Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Anomaly Detection in Blockchain Using Clustering Protocol

Author : Rachana Kumari 1 Monica Catherine 2

Date of Publication :31st December 2017

Abstract: With the growth of technology, everyday new technologies are evolving. Blockchain is one such technology. Blockchain is a revolutionary technology which has proved its potential of being used in numerous fields like digital money or crypto-currency, IoT, Product tracing, Smart Contracts etc. Blockchain is a distributed database which allows to share or process data between multiple parties over a network of non-trusted users securely. One of the biggest advantages of blockchain is that it is fully decentralized i.e. there is no central authority which is governing it. However, it has its own set of disadvantages also. Some of these problems are its complexity, network size, large energy consumption etc. But one key problem is that there is no way to find the anomalous node i.e. nodes which are malicious. In any Blockchain network, there are two types of nodes, the one which behaves normally i.e. the honest node. But some nodes may try to cheat in the network or may have some illegal interest I.e. malicious nodes. If someone tries to monitor this node behaviour manually, it will take tremendous time and effort and is nearly impossible. So, this paper introduces a novel solution for the above mentioned problem. The problem can be solved by clustering the nodes of the network. For this, we will propose an algorithm which will help us in clustering the blockchain and then further for analysing the malicious activity of the nodes, if any performed. In this, we will divide the whole network into clusters of nodes or data points depending or based on some similar traits that they may have. Therefore the aim of our project is to segregate groups having similar traits from the blockchain network and then cluster them so that to identify the malicious node or illegal behaviour.

Reference :

    1. 1. Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303
    2. 2. Croman K, Decker C, Eyal I, Gencer AE, Juels A, Kosba AE, Miller A, Saxena P, Shi E, Sirer EG, Song D, Wattenhofer R (2016) On scaling decentralized blockchains - (a position paper). In: Financial cryptography and data security - FC 2016 international workshops, BITCOIN, VOTING, and WAHC, pp 106– 125
    3. 3. Dorri A, Kanhere SS, Jurdak R (2016) Blockchain in internet of things: challenges and solutions. arXiv:1608.05187
    4. 4. Ester M, Kriegel H, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the second international conference on knowledge discovery and data mining (KDD-96), pp 226–231
    5. 5. Garay JA (2015) Blockchain-based consensus (keynote). In: 19th international conference on principles of distributed systems, OPODIS 2015, pp 5:1–5:1
    6. 6. Guadamuz A, Marsden C (2015) Blockchains and bitcoin: regulatory responses to cryptocurrencies. First Monday 20(12)
    7. 7. Guha S, Rastogi R, Shim K (2001) Cure: an efficient clustering algorithm for large databases. Inf Syst 26(1):35–58
    8. 8. Hirano S, Tsumoto S (2003) Comparison of similarity measures and clustering methods for timeseries medical data mining. In: Data mining and knowledge discovery: theory, tools, and technology, pp 219–225

Recent Article