(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-9 Issue-95 October-2022
Full-Text PDF
Paper Title : A comprehensive review of significant learning for anomalous transaction detection using a machine learning method in a decentralized blockchain network
Author Name : Sabri Hisham, Mokhairi Makhtar and Azwa Abdul Aziz
Abstract :

Blockchain is a distributed ledger technology (DLT) that enables decentralized applications (DApps) such as Hyperledger, Bitcoin, Ethereum, decentralized finance (DeFi), and non-fungible token (NFT) to operate on it. Bitcoin is a popular application that leverages blockchain technology (BT) to provide secure transactions in a decentralized environment. Among the main reasons for BT being utilized is to eliminate the dependence of the process on third parties such as lawyers, insurance firms, and banks to execute approvals, verifications, and signatures. Due to the immutability and transparency of this technology, it has been deployed in several industries, including agri-food, supply chain, automotive, pharma, healthcare, insurance, land registration, and higher education, to increase verification, security, and traceability. Modern research indicates that blockchain distributed ledger may still be susceptible to various privacy, security, and dependability challenges, despite their impressive characteristics. To resolve these challenges, it is essential to notice abnormal behavior in a timely manner. Consequently, machine learning (ML) approaches with anomaly detection play a comprehensive role in preventing fraud. This paper explores the technological integration of anomaly detection models into BT and compares supervised and unsupervised ML techniques for detecting rogue and legitimate transactions. The studies for the review come from three well-known databases: Web of Science (WoS), Google Scholar and Scopus. Using sophisticated search tactics, specialized keywords such as Bitcoin, Ethereum, blockchain, fraud detection, anomaly detection, data mining, and ML are employed. These findings are based on three main points (1) the background of BT (2) Blockchain integration with ML, and (3) the ML approach for supervised learning and unsupervised learning. According to the findings of this study, supervised learning is the most prevalent method for studying anomalous detection in blockchain networks. This study also equips researchers with the knowledge necessary to perform research on the detection of blockchain network anomalies using ML techniques.

Keywords : Blockchain, Ethereum, Bitcoin, Machine learning, Anomaly detection, Artificial intelligence, Fraud detection.
Cite this article : Hisham S, Makhtar M, Aziz AA. A comprehensive review of significant learning for anomalous transaction detection using a machine learning method in a decentralized blockchain network. International Journal of Advanced Technology and Engineering Exploration. 2022; 9(95):1366-1396. DOI:10.19101/IJATEE.2021.876322.
References :
[1]Abd RNH. Blockchain technology in e-voting: comparative study. 2020.
[Google Scholar]
[2]Shen M, Tang X, Zhu L, Du X, Guizani M. Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet of Things Journal. 2019; 6(5):7702-12.
[Google Scholar]
[3]Warraich J, Singh C, Thapa P. Blockchain-based intelligent monitored security system for detection of replication attack in the wireless healthcare network. European Journal of Engineering and Technology Research. 2021; 6(6):160-70.
[Google Scholar]
[4]Boughaci D, Alkhawaldeh AA. Enhancing the security of financial transactions in Blockchain by using machine learning techniques: towards a sophisticated security tool for banking and finance. In 2020 first international conference of smart systems and emerging technologies (SMARTTECH) 2020 (pp. 110-5). IEEE.
[Crossref] [Google Scholar]
[5]Wang Z, Luo N, Zhou P. GuardHealth: Blockchain empowered secure data management and graph convolutional network enabled anomaly detection in smart healthcare. Journal of Parallel and Distributed Computing. 2020; 142:1-12.
[Crossref] [Google Scholar]
[6]Dhieb N, Ghazzai H, Besbes H, Massoud Y. A secure ai-driven architecture for automated insurance systems: fraud detection and risk measurement. IEEE Access. 2020; 8:58546-58.
[Crossref] [Google Scholar]
[7]Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review. 2008.
[Google Scholar]
[8]Moubarak J, Filiol E, Chamoun M. On blockchain security and relevant attacks. In IEEE middle east and north Africa communications conference 2018 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[9]Wang W, Song J, Xu G, Li Y, Wang H, Su C. Contractward: automated vulnerability detection models for ethereum smart contracts. IEEE Transactions on Network Science and Engineering. 2020; 8(2):1133-44.
[Crossref] [Google Scholar]
[10]Irwin AS, Turner AB. Illicit bitcoin transactions: challenges in getting to the who, what, when and where. Journal of Money Laundering Control. 2018.
[Crossref] [Google Scholar]
[11]Chen L, Peng J, Liu Y, Li J, Xie F, Zheng Z. Phishing scams detection in ethereum transaction network. ACM Transactions on Internet Technology (TOIT). 2020; 21(1):1-16.
[Crossref] [Google Scholar]
[12]Conti M, Kumar ES, Lal C, Ruj S. A survey on security and privacy issues of bitcoin. IEEE Communications Surveys & Tutorials. 2018; 20(4):3416-52.
[Crossref] [Google Scholar]
[13]Chalapathy R, Chawla S. Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407. 2019.
[Google Scholar]
[14]Khan AA, Khan MM, Khan KM, Arshad J, Ahmad F. A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs. Computer Networks. 2021.
[Crossref] [Google Scholar]
[15]Liu J, Zhao Z, Cui X, Wang Z, Liu Q. A novel approach for detecting browser-based silent miner. In IEEE third international conference on data science in cyberspace 2018 (pp. 490-7). IEEE.
[Crossref] [Google Scholar]
[16]Wu J, Yuan Q, Lin D, You W, Chen W, Chen C, et al. Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems. 2020; 52(2):1156-66.
[Crossref] [Google Scholar]
[17]Mirtaheri M, Abu-el-haija S, Morstatter F, Ver SG, Galstyan A. Identifying and analyzing cryptocurrency manipulations in social media. IEEE Transactions on Computational Social Systems. 2021; 8(3):607-17.
[Crossref] [Google Scholar]
[18]Alarab I, Prakoonwit S, Nacer MI. Comparative analysis using supervised learning methods for anti-money laundering in bitcoin. In proceedings of the 2020 5th international conference on machine learning technologies 2020 (pp. 11-7).
[Crossref] [Google Scholar]
[19]Kok SH, Abdullah A, Jhanjhi NZ, Supramaniam M. Prevention of crypto-ransomware using a pre-encryption detection algorithm. Computers. 2019; 8(4):1-15.
[Crossref] [Google Scholar]
[20]Jung E, Le Tilly M, Gehani A, Ge Y. Data mining-based ethereum fraud detection. In 2019 IEEE international conference on blockchain 2019 (pp. 266-73). IEEE.
[Crossref] [Google Scholar]
[21]Iyer S, Thakur S, Dixit M, Katkam R, Agrawal A, Kazi F. Blockchain and anomaly detection based monitoring system for enforcing wastewater reuse. In 2019 10th international conference on computing, communication and networking technologies 2019 (pp. 1-7). IEEE.
[Crossref] [Google Scholar]
[22]Li M, Zhang K, Liu J, Gong H, Zhang Z. Blockchain-based anomaly detection of electricity consumption in smart grids. Pattern Recognition Letters. 2020; 138:476-82.
[Crossref] [Google Scholar]
[23]Bhutta MN, Khwaja AA, Nadeem A, Ahmad HF, Khan MK, Hanif MA, et al. A survey on blockchain technology: evolution, architecture and security. IEEE Access. 2021; 9:61048-73.
[Crossref] [Google Scholar]
[24]Merkle RC. Protocols for public key cryptosystems. In secure communications and asymmetric cryptosystems 2019 (pp. 73-104). Routledge.
[Google Scholar]
[25]Tschorsch F, Scheuermann B. Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials. 2016; 18(3):2084-123.
[Crossref] [Google Scholar]
[26]Casino F, Dasaklis TK, Patsakis C. A systematic literature review of blockchain-based applications: current status, classification and open issues. Telematics and Informatics. 2019; 36:55-81.
[Crossref] [Google Scholar]
[27]Arya J, Kumar A, Singh AP, Mishra TK, Chong PH. Blockchain: basics, applications, challenges and opportunities.
[Google Scholar]
[28]Schollmeier R. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In proceedings first international conference on peer-to-peer computing 2001 (pp. 101-2). IEEE.
[Crossref] [Google Scholar]
[29]Ozisik AP, Levine BN. An explanation of Nakamotos analysis of double-spend attacks. arXiv preprint arXiv:1701.03977. 2017.
[Crossref] [Google Scholar]
[30]Baliga A. Understanding blockchain consensus models. Persistent. 2017; 4(1).
[Google Scholar]
[31]Zheng Z, Xie S, Dai H, Chen X, Wang H. An overview of blockchain technology: architecture, consensus, and future trends. In international congress on big data (BigData congress) 2017 (pp. 557-64). IEEE.
[Crossref] [Google Scholar]
[32]Back A. Hashcash-a denial of service counter-measure. 2002.
[Google Scholar]
[33]Nguyen CT, Hoang DT, Nguyen DN, Niyato D, Nguyen HT, Dutkiewicz E. Proof-of-stake consensus mechanisms for future blockchain networks: fundamentals, applications and opportunities. IEEE Access. 2019; 7:85727-45.
[Crossref] [Google Scholar]
[34]Yao W, Ye J, Murimi R, Wang G. A survey on consortium blockchain consensus mechanisms. arXiv preprint arXiv:2102.12058. 2021.
[Crossref] [Google Scholar]
[35]Cai W, Wang Z, Ernst JB, Hong Z, Feng C, Leung VC. Decentralized applications: the blockchain-empowered software system. IEEE Access. 2018; 6:53019-33.
[Crossref] [Google Scholar]
[36]Ali MS, Vecchio M, Pincheira M, Dolui K, Antonelli F, Rehmani MH. Applications of blockchains in the internet of things: a comprehensive survey. IEEE Communications Surveys & Tutorials. 2018; 21(2):1676-717.
[Crossref] [Google Scholar]
[37]Xie J, Tang H, Huang T, Yu FR, Xie R, Liu J, et al. A survey of blockchain technology applied to smart cities: research issues and challenges. IEEE Communications Surveys & Tutorials. 2019; 21(3):2794-830.
[Crossref] [Google Scholar]
[38]Lu Y. Blockchain: a survey on functions, applications and open issues. Journal of Industrial Integration and Management. 2018; 3(4).
[Crossref] [Google Scholar]
[39]Xinyi Y, Yi Z, He Y. Technical characteristics and model of blockchain. In international conference on communication software and networks (ICCSN) 2018 (pp. 562-6). IEEE.
[Crossref] [Google Scholar]
[40]Lin IC, Liao TC. A survey of blockchain security issues and challenges. International Journal of Network Security. 2017; 19(5):653-9.
[Crossref] [Google Scholar]
[41]Puthal D, Malik N, Mohanty SP, Kougianos E, Yang C. The blockchain as a decentralized security framework [future directions]. IEEE Consumer Electronics Magazine. 2018; 7(2):18-21.
[Crossref] [Google Scholar]
[42]Yang R, Yu FR, Si P, Yang Z, Zhang Y. Integrated blockchain and edge computing systems: a survey, some research issues and challenges. IEEE Communications Surveys & Tutorials. 2019; 21(2):1508-32.
[Crossref] [Google Scholar]
[43]Nakamoto WS. A next generation smart contract & decentralized application platform. Etherum. 2014.
[Google Scholar]
[44]Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De CA, et al. Hyperledger fabric: a distributed operating system for permissioned blockchains. In proceedings of the thirteenth Eurosys conference 2018 (pp. 1-15).
[Crossref] [Google Scholar]
[45]https://en.bitcoin.it/wiki/Genesis_block. Accessed 15 May 2022.
[46]Szabo N. Smart contracts: building blocks for digital markets. EXTROPY: The Journal of Transhumanist Thought,(16). 1996; 18(2).
[Google Scholar]
[47]Zheng Z, Xie S, Dai HN, Chen W, Chen X, Weng J, Imran M. An overview on smart contracts: Challenges, advances and platforms. Future Generation Computer Systems. 2020; 105:475-91.
[Crossref] [Google Scholar]
[48]Chen W, Guo X, Chen Z, Zheng Z, Lu Y, Li Y. Honeypot contract risk warning on Ethereum smart contracts. In international conference on joint cloud computing 2020 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]
[49]Tikhomirov S, Voskresenskaya E, Ivanitskiy I, Takhaviev R, Marchenko E, Alexandrov Y. Smartcheck: static analysis of Ethereum smart contracts. In proceedings of the 1st international workshop on emerging trends in software engineering for blockchain 2018 (pp. 9-16).
[Crossref] [Google Scholar]
[50]Chen W, Zheng Z, Ngai EC, Zheng P, Zhou Y. Exploiting blockchain data to detect smart Ponzi schemes on Ethereum. IEEE Access. 2019; 7:37575-86.
[Crossref] [Google Scholar]
[51]Salah K, Rehman MH, Nizamuddin N, Al-fuqaha A. Blockchain for AI: review and open research challenges. IEEE Access. 2019; 7:10127-49.
[Crossref] [Google Scholar]
[52]Chen F, Wan H, Cai H, Cheng G. Machine learning in/for blockchain: future and challenges. Canadian Journal of Statistics. 2021; 49(4):1364-82.
[Crossref] [Google Scholar]
[53]Wang T. A unified analytical framework for trustable machine learning and automation running with blockchain. In 2018 IEEE international conference on big data 2018 (pp. 4974-83). IEEE.
[Crossref] [Google Scholar]
[54]Azaria A, Ekblaw A, Vieira T, Lippman A. Medrec: Using blockchain for medical data access and permission management. In 2016 international conference on open and big data (OBD) 2016 (pp. 25-30). IEEE.
[Crossref] [Google Scholar]
[55]Liu J, Peng S, Long C, Wei L, Liu Y, Tian Z. Blockchain for data science. In proceedings of the international conference on blockchain technology 2020 (pp. 24-8).
[Crossref] [Google Scholar]
[56]Zhang D. Big data security and privacy protection. In 8th international conference on management and computer science (ICMCS 2018) 2018 (pp. 275-8). Atlantis Press.
[Google Scholar]
[57]Rahouti M, Xiong K, Ghani N. Bitcoin concepts, threats, and machine-learning security solutions. IEEE Access. 2018; 6:67189-205.
[Crossref] [Google Scholar]
[58]Nassif AB, Talib MA, Nasir Q, Dakalbab FM. Machine learning for anomaly detection: a systematic review. IEEE Access. 2021; 9:78658-700.
[Crossref] [Google Scholar]
[59]Bulusu S, Kailkhura B, Li B, Varshney PK, Song D. Anomalous example detection in deep learning: a survey. IEEE Access. 2020; 8:132330-47.
[Crossref] [Google Scholar]
[60]Bartoletti M, Pes B, Serusi S. Data mining for detecting bitcoin ponzi schemes. In 2018 crypto valley conference on blockchain technology 2018 (pp. 75-84). IEEE.
[Crossref] [Google Scholar]
[61]Ostapowicz M, Żbikowski K. Detecting fraudulent accounts on blockchain: a supervised approach. In international conference on web information systems engineering 2020 (pp. 18-31). Springer, Cham.
[Crossref] [Google Scholar]
[62]Bamhdi AM, Abrar I, Masoodi F. An ensemble based approach for effective intrusion detection using majority voting. Telkomnika (Telecommunication Computing Electronics and Control). 2021; 19(2):664-71.
[Google Scholar]
[63]Awang MK, Makhtar M, Udin N, Mansor NF. Improving customer churn classification with ensemble stacking method. International Journal of Advanced Computer Science and Applications. 2021; 12(11).
[Crossref] [Google Scholar]
[64]Awang MK, Makhtar M, Mamat AR. Ensemble selection and combination based on cost function for UCI datasets. Journal of Theoretical and Applied Information Technology. 2021; 99(16): 4015-25.
[65]Rosly R, Makhtar M, Awang MK, Hassan H, Rose AN. Deep multi-classifier learning for medical data sets. International Journal of Engineering Trends and Technology. 2020:1-7.
[Google Scholar]
[66]Mendes-moreira J, Soares C, Jorge AM, Sousa JF. Ensemble approaches for regression: a survey. ACM Computing Surveys. 2012; 45(1):1-40.
[Crossref] [Google Scholar]
[67]Monamo P, Marivate V, Twala B. Unsupervised learning for robust Bitcoin fraud detection. In 2016 information security for South Africa 2016 (pp. 129-34). IEEE.
[Crossref] [Google Scholar]
[68]Kumar P, Gupta GP, Tripathi R. TP2SF: a trustworthy privacy-preserving secured framework for sustainable smart cities by leveraging blockchain and machine learning. Journal of Systems Architecture. 2021.
[Crossref] [Google Scholar]
[69]Toyoda K, Ohtsuki T, Mathiopoulos PT. Identification of high yielding investment programs in bitcoin via transactions pattern analysis. In GLOBECOM 2017 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[70]Camino RD, State R, Montero L, Valtchev P. Finding suspicious activities in financial transactions and distributed ledgers. In international conference on data mining workshops (ICDMW) 2017 (pp. 787-96). IEEE.
[Crossref] [Google Scholar]
[71]Monamo PM, Marivate V, Twala B. A multifaceted approach to bitcoin fraud detection: global and local outliers. In 2016 15th IEEE international conference on machine learning and applications (ICMLA) 2016 (pp. 188-94). IEEE.
[Crossref] [Google Scholar]
[72]Harlev MA, Sun Yin H, Langenheldt KC, Mukkamala R, Vatrapu R. Breaking bad: De-anonymising entity types on the bitcoin blockchain using supervised machine learning. In proceedings of the 51st Hawaii international conference on system sciences 2018.
[Google Scholar]
[73]Chen W, Zheng Z, Cui J, Ngai E, Zheng P, Zhou Y. Detecting ponzi schemes on ethereum: towards healthier blockchain technology. In proceedings of the 2018 world wide web conference 2018 (pp. 1409-18).
[Crossref] [Google Scholar]
[74]Toyoda K, Mathiopoulos PT, Ohtsuki T. A novel methodology for hyip operators’ bitcoin addresses identification. IEEE Access. 2019; 7:74835-48.
[Crossref] [Google Scholar]
[75]Zola F, Bruse JL, Eguimendia M, Galar M, Orduna UR. Bitcoin and cybersecurity: temporal dissection of blockchain data to unveil changes in entity behavioral patterns. Applied Sciences. 2019; 9(23):1-20.
[Crossref] [Google Scholar]
[76]Kanemura K, Toyoda K, Ohtsuki T. Identification of darknet markets’ bitcoin addresses by voting per-address classification results. In 2019 IEEE international conference on blockchain and cryptocurrency 2019 (pp. 154-8). IEEE.
[Crossref] [Google Scholar]
[77]Lin YJ, Wu PW, Hsu CH, Tu IP, Liao SW. An evaluation of bitcoin address classification based on transaction history summarization. In international conference on blockchain and cryptocurrency (ICBC) 2019 (pp. 302-10). IEEE.
[Google Scholar]
[78]Song J, He H, Lv Z, Su C, Xu G, Wang W. An efficient vulnerability detection model for ethereum smart contracts. In international conference on network and system security 2019 (pp. 433-42). Springer, Cham.
[Crossref] [Google Scholar]
[79]Momeni P, Wang Y, Samavi R. Machine learning model for smart contracts security analysis. In 2019 17th international conference on privacy, security and trust 2019 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[80]I MJZ, Suárez-varela J, Barlet-ros P. Detecting cryptocurrency miners with NetFlow/IPFIX network measurements. In international symposium on measurements & networking (M&N) 2019 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[81]Victor F, Hagemann T. Cryptocurrency pump and dump schemes: quantification and detection. In international conference on data mining workshops 2019 (pp. 244-51). IEEE.
[Crossref] [Google Scholar]
[82]Baek H, Oh J, Kim CY, Lee K. A model for detecting cryptocurrency transactions with discernible purpose. In eleventh international conference on ubiquitous and future networks 2019 (pp. 713-7). IEEE.
[Crossref] [Google Scholar]
[83]La MM, Mei A, Sassi F, Stefa J. Pump and dumps in the bitcoin era: real time detection of cryptocurrency market manipulations. In 2020 29th international conference on computer communications and networks (ICCCN) 2020 (pp. 1-9). IEEE.
[Crossref] [Google Scholar]
[84]Camino R, Torres CF, Baden M, State R. A data science approach for detecting honeypots in ethereum. In 2020 IEEE international conference on blockchain and cryptocurrency 2020 (pp. 1-9). IEEE.
[Crossref] [Google Scholar]
[85]Liao Q, Gu Y, Liao J, Li W. Abnormal transaction detection of bitcoin network based on feature fusion. In 2020 IEEE 9th joint international information technology and artificial intelligence conference (ITAIC) 2020 (pp. 542-9). IEEE.
[Crossref] [Google Scholar]
[86]Ngo QD, Nguyen HT, Tran HA, Nguyen DH. IoT botnet detection based on the integration of static and dynamic vector features. In 2020 IEEE eighth international conference on communications and electronics (ICCE) 2021(pp. 540-5). IEEE.
[Crossref] [Google Scholar]
[87]Cheema MA, Qureshi HK, Chrysostomou C, Lestas M. Utilizing blockchain for distributed machine learning based intrusion detection in internet of things. In international conference on distributed computing in sensor systems 2020 (pp. 429-35). IEEE.
[Crossref] [Google Scholar]
[88]Fan S, Fu S, Xu H, Zhu C. Expose your mask: smart Ponzi schemes detection on blockchain. In 2020 international joint conference on neural networks 2020 (pp. 1-7). IEEE.
[Crossref] [Google Scholar]
[89]Dashevskyi S, Zhauniarovich Y, Gadyatskaya O, Pilgun A, Ouhssain H. Dissecting android cryptocurrency miners. In proceedings of the tenth ACM conference on data and application security and privacy 2020 (pp. 191-202). ACM.
[Crossref] [Google Scholar]
[90]Huang D, Chen B, Li L, Ding Y. Anomaly detection for consortium blockchains based on machine learning classification algorithm. In international conference on computational data and social networks 2020 (pp. 307-18). Springer, Cham.
[Crossref] [Google Scholar]
[91]Kumar N, Singh A, Handa A, Shukla SK. Detecting malicious accounts on the Ethereum blockchain with supervised learning. In international symposium on cyber security cryptography and machine learning 2020 (pp. 94-109). Springer, Cham.
[Crossref] [Google Scholar]
[92]Alarab I, Prakoonwit S, Nacer MI. Competence of graph convolutional networks for anti-money laundering in bitcoin blockchain. In proceedings of the 2020 5th international conference on machine learning technologies 2020 (pp. 23-7).
[Crossref] [Google Scholar]
[93]Lašas K, Kasputytė G, Užupytė R, Krilavičius T. Fraudulent behaviour identification in ethereum blockchain. In CEUR workshop proceedings [Electronic Resource]: IVUS 2020, information society and university studies, kaunas, lithuania: proceedings. Aachen: CEUR-WS 2020.
[Google Scholar]
[94]Lorenz J, Silva MI, Aparício D, Ascensão JT, Bizarro P. Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity. In proceedings of the first ACM international conference on AI in Finance 2020 (pp. 1-8).
[Crossref] [Google Scholar]
[95]Poursafaei F, Hamad GB, Zilic Z. Detecting malicious Ethereum entities via application of machine learning classification. In 2020 2nd conference on blockchain research & applications for innovative networks and services (BRAINS) 2020 (pp. 120-7). IEEE.
[Crossref] [Google Scholar]
[96]Farrugia S, Ellul J, Azzopardi G. Detection of illicit accounts over the Ethereum blockchain. Expert Systems with Applications. 2020.
[Crossref] [Google Scholar]
[97]Nerurkar P, Busnel Y, Ludinard R, Shah K, Bhirud S, Patel D. Detecting illicit entities in bitcoin using supervised learning of ensemble decision trees. In proceedings of the 2020 international conference on information communication and management 2020 (pp. 25-30).
[Crossref] [Google Scholar]
[98]Badawi E, Jourdan GV, Bochmann G, Onut IV. An automatic detection and analysis of the bitcoin generator scam. In 2020 IEEE European symposium on security and privacy workshops (EuroS&PW) 2020 (pp. 407-16). IEEE.
[Crossref] [Google Scholar]
[99]Bhowmik M, Chandana TS, Rudra B. Comparative study of machine learning algorithms for fraud detection in blockchain. In 2021 5th international conference on computing methodologies and communication 2021 (pp. 539-41). IEEE.
[Crossref] [Google Scholar]
[100]Wen H, Fang J, Wu J, Zheng Z. Transaction-based hidden strategies against general phishing detection framework on Ethereum. In 2021 IEEE international symposium on circuits and systems 2021 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[101]Gouda DK, Jolly S, Kapoor K. Design and validation of blockeval, a blockchain simulator. In 2021 international conference on communication systems & networks (COMSNETS) 2021 (pp. 281-9). IEEE.
[Crossref] [Google Scholar]
[102]Balagolla EM, Fernando WP, Rathnayake RM, Wijesekera MJ, Senarathne AN, Abeywardhana KY. Credit card fraud prevention using blockchain. In 2021 international conference for convergence in technology 2021 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]
[103]Sousa JE, Oliveira VC, Valadares JA, Vieira AB, Bernardino HS, Villela SM, et al. Fighting under-price DoS attack in ethereum with machine learning techniques. SIGMETRICS Perform. Eval. Rev. 2021; 48(4):24-7.
[Google Scholar]
[104]Al-e mari S, Anbar M, Sanjalawe Y, Manickam S. A labeled transactions-based dataset on the ethereum network. In international conference on advances in cyber security 2020 (pp. 61-79). Springer, Singapore.
[Crossref] [Google Scholar]
[105]Mittal R, Bhatia MP. Detection of suspicious or un-trusted users in crypto-currency financial trading applications. International Journal of Digital Crime and Forensics (IJDCF). 2021; 13(1):79-93.
[Crossref] [Google Scholar]
[106]Agarwal R, Barve S, Shukla SK. Detecting malicious accounts in permissionless blockchains using temporal graph properties. Applied Network Science. 2021; 6(1):1-30.
[Crossref] [Google Scholar]
[107]Yang X, Chen Y, Qian X, Li T, Lv X. BCEAD: a blockchain-empowered ensemble anomaly detection for wireless sensor network via isolation forest. Security and Communication Networks. 2021.
[Crossref] [Google Scholar]
[108]Chen B, Wei F, Gu C. Bitcoin theft detection based on supervised machine learning algorithms. Security and Communication Networks. 2021.
[Crossref] [Google Scholar]
[109]Lacruz F, Saniie J. Applications of machine learning in fintech credit card fraud detection. In international conference on electro information technology 2021 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[110]Ibrahim RF, Elian AM, Ababneh M. Illicit account detection in the ethereum blockchain using machine learning. In 2021 international conference on information technology 2021 (pp. 488-93). IEEE.
[Crossref] [Google Scholar]
[111]Liu X, Jiang F, Zhang R. A new social user anomaly behavior detection system based on blockchain and smart contract. In 2020 IEEE international conference on networking, sensing and control 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[112]Shahin R, Sabri KE. A secure IoT framework based on blockchain and machine learning. International Journal of Computing and Digital System. 2021.
[Google Scholar]
[113]Jatoth C, Jain R, Fiore U, Chatharasupalli S. Improved classification of blockchain transactions using feature engineering and ensemble learning. Future Internet. 2021; 14(1):1-12.
[Crossref] [Google Scholar]
[114]Brinckman E, Kuehlkamp A, Nabrzyski J, Taylor IJ. Techniques and applications for crawling, ingesting and analyzing blockchain data. In international conference on information and communication technology convergence 2019 (pp. 717-22). IEEE.
[Crossref] [Google Scholar]
[115]Sayadi S, Rejeb SB, Choukair Z. Anomaly detection model over blockchain electronic transactions. In 2019 international wireless communications & mobile computing conference 2019 (pp. 895-900). IEEE.
[Crossref] [Google Scholar]
[116]Yang L, Dong X, Xing S, Zheng J, Gu X, Song X. An abnormal transaction detection mechanism on bitcoin. In international conference on networking and network applications 2019 (pp. 452-7). IEEE.
[Crossref] [Google Scholar]
[117]Keshk M, Turnbull B, Moustafa N, Vatsalan D, Choo KK. A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks. IEEE Transactions on Industrial Informatics. 2019; 16(8):5110-8.
[Crossref] [Google Scholar]
[118]Sureshbhai PN, Bhattacharya P, Tanwar S. KaRuNa: a blockchain-based sentiment analysis framework for fraud cryptocurrency schemes. In international conference on communications workshops 2020 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[119]Bhargavi MS, Katti SM, Shilpa M, Kulkarni VP, Prasad S. Transactional data analytics for inferring behavioural traits in Ethereum blockchain network. In 2020 IEEE 16th international conference on intelligent computer communication and processing (ICCP) 2020 (pp. 485-90). IEEE.
[Crossref] [Google Scholar]
[120]Fan S, Fu S, Xu H, Cheng X. Al-SPSD: anti-leakage smart ponzi schemes detection in blockchain. Information Processing & Management. 2021; 58(4).
[Crossref] [Google Scholar]
[121]Yilmaz I, Kapoor K, Siraj A, Abouyoussef M. Privacy protection of grid users data with blockchain and adversarial machine learning. In proceedings of the 2021 ACM workshop on secure and trustworthy cyber-physical systems 2021 (pp. 33-8). ACM.
[Crossref] [Google Scholar]
[122]Hu T, Liu X, Chen T, Zhang X, Huang X, Niu W, et al. Transaction-based classification and detection approach for Ethereum smart contract. Information Processing & Management. 2021; 58(2).
[Crossref] [Google Scholar]
[123]Zarpelão BB, Miani RS, Rajarajan M. Detection of bitcoin-based botnets using a one-class classifier. In IFIP international conference on information security theory and practice 2018 (pp. 174-89). Springer, Cham.
[Crossref] [Google Scholar]
[124]Bach LM, Mihaljevic B, Zagar M. Comparative analysis of blockchain consensus algorithms. In 2018 41st international convention on information and communication technology, electronics and microelectronics (MIPRO) 2018 (pp. 1545-50). IEEE.
[Crossref] [Google Scholar]