Fingerprint

Dive into the research topics of 'Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection'. Together they form a unique fingerprint.

Cite this