Abstract
In this day and age, blockchain technology has become very popular. More and more transactions have been completed through the blockchain platform. The blockchain trading platform is fast, low-cost and high security. Many companies use blockchain for online transactions. However, with the increase in transaction volume and transaction scale, malicious users (nodes) appear, and malicious nodes participate in the blockchain network to carry out improper transactions, which brings huge losses to the transaction party. This paper proposes a Blockchain transaction model based on a malicious node detection network to ensure the safety of transaction users and enable the blockchain transaction to be traded in a safe environment. Aiming at the problem of malicious nodes deliberately submitting malicious information or obtaining Bitcoin through malicious behaviors on the blockchain, a malicious node detection model (MNDM) based on a hierarchical neural network is proposed. The hierarchical network model can calculate the key attributes according to the behavior of the nodes to detect abnormal nodes and kick them out of the blockchain system. The proposed model can avoid unnecessary losses caused by malicious nodes participating in data transmission and transactions and stop losses in time. The constructed model is called a hierarchical network model because it has two significant levels and realizes the reduction of parameter volume and the calculation of key information on the levels. Comparative tests are given in this paper. The validity of the model is proved by calculating the accuracy, precision, recall rate, and F1 score of the malicious node detection model.
Similar content being viewed by others
Data Availability
The data set used to support the results of this paper is in [7].
References
Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: 2017 IEEE international congress on big data (BigData Congress), pp 557–564
Hssayeni MD, Chala A, Dev R, Xu L, Shaw J, Furht B, Ghoraani B (2021) The forecast of COVID-19 spread risk at the county level. J Big Data 8(1):1–16
Atzei N, Bartoletti M, Cimoli T (2017) A survey of attacks on ethereum smart contracts (sok). In: International conference on principles of security and trust, pp 164–186. Springer
Kosba A, Miller A, Shi E, Wen Z, Papamanthou C (2016) Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE symposium on security and privacy (SP), pp 839–858. IEEE
Luu L, Chu DH, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 254–269
Zhang F, Cecchetti E, Croman K, Juels A, Shi E (2016) Town crier: An authenticated data feed for smart contracts. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 270–282
Wu J, Yuan Q, Lin D, You W, Chen W, Chen C, Zheng Z (2020) Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems
Lin D, Wu J, Yuan Q, Zheng Z (2020) Modeling and understanding ethereum transaction records via a complex network approach. IEEE Transactions on Circuits and Systems II: Express Briefs 67(11):2737–2741
Zheng P, Zheng Z, Wu J, Dai HN (2020) Xblock-eth: Extracting and exploring blockchain data from ethereum. IEEE Open j Comput Soc 1:95–106
Lin D, Wu J, Yuan Q, Zheng Z (2020) T-edge: Temporal weighted multidigraph embedding for ethereum transaction network analysis. Front Phys 8:204
Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32
Bahdanau D, Cho K, Bengio Y (2014) Neural machine translation by jointly learning to align and translate. arXiv:1409.0473
Gao X, Hu W, Qi GJ (2020) Graphter: Unsupervised learning of graph transformation equivariant representations via auto-encoding node-wise transformations. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 7163–7172
Liu J, Fan K, Li H, Yang Y (2021) A blockchain-based privacy preservation scheme in multimedia network. Multimed Tools Appl 80(20):30691–30705
Lee D, Park N (2021) Blockchain based privacy preserving multimedia intelligent video surveillance using secure merkle tree. Multimed Tools Appl 80(26):34517–34534
Liu Y, Lu Q, Zhu C, Yu Q (2021) A blockchain-based platform architecture for multimedia data management. Multimed Tools Appl 80(20):30707–30723
Xiong W, Xiong L (2021) Anti-collusion data auction mechanism based on smart contract. Information Sciences 555:386–409
Hu T, Liu X, Chen T, Zhang X, Huang X, Niu W, Lu J, Zhou K, Liu Y (2021) Transaction-based classification and detection approach for Ethereum smart contract. Inf Process Manage 58(2):102462
Zhaofeng M, Jialin M, Jihui W, Zhiguang S (2020) Blockchain-based decentralized authentication modeling scheme in edge and IoT environment. IEEE Internet Things J
Raj A, Maji K, Shetty SD (2021) Ethereum for internet of things security. Multimed Tools Appl 80(12):18901–18915
Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303
Yang J, Paudel A, Gooi HB (2020) Compensation for power loss by a proof-of-stake consortium blockchain microgrid. IEEE Trans Ind Inform
Yang Q, Wang H (2020) Blockchain-empowered socially optimal transactive energy system: Framework and implementation. IEEE Trans Ind Inform
Peyvandi A, Majidi B, Peyvandi S, Patra JC (2022) Privacy-preserving federated learning for scalable and high data quality computational-intelligence-as-a-service in society 5.0. Multimed Tools Appl, 1–22
Cho K, Van Merriënboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014) Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv:1406.1078
Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780
Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I (2017) Attention is all you need. arXiv:1706.03762
Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res 15(1):1929–1958
Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv:1412.6980
Leng XL, Miao XA, Liu T (2021) Using recurrent neural network structure with enhanced multi-head self-attention for sentiment analysis. Multimedia Tools and Applications 80(8):12581–12600
Merity S (2019) Single headed attention rnn: Stop thinking with your head. arXiv:1911.11423
Devlin J, Chang MW, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805
Mikolov T, Chen K, Corrado G, Dean J (2013) Efficient estimation of word representations in vector space. arXiv:1301.3781
Yang Z, Dai Z, Yang Y, Carbonell J, Salakhutdinov R, Le QV (2019) Xlnet: Generalized autoregressive pretraining for language understanding. arXiv:1906.08237
Liu Y, Ott M, Goyal N, Du J, Joshi M, Chen D, Levy O, Lewis M, Zettlemoyer L, Stoyanov V (2019) Roberta: A robustly optimized bert pretraining approach. arXiv:1907.11692
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Miao, XA., Liu, T. Blockchain transaction model based on malicious node detection network. Multimed Tools Appl 83, 41293–41310 (2024). https://doi.org/10.1007/s11042-023-17241-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-17241-5