7
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection

      research-article

      Read this article at

      ScienceOpenPublisherPMC
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The basis of blockchain-related data, stored in distributed ledgers, are digitally signed transactions. Data can be stored on the blockchain ledger only after a digital signing process is performed by a user with a blockchain-based digital identity. However, this process is time-consuming and not user-friendly, which is one of the reasons blockchain technology is not fully accepted. In this paper, we propose a machine learning-based method, which introduces automated signing of blockchain transactions, while including also a personalized identification of anomalous transactions. In order to evaluate the proposed method, an experiment and analysis were performed on data from the Ethereum public main network. The analysis shows promising results and paves the road for a possible future integration of such a method in dedicated digital signing software for blockchain transactions.

          Related collections

          Most cited references31

          • Record: found
          • Abstract: found
          • Article: not found

          Anomaly detection: A survey

          Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for certain application domains, while others are more generic. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. We have grouped existing techniques into different categories based on the underlying approach adopted by each technique. For each category we have identified key assumptions, which are used by the techniques to differentiate between normal and anomalous behavior. When applying a given technique to a particular domain, these assumptions can be used as guidelines to assess the effectiveness of the technique in that domain. For each category, we provide a basic anomaly detection technique, and then show how the different existing techniques in that category are variants of the basic technique. This template provides an easier and more succinct understanding of the techniques belonging to each category. Further, for each category, we identify the advantages and disadvantages of the techniques in that category. We also provide a discussion on the computational complexity of the techniques since it is an important issue in real application domains. We hope that this survey will provide a better understanding of the different directions in which research has been done on this topic, and how techniques developed in one area can be applied in domains for which they were not intended to begin with.
            • Record: found
            • Abstract: not found
            • Article: not found

            A review of novelty detection

              • Record: found
              • Abstract: not found
              • Article: not found

              Bitcoin: A Peer-to-Peer Electronic Cash System

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                25 December 2019
                January 2020
                : 20
                : 1
                : 147
                Affiliations
                Faculty of Electrical Engineering and Computer Science, University of Maribor, Koroška cesta 46, 2000 Maribor, Slovenia; muhamed.turkanovic@ 123456um.si (M.T.); saso.karakatic@ 123456um.si (S.K.)
                Author notes
                [* ]Correspondence: blaz.podgorelec@ 123456um.si
                Author information
                https://orcid.org/0000-0002-6322-746X
                https://orcid.org/0000-0002-5079-5468
                https://orcid.org/0000-0003-4441-9690
                Article
                sensors-20-00147
                10.3390/s20010147
                6983113
                31881673
                b2a2cd7b-6d9d-4eb4-925d-bbc94a94a216
                © 2019 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 29 November 2019
                : 22 December 2019
                Categories
                Article

                Biomedical engineering
                blockchain,transactions,digital identity management,anomaly detection,machine learning

                Comments

                Comment on this article

                Related Documents Log