2022
DOI: 10.1109/access.2022.3188637
|View full text |Cite
|
Sign up to set email alerts
|

Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review

Abstract: Ethereum attracts more investors, researchers, and even scammers for many reasons; this is the first platform that enables the new Decentralized Applications (DApps) to run on top of the blockchain network. However, the rich semantics and applications of DApps inevitably introduce many security issues that have grabbed significant attention from industry and academics due to their destructive impact on DApps in recent years. Therefore, there is a vital need to study the applicability of Intrusion Detection Sys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 57 publications
0
3
0
Order By: Relevance
“…These particles then update their positions and velocities based on historical data, aiming to converge toward the optimal position. This process is demonstrated by Equation ( 9) and Equation (10), which illustrate the updating of particle positions and velocities, respectively [47].…”
Section: ) Feature Selection Based Psomentioning
confidence: 99%
See 1 more Smart Citation
“…These particles then update their positions and velocities based on historical data, aiming to converge toward the optimal position. This process is demonstrated by Equation ( 9) and Equation (10), which illustrate the updating of particle positions and velocities, respectively [47].…”
Section: ) Feature Selection Based Psomentioning
confidence: 99%
“…The importance of an IDS in Ethereum lies in its ability to provide an additional layer of security to protect against attacks and malicious activity. By continuously monitoring network traffic and alerting on suspicious activity, an IDS can help to identify and prevent potential threats before they can cause harm [10]. Generative Adversarial Networks (GANs) comprise a pair of neural networks, namely the generator and the discriminator, which collaborate in the identification and classification of network data.…”
Section: Introductionmentioning
confidence: 99%
“…An example of a common detection approach is the Intrusion Detection System (IDS) [26]. IDS is software that can identify attacks by distinguishing their intrusions as abnormal traffic [7,27]. Examples of common monitoring approaches are Sensors, Honeypots, or Crawlers, which will be discussed in the following subsections.…”
Section: P2p Botnet Monitoringmentioning
confidence: 99%
“…Their work was devoted to exploring various verification techniques rather than being limited to a single technology (such as formal verification), thus offering a comprehensive overview of various smart-contract security verification methods. Kabla et al [21] conducted a comprehensive investigation on the applicability of Intrusion Detection Systems (IDS) for Ethereum attacks. This study examined the effectiveness of various IDS technologies in addressing security issues and detecting potential threats on the Ethereum blockchain.…”
Section: Related Workmentioning
confidence: 99%