Skip to main content
Log in

Blockchain transaction model based on malicious node detection network

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this day and age, blockchain technology has become very popular. More and more transactions have been completed through the blockchain platform. The blockchain trading platform is fast, low-cost and high security. Many companies use blockchain for online transactions. However, with the increase in transaction volume and transaction scale, malicious users (nodes) appear, and malicious nodes participate in the blockchain network to carry out improper transactions, which brings huge losses to the transaction party. This paper proposes a Blockchain transaction model based on a malicious node detection network to ensure the safety of transaction users and enable the blockchain transaction to be traded in a safe environment. Aiming at the problem of malicious nodes deliberately submitting malicious information or obtaining Bitcoin through malicious behaviors on the blockchain, a malicious node detection model (MNDM) based on a hierarchical neural network is proposed. The hierarchical network model can calculate the key attributes according to the behavior of the nodes to detect abnormal nodes and kick them out of the blockchain system. The proposed model can avoid unnecessary losses caused by malicious nodes participating in data transmission and transactions and stop losses in time. The constructed model is called a hierarchical network model because it has two significant levels and realizes the reduction of parameter volume and the calculation of key information on the levels. Comparative tests are given in this paper. The validity of the model is proved by calculating the accuracy, precision, recall rate, and F1 score of the malicious node detection model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

The data set used to support the results of this paper is in [7].

References

  1. Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: 2017 IEEE international congress on big data (BigData Congress), pp 557–564

  2. Hssayeni MD, Chala A, Dev R, Xu L, Shaw J, Furht B, Ghoraani B (2021) The forecast of COVID-19 spread risk at the county level. J Big Data 8(1):1–16

    Article  Google Scholar 

  3. Atzei N, Bartoletti M, Cimoli T (2017) A survey of attacks on ethereum smart contracts (sok). In: International conference on principles of security and trust, pp 164–186. Springer

  4. Kosba A, Miller A, Shi E, Wen Z, Papamanthou C (2016) Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE symposium on security and privacy (SP), pp 839–858. IEEE

  5. Luu L, Chu DH, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 254–269

  6. Zhang F, Cecchetti E, Croman K, Juels A, Shi E (2016) Town crier: An authenticated data feed for smart contracts. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 270–282

  7. Wu J, Yuan Q, Lin D, You W, Chen W, Chen C, Zheng Z (2020) Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems

  8. Lin D, Wu J, Yuan Q, Zheng Z (2020) Modeling and understanding ethereum transaction records via a complex network approach. IEEE Transactions on Circuits and Systems II: Express Briefs 67(11):2737–2741

    Google Scholar 

  9. Zheng P, Zheng Z, Wu J, Dai HN (2020) Xblock-eth: Extracting and exploring blockchain data from ethereum. IEEE Open j Comput Soc 1:95–106

    Article  Google Scholar 

  10. Lin D, Wu J, Yuan Q, Zheng Z (2020) T-edge: Temporal weighted multidigraph embedding for ethereum transaction network analysis. Front Phys 8:204

    Article  Google Scholar 

  11. Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32

    Google Scholar 

  12. Bahdanau D, Cho K, Bengio Y (2014) Neural machine translation by jointly learning to align and translate. arXiv:1409.0473

  13. Gao X, Hu W, Qi GJ (2020) Graphter: Unsupervised learning of graph transformation equivariant representations via auto-encoding node-wise transformations. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 7163–7172

  14. Liu J, Fan K, Li H, Yang Y (2021) A blockchain-based privacy preservation scheme in multimedia network. Multimed Tools Appl 80(20):30691–30705

    Article  Google Scholar 

  15. Lee D, Park N (2021) Blockchain based privacy preserving multimedia intelligent video surveillance using secure merkle tree. Multimed Tools Appl 80(26):34517–34534

    Article  Google Scholar 

  16. Liu Y, Lu Q, Zhu C, Yu Q (2021) A blockchain-based platform architecture for multimedia data management. Multimed Tools Appl 80(20):30707–30723

    Article  Google Scholar 

  17. Xiong W, Xiong L (2021) Anti-collusion data auction mechanism based on smart contract. Information Sciences 555:386–409

    Article  MathSciNet  Google Scholar 

  18. Hu T, Liu X, Chen T, Zhang X, Huang X, Niu W, Lu J, Zhou K, Liu Y (2021) Transaction-based classification and detection approach for Ethereum smart contract. Inf Process Manage 58(2):102462

    Article  Google Scholar 

  19. Zhaofeng M, Jialin M, Jihui W, Zhiguang S (2020) Blockchain-based decentralized authentication modeling scheme in edge and IoT environment. IEEE Internet Things J

  20. Raj A, Maji K, Shetty SD (2021) Ethereum for internet of things security. Multimed Tools Appl 80(12):18901–18915

    Article  Google Scholar 

  21. Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303

    Article  Google Scholar 

  22. Yang J, Paudel A, Gooi HB (2020) Compensation for power loss by a proof-of-stake consortium blockchain microgrid. IEEE Trans Ind Inform

  23. Yang Q, Wang H (2020) Blockchain-empowered socially optimal transactive energy system: Framework and implementation. IEEE Trans Ind Inform

  24. Peyvandi A, Majidi B, Peyvandi S, Patra JC (2022) Privacy-preserving federated learning for scalable and high data quality computational-intelligence-as-a-service in society 5.0. Multimed Tools Appl, 1–22

  25. Cho K, Van Merriënboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014) Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv:1406.1078

  26. Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780

    Article  Google Scholar 

  27. Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I (2017) Attention is all you need. arXiv:1706.03762

  28. Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res 15(1):1929–1958

    MathSciNet  Google Scholar 

  29. Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv:1412.6980

  30. Leng XL, Miao XA, Liu T (2021) Using recurrent neural network structure with enhanced multi-head self-attention for sentiment analysis. Multimedia Tools and Applications 80(8):12581–12600

    Article  Google Scholar 

  31. Merity S (2019) Single headed attention rnn: Stop thinking with your head. arXiv:1911.11423

  32. Devlin J, Chang MW, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805

  33. Mikolov T, Chen K, Corrado G, Dean J (2013) Efficient estimation of word representations in vector space. arXiv:1301.3781

  34. Yang Z, Dai Z, Yang Y, Carbonell J, Salakhutdinov R, Le QV (2019) Xlnet: Generalized autoregressive pretraining for language understanding. arXiv:1906.08237

  35. Liu Y, Ott M, Goyal N, Du J, Joshi M, Chen D, Levy O, Lewis M, Zettlemoyer L, Stoyanov V (2019) Roberta: A robustly optimized bert pretraining approach. arXiv:1907.11692

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tao Liu.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Miao, XA., Liu, T. Blockchain transaction model based on malicious node detection network. Multimed Tools Appl 83, 41293–41310 (2024). https://doi.org/10.1007/s11042-023-17241-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17241-5

Keywords

Navigation