Journal on Communications ›› 2023, Vol. 44 ›› Issue (3): 66-80.doi: 10.11959/j.issn.1000-436x.2023066
• Papers • Previous Articles Next Articles
Qianyi DAI1,2, Bin ZHANG1,2, Song GUO1, Kaiyong XU1
Revised:
2023-03-02
Online:
2023-03-25
Published:
2023-03-01
Supported by:
CLC Number:
Qianyi DAI, Bin ZHANG, Song GUO, Kaiyong XU. Blockchain network layer anomaly traffic detection method based on multiple classifier integration[J]. Journal on Communications, 2023, 44(3): 66-80.
[1] | 沈鑫, 裴庆祺, 刘雪峰 . 区块链技术综述[J]. 网络与信息安全学报, 2016,2(11): 11-20. |
SHEN X , PEI Q Q , LIU X F . Survey of block chain[J]. Chinese Journal of Network and Information Security, 2016,2(11): 11-20. | |
[2] | STEPHEN R , ALEX A . A review on blockchain security[J]. IOP Conference Series:Materials Science and Engineering, 2018:doi.org/10.1088/1757-899x/396/1/012030. |
[3] | 韩璇, 袁勇, 王飞跃 . 区块链安全问题:研究现状与展望[J]. 自动化学报, 2019,45(1): 206-225. |
HAN X , YUAN Y , WANG F Y . Security problems on blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2019,45(1): 206-225. | |
[4] | 江沛佩, 王骞, 陈艳姣 ,等. 区块链网络安全保障:攻击与防御[J]. 通信学报, 2021,42(1): 151-162. |
JIANG P P , WANG Q , CHEN Y J ,et al. Securing guarantee of the blockchain network:attacks and countermeasures[J]. Journal on Communications, 2021,42(1): 151-162. | |
[5] | TRAMèR F , BONEH D , PATERSON K G . Remote side-channel attacks on anonymous transactions[C]// Proceedings of the 29th USENIX Conference on Security Symposium. New York:ACM Press, 2020: 2739-2756. |
[6] | 叶聪聪, 李国强, 蔡鸿明 ,等. 区块链的安全检测模型[J]. 软件学报, 2018,29(5): 1348-1359. |
YE C C , LI G Q , CAI H M ,et al. Security detection model of blockchain[J]. Journal of Software, 2018,29(5): 1348-1359. | |
[7] | 曾诗钦, 霍如, 黄韬 ,等. 区块链技术研究综述:原理、进展与应用[J]. 通信学报, 2020,41(1): 134-151. |
ZENG S Q , HUO R , HUANG T ,et al. Survey of blockchain:principle,progress and application[J]. Journal on Communications, 2020,41(1): 134-151. | |
[8] | HASSAN M U , REHMANI M H , CHEN J . Anomaly detection in blockchain networks:a comprehensive survey[J]. arXiv Preprint,arXiv:2112.06089, 2021. |
[9] | KIM J , NAKASHIMA M , FAN W J ,et al. Anomaly detection based on traffic monitoring for secure blockchain networking[C]// Proceedings of 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Piscataway:IEEE Press, 2021: 1-9. |
[10] | SYARIF I , ZALUSKA E , PRUGEL-BENNETT A ,et al. Application of bagging,boosting and stacking to intrusion detection[C]// Proceedings of International Workshop on Machine Learning and Data Mining in Pattern Recognition. Berlin:Springer, 2012: 593-602. |
[11] | 凌玥, 刘玉岭, 姜波 ,等. 基于双层异质集成学习器的入侵检测方法[J]. 信息安全学报, 2021,6(3): 16-28. |
LING Y , LIU Y L , JIANG B ,et al. Intrusion detection method based on double-layer heterogeneous ensemble learner[J]. Journal of Cyber Security, 2021,6(3): 16-28. | |
[12] | GAIKWAD D P , THOOL R C . Intrusion detection system using bagging ensemble method of machine learning[C]// Proceedings of 2015 International Conference on Computing Communication Control and Automation. Piscataway:IEEE Press, 2015: 291-295. |
[13] | DONG X B , YU Z W , CAO W M ,et al. A survey on ensemble learning[J]. Frontiers of Computer Science, 2020,14(2): 241-258. |
[14] | 杨晓晖, 张圣昌 . 基于多粒度级联孤立森林算法的异常检测模型[J]. 通信学报, 2019,40(8): 133-142. |
YANG X H , ZHANG S C . Anomaly detection model based on multi-grained cascade isolation forest algorithm[J]. Journal on Communications, 2019,40(8): 133-142. | |
[15] | 黄金超, 马颖华, 齐开悦 ,等. 一种基于集成学习的入侵检测算法[J]. 上海交通大学学报, 2018,52(10): 1382-1387. |
HUANG J C , MA Y H , QI K Y ,et al. An ensemble-based intrusion detection algorithm[J]. Journal of Shanghai Jiao Tong University, 2018,52(10): 1382-1387. | |
[16] | 李小剑, 谢晓尧, 徐洋 . 网络流量异常检测方法:SSAE-IWELMAdaBoost[J]. 武汉大学学报(理学版), 2020,66(2): 126-134. |
LI X J , XIE X Y , XU Y . Network traffic anomaly detection method:SSAE-IWELM-AdaBoost[J]. Journal of Wuhan University (Natural Science Edition), 2020,66(2): 126-134. | |
[17] | ZHANG J Q , WANG Z Z , MENG J J ,et al. Boosting positive and unlabeled learning for anomaly detection with multi-features[J]. IEEE Transactions on Multimedia, 2019,21(5): 1332-1344. |
[18] | 刘金平, 何捷舟, 马天雨 ,等. 基于KELM选择性集成的复杂网络环境入侵检测[J]. 电子学报, 2019,47(5): 1070-1078. |
LIU J P , HE J Z , MA T Y ,et al. Selective ensemble of KELM-based complex network intrusion detection[J]. Acta Electronica Sinica, 2019,47(5): 1070-1078. | |
[19] | REDDY D K K , BEHERA H S , PRATYUSHA G M S ,et al. Ensemble bagging approach for IoT sensor based anomaly detection[C]// Proceedings of the Intelligent Computing in Control and Communication. Berlin:Springer, 2021: 647-665. |
[20] | OFORI-BOATENG D , DOMINGUEZ I S , AKCORA C ,et al. Topological anomaly detection in dynamic multilayer blockchain networks[C]// Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Berlin:Springer, 2021: 788-804. |
[21] | ZHANG R , ZHANG G F , LIU L ,et al. Anomaly detection in bitcoin information networks with multi-constrained meta path[J]. Journal of Systems Architecture, 2020:doi.org/10.1016/j.sysarc.2020.101829. |
[22] | JOHNSON R , ZHANG T . Accelerating stochastic gradient descent using predictive variance reduction[C]// Proceedings of the 26th International Conference on Neural Information Processing Systems. New York:ACM Press, 2013: 315-323. |
[23] | 钱景辉, 梁栋 . 一种基于多标记的局部离群点检测算法[J]. 微电子学与计算机, 2017,34(10): 110-114. |
QIAN J H , LIANG D . Local outlier detection algorithm based on multi-label learning[J]. Microelectronics & Computer, 2017,34(10): 110-114. | |
[24] | DAI Q Y , ZHANG B , DONG S Q . A DDoS-attack detection method oriented to the blockchain network layer[J]. Security and Communication Networks, 2022,2022: 1-18. |
[25] | DAI Q Y , ZHANG B , DONG S Q . Eclipse attack detection for blockchain network layer based on deep feature extraction[J]. Wireless Communications and Mobile Computing, 2022,2022: 1-19. |
[26] | XU G , GUO B , SU C ,et al. Am I eclipsed? a smart detector of eclipse attacks for Ethereum[J]. Computers & Security, 2020,88: 101604. |
[27] | LAURENS V D M , HINTON G . Viualizing data using t-SNE[J]. Journal of Machine Learning Research, 2008,9(2605): 2579-2605. |
[1] | Gaofeng HE, Qianfeng WEI, Xiancai XIAO, Haiting ZHU, Bingfeng XU. Confirmation method for the detection of malicious encrypted traffic with data privacy protection [J]. Journal on Communications, 2022, 43(2): 156-170. |
[2] | Zhibin FENG, Yuhua XU, Zhiyong DU, Xin LIU, Wen LI, Hao HAN, Xiaobo ZHANG. Active defense technology against intelligent jammer [J]. Journal on Communications, 2022, 43(10): 42-54. |
[3] | Yanhui LU, Han LIU, Hang LI, Guangxu ZHU. Time series generation model based on multi-discriminator generative adversarial network [J]. Journal on Communications, 2022, 43(10): 167-176. |
[4] | Kai MEI, Haitao ZHAO, Xiaoran LIU, Jun LIU, Jun XIONG, Baoquan REN, Jibo WEI. Efficient model-and-data based channel estimation algorithm [J]. Journal on Communications, 2022, 43(1): 59-70. |
[5] | Changgen PENG, Ting GAO, Huilan LIU, Hongfa DING. PCA-based membership inference attack for machine learning models [J]. Journal on Communications, 2022, 43(1): 149-160. |
[6] | Futai ZOU, Yue TAN, Lin WANG, Yongkang JIANG. Botnet detection based on generative adversarial network [J]. Journal on Communications, 2021, 42(7): 95-106. |
[7] | Zunwen HE, Shuai HOU, Wancheng ZHANG, Yan ZHANG. Multi-feature fusion classification method for communication specific emitter identification [J]. Journal on Communications, 2021, 42(2): 103-112. |
[8] | Liu LIU, Jianhua ZHANG, Yuanyuan FAN, Li YU, Jiachi ZHANG. Survey of application of machine learning in wireless channel modeling [J]. Journal on Communications, 2021, 42(2): 134-153. |
[9] | Yusun FU,Genke YANG. Application of artificial intelligence in mobile communication:challenge and practice [J]. Journal on Communications, 2020, 41(9): 190-201. |
[10] | Xiaochuan SUN,Zhigang LI,Minghui ZHANG,Guan GUI. Multi-channel QoT prediction method in wide-area optical backbone network based on ensemble learning [J]. Journal on Communications, 2020, 41(9): 1-7. |
[11] | Tieming CHEN,Chengqiang JIN,Mingqi LYU,Tiantian ZHU. Intelligent detection method on network malicious traffic based on sample enhancement [J]. Journal on Communications, 2020, 41(6): 128-138. |
[12] | Chunyu HAN,Yongzheng ZHANG,Yu ZHANG. Fast-flucos:malicious domain name detection method for Fast-flux based on DNS traffic [J]. Journal on Communications, 2020, 41(5): 37-47. |
[13] | Xin ZHOU,Xiaoxin HE,Changwen ZHENG. Radio signal recognition based on image deep learning [J]. Journal on Communications, 2019, 40(7): 114-125. |
[14] | Xuehui DU,Yangdong LIN,Yi SUN. Malicious PDF document detection based on mixed feature [J]. Journal on Communications, 2019, 40(2): 118-128. |
[15] | Hongyu SUN,Yuan HE,Jice WANG,Ying DONG,Lipeng ZHU,He WANG,Yuqing ZHANG. Application of artificial intelligence technology in the field of security vulnerability [J]. Journal on Communications, 2018, 39(8): 1-17. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|