ABSTRACT
Bitcoin exchanges rely heavily on traditional intrusion detection system to secure their system. However, this reliance has proven to be high risk, since Bitcoin and other blockchain-based transactions are not easily reversible. Many of the attacks have shown that the traditional intrusion detection system is not enough to safeguard against all possible attacks, and most importantly, in some cases, it takes a long time to assess the damage. In this paper, we first describe three types of intrusion models in Bitcoin exchanges and propose a detection and mitigation system using blockchain analysis for each. The proposed detection and mitigation system exploit the decentralized and public nature of Bitcoin blockchain to complement the existing traditional intrusion detection system as a fail-safe. The proposed method provides real-time intrusion detection capability that the existing work cannot provide. Although the proposed method is specifically for Bitcoin blockchain, similar ideas can be extended to other proof-of-work based blockchain cryptocurrencies.
- M. Andrychowicz, S. Dziembowski, D. Malinowski, and Ł. Mazurek. On the malleability of bitcoin transactions. In International Conference on Financial Cryptography and Data Security, pages 1--18. Springer, 2015.Google ScholarCross Ref
- Bitcoin-Wiki. Bitcoin Wiki. en.bitcoin.it/wiki/Main Page, 2018. {Online; accessed 10-July-2018}.Google Scholar
- Bittrex. Terms of service version 2. support.bittrex.com/hc/en-us/articles/360000560871-Bittrex-Inc-Terms-of-Service-Version-2, 2018. {Online; accessed 10-July-2018}.Google Scholar
- Blockchair. Block 383627. https://blockchair.com/bitcoin/block/383627, 2018. {Online; accessed 10-July-2018}.Google Scholar
- Blockchair. Block 383628. https://blockchair.com/bitcoin/block/383628, 2018. {Online; accessed 10-July-2018}.Google Scholar
- E. Cheng. Japanese cryptocurrency exchange loses more than 500 million to hackers. www.cnbc.com/2018/01/26/japanese-cryptocurrency-exchange-loses-more-than-500-million-to-hackers.html, 2018. {Online; accessed 10-July-2018}.Google Scholar
- C. Decker and R. Wattenhofer. Information propagation in the bitcoin network. In International Conference on Peer-to-Peer Com- puting, pages 1--10. IEEE, 2013.Google ScholarCross Ref
- C. Decker and R. Wattenhofer. Bitcoin transaction malleability and mtgox. In European Symposium on Research in Computer Security, pages 313--326. Springer, 2014. Google ScholarDigital Library
- E. Lombrozo, J. Lau, and P. Wuille. BIP 141: Segwit.github.com/bitcoin/bips/blob/master/bip-0141.mediawiki, 2018. {Online; accessed 10-July-2018}.Google Scholar
- S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system, bitcoin.org/bitcoin.pdf.Google Scholar
- J. J. Roberts. Bitcoin Gold Hack. fortune.com/2018/05/29/bitcoin-gold-hack/, 2018. {Online; accessed 10-July-2018}.Google Scholar
- J. Yli-Huumo, D. Ko, S. Choi, S. Park, and K. Smolander. Where is current research on blockchain technology? a systematic review: PloS one, 11(10):e0163477, 2016.Google Scholar
Index Terms
- Intrusion Detection and Mitigation System Using Blockchain Analysis for Bitcoin Exchange
Recommendations
An Architecture for Blockchain-Enabled Collaborative Signature-based Intrusion Detection System
SIGITE '19: Proceedings of the 20th Annual SIG Conference on Information Technology EducationDespite the promising benefits such as expanded signature databases and alert data from multiple sites, trust management and consensus building remain as challenges for a Collaborative Intrusion Detection System (CIDS) to work effectively. The ...
Intrusion detection system using honeypots and swarm intelligence
ACAI '11: Proceedings of the International Conference on Advances in Computing and Artificial IntelligenceAs the number and size of the Network and Internet traffic increase and the need for the intrusion detection grows in step to reduce the overhead required for the intrusion detection and diagnosis, it has made public servers increasingly vulnerable to ...
An Adaptive Rule-Based Intrusion Alert Correlation Detection Method
ICNDC '10: Proceedings of the 2010 First International Conference on Networking and Distributed ComputingIntrusion detection system (IDS) is a security layer that is used to discover ongoing intrusive attacks and anomaly activities in information systems and is usually working in a dynamically changing environment. Although increasing IDSs are developed in ...
Comments