skip to main content
10.1145/3291064.3291075acmotherconferencesArticle/Chapter ViewAbstractPublication PagescciotConference Proceedingsconference-collections
research-article

Intrusion Detection and Mitigation System Using Blockchain Analysis for Bitcoin Exchange

Published:29 October 2018Publication History

ABSTRACT

Bitcoin exchanges rely heavily on traditional intrusion detection system to secure their system. However, this reliance has proven to be high risk, since Bitcoin and other blockchain-based transactions are not easily reversible. Many of the attacks have shown that the traditional intrusion detection system is not enough to safeguard against all possible attacks, and most importantly, in some cases, it takes a long time to assess the damage. In this paper, we first describe three types of intrusion models in Bitcoin exchanges and propose a detection and mitigation system using blockchain analysis for each. The proposed detection and mitigation system exploit the decentralized and public nature of Bitcoin blockchain to complement the existing traditional intrusion detection system as a fail-safe. The proposed method provides real-time intrusion detection capability that the existing work cannot provide. Although the proposed method is specifically for Bitcoin blockchain, similar ideas can be extended to other proof-of-work based blockchain cryptocurrencies.

References

  1. M. Andrychowicz, S. Dziembowski, D. Malinowski, and Ł. Mazurek. On the malleability of bitcoin transactions. In International Conference on Financial Cryptography and Data Security, pages 1--18. Springer, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  2. Bitcoin-Wiki. Bitcoin Wiki. en.bitcoin.it/wiki/Main Page, 2018. {Online; accessed 10-July-2018}.Google ScholarGoogle Scholar
  3. Bittrex. Terms of service version 2. support.bittrex.com/hc/en-us/articles/360000560871-Bittrex-Inc-Terms-of-Service-Version-2, 2018. {Online; accessed 10-July-2018}.Google ScholarGoogle Scholar
  4. Blockchair. Block 383627. https://blockchair.com/bitcoin/block/383627, 2018. {Online; accessed 10-July-2018}.Google ScholarGoogle Scholar
  5. Blockchair. Block 383628. https://blockchair.com/bitcoin/block/383628, 2018. {Online; accessed 10-July-2018}.Google ScholarGoogle Scholar
  6. E. Cheng. Japanese cryptocurrency exchange loses more than 500 million to hackers. www.cnbc.com/2018/01/26/japanese-cryptocurrency-exchange-loses-more-than-500-million-to-hackers.html, 2018. {Online; accessed 10-July-2018}.Google ScholarGoogle Scholar
  7. C. Decker and R. Wattenhofer. Information propagation in the bitcoin network. In International Conference on Peer-to-Peer Com- puting, pages 1--10. IEEE, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  8. C. Decker and R. Wattenhofer. Bitcoin transaction malleability and mtgox. In European Symposium on Research in Computer Security, pages 313--326. Springer, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. E. Lombrozo, J. Lau, and P. Wuille. BIP 141: Segwit.github.com/bitcoin/bips/blob/master/bip-0141.mediawiki, 2018. {Online; accessed 10-July-2018}.Google ScholarGoogle Scholar
  10. S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system, bitcoin.org/bitcoin.pdf.Google ScholarGoogle Scholar
  11. J. J. Roberts. Bitcoin Gold Hack. fortune.com/2018/05/29/bitcoin-gold-hack/, 2018. {Online; accessed 10-July-2018}.Google ScholarGoogle Scholar
  12. J. Yli-Huumo, D. Ko, S. Choi, S. Park, and K. Smolander. Where is current research on blockchain technology? a systematic review: PloS one, 11(10):e0163477, 2016.Google ScholarGoogle Scholar

Index Terms

  1. Intrusion Detection and Mitigation System Using Blockchain Analysis for Bitcoin Exchange

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CCIOT '18: Proceedings of the 2018 International Conference on Cloud Computing and Internet of Things
      October 2018
      91 pages
      ISBN:9781450365765
      DOI:10.1145/3291064

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 October 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader