基于权益证明共识机制的用户攻击行为检测
User Attack Behavior Detection Based on PoS Consensus
DOI: 10.12677/airr.2025.144081, PDF,   
作者: 向 诉:重庆理工大学两江人工智能学院,重庆;宋鹃伲:成都市公安局锦江区分局信息通信科,四川 成都;罗 颂:重庆理工大学计算机科学与学院,重庆
关键词: 区块链安全攻击行为检测共识机制机器学习Blockchain Security Attack Behavior Detection Consensus Mechanism Machine Learning
摘要: 随着区块链技术的快速发展,其去中心化、不可篡改和可追溯等特性在金融、供应链管理和物联网等领域得到了广泛应用。然而,区块链生态系统的开放性和匿名性也为攻击者提供了可乘之机,导致欺诈交易、恶意套利、跨链洗钱等安全问题频发,严重威胁区块链网络的稳定性和用户资产安全。现有的检测方法在应对复杂的交易模式和时序特征等方面仍存在检测精度不足、模型泛化能力有限、实时性较差等问题。因此,研究高效、精准的用户攻击行为检测方法,对提升区块链系统的安全性、增强交易可信度具有重要的现实意义。本文以以太坊平台为研究对象,结合其共识机制特点,联合卷积神经网络和双向长短期记忆网络,构建检测模型。通过利用卷积神经网络提取交易数据的局部特征,双向长短期记忆网络捕捉交易中用户行为的时间依赖关系,并引入注意力机制强化关键特征的权重分配。实验结果表明,该模型在以太坊交易网络检测中达到了很好的效果,实现了对复杂交易模式和异常行为的精准识别。
Abstract: With the rapid development of blockchain technology, its decentralized, tamper resistant, and traceable characteristics have been widely adopted in fields such as finance, supply chain management, and the Internet of Things. However, the openness and anonymity of blockchain ecosystems also create opportunities for attackers, leading to frequent security issues such as fraudulent transactions, malicious arbitrage, and cross-chain money laundering, which severely threaten the stability of blockchain networks and user asset security. Existing detection methods still face challenges including insufficient detection accuracy, limited model generalization capabilities, and poor real-time performance when addressing complex transaction patterns and temporal features. Therefore, researching efficient and precise methods for detecting user attack behaviors holds significant practical importance for enhancing blockchain system security and transaction credibility. In this paper, we take the Ethereum platform as the research object, combine the characteristics of its consensus mechanism, unite the convolutional neural network and bidirectional long and short-term memory network to construct the detection model. By using convolutional neural network to extract the local features of transaction data, bidirectional long and short-term memory network captures the time-dependence of user behaviors in transactions, and introduces the attention mechanism to strengthen the weight allocation of key features. Experimental results show that the model achieves good results in Ethereum transaction network detection, realizing accurate identification of complex transaction patterns and abnormal behaviors.
文章引用:向诉, 宋鹃伲, 罗颂. 基于权益证明共识机制的用户攻击行为检测[J]. 人工智能与机器人研究, 2025, 14(4): 855-867. https://doi.org/10.12677/airr.2025.144081

参考文献

[1] Lamport, L., Shostak, R. and Pease, M. (2019) The Byzantine Generals Problem. In: Concurrency: The Works of Leslie Lamport, Association for Computing Machinery, 203-226.
[2] Nguyen, C.T., Hoang, D.T., Nguyen, D.N., Niyato, D., Nguyen, H.T. and Dutkiewicz, E. (2019) Proof-of-Stake Consensus Mechanisms for Future Blockchain Networks: Fundamentals, Applications and Opportunities. IEEE Access, 7, 85727-85745. [Google Scholar] [CrossRef
[3] Yan, C., Zhang, C., Lu, Z., Wang, Z., Liu, Y. and Liu, B. (2022) Blockchain Abnormal Behavior Awareness Methods: A Survey. Cybersecurity, 5, Article No. 5. [Google Scholar] [CrossRef
[4] Lin, I.C. and Liao, T.C. (2017) A Survey of Blockchain Security Issues and Challenges. International Journal of Network Security, 19, 653-659.
[5] Salman, T., Zolanvari, M., Erbad, A., Jain, R. and Samaka, M. (2019) Security Services Using Blockchains: A State of the Art Survey. IEEE Communications Surveys & Tutorials, 21, 858-880. [Google Scholar] [CrossRef
[6] Conti, M., Sandeep Kumar, E., Lal, C. and Ruj, S. (2018) A Survey on Security and Privacy Issues of Bitcoin. IEEE Communications Surveys & Tutorials, 20, 3416-3452. [Google Scholar] [CrossRef
[7] Li, X., Jiang, P., Chen, T., Luo, X. and Wen, Q. (2020) A Survey on the Security of Blockchain Systems. Future Generation Computer Systems, 107, 841-853. [Google Scholar] [CrossRef
[8] Xu, G., Guo, B., Su, C., Zheng, X., Liang, K., Wong, D.S., et al. (2020) Am I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereum. Computers & Security, 88, Article 101604. [Google Scholar] [CrossRef
[9] Ostapowicz, M. and Żbikowski, K. (2019) Detecting Fraudulent Accounts on Blockchain: A Supervised Approach. In: Lecture Notes in Computer Science, Springer, 18-31. [Google Scholar] [CrossRef
[10] Tan, R., Tan, Q., Zhang, P. and Li, Z. (2021) Graph Neural Network for Ethereum Fraud Detection. 2021 IEEE International Conference on Big Knowledge (ICBK), Auckland, 7-8 December 2021, 78-85. [Google Scholar] [CrossRef
[11] Elmougy, Y. and Manzi, O. (2021) Anomaly Detection on Bitcoin, Ethereum Networks Using GPU-Accelerated Machine Learning Methods. 2021 31st International Conference on Computer Theory and Applications (ICCTA), Alexandria, 11-13 December 2021, 166-171. [Google Scholar] [CrossRef
[12] Kumar, N., Singh, A., Handa, A. and Shukla, S.K. (2020) Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning. In: Lecture Notes in Computer Science, Springer, 94-109. [Google Scholar] [CrossRef
[13] Dahiya, M., Mishra, N. and Singh, R. (2023) Neural Network Based Approach for Ethereum Fraud Detection. 2023 4th International Conference on Intelligent Engineering and Management (ICIEM), London, 9-11 May 2023, 1-4. [Google Scholar] [CrossRef
[14] Farrugia, S., Ellul, J. and Azzopardi, G. (2020) Detection of Illicit Accounts over the Ethereum Blockchain. Expert Systems with Applications, 150, Article 113318. [Google Scholar] [CrossRef
[15] Akbar, N.A., Muneer, A., ElHakim, N. and Fati, S.M. (2021) Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses. Future Internet, 13, Article 285. [Google Scholar] [CrossRef
[16] Tas, E.N., Tse, D., Yu, F., et al. (2022) Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security.
[17] Sanda, O., Pavlidis, M., Seraj, S. and Polatidis, N. (2023) Long-Range Attack Detection on Permissionless Blockchains Using Deep Learning. Expert Systems with Applications, 218, Article 119606. [Google Scholar] [CrossRef
[18] Fukushima, K. (1980) Neocognitron: A Self-Organizing Neural Network Model for a Mechanism of Pattern Recognition Unaffected by Shift in Position. Biological Cybernetics, 36, 193-202. [Google Scholar] [CrossRef] [PubMed]
[19] Lecun, Y., Bottou, L., Bengio, Y. and Haffner, P. (1998) Gradient-Based Learning Applied to Document Recognition. Proceedings of the IEEE, 86, 2278-2324. [Google Scholar] [CrossRef
[20] Hochreiter, S. and Schmidhuber, J. (1997) Long Short-Term Memory. Neural Computation, 9, 1735-1780. [Google Scholar] [CrossRef] [PubMed]