Identifying malicious activities through anomaly detection in ethereum network

The growth in blockchain technology has also brought about the rise in number of decentralized applications (dApps). dApps are open-sourced applications that operates on a blockchain network and has numerous benefits over conventional applications that we know. A key feature of dApps is the smart co...

Full description

Bibliographic Details
Main Author: Neo, Remus Keng Long
Other Authors: Li Yi
Format: Final Year Project (FYP)
Language:English
Published: Nanyang Technological University 2023
Subjects:
Online Access:https://hdl.handle.net/10356/166150
_version_ 1811690436488593408
author Neo, Remus Keng Long
author2 Li Yi
author_facet Li Yi
Neo, Remus Keng Long
author_sort Neo, Remus Keng Long
collection NTU
description The growth in blockchain technology has also brought about the rise in number of decentralized applications (dApps). dApps are open-sourced applications that operates on a blockchain network and has numerous benefits over conventional applications that we know. A key feature of dApps is the smart contract that powers it. Users interact with smart contracts through transactions to perform functions on dApps. With the growth in popularity of dApps, the occurrences of cyber-attacks have also noticeably increased. Hence, there is a need to ensure security and data on dApps are not easily breached. This project aims to develop a method to identify malicious transactions in smart contracts through the use of block explorers to consolidate historical transactional data, together with data analysis.
first_indexed 2024-10-01T06:03:58Z
format Final Year Project (FYP)
id ntu-10356/166150
institution Nanyang Technological University
language English
last_indexed 2024-10-01T06:03:58Z
publishDate 2023
publisher Nanyang Technological University
record_format dspace
spelling ntu-10356/1661502023-04-21T15:39:16Z Identifying malicious activities through anomaly detection in ethereum network Neo, Remus Keng Long Li Yi School of Computer Science and Engineering yi_li@ntu.edu.sg Library and information science::Cryptography The growth in blockchain technology has also brought about the rise in number of decentralized applications (dApps). dApps are open-sourced applications that operates on a blockchain network and has numerous benefits over conventional applications that we know. A key feature of dApps is the smart contract that powers it. Users interact with smart contracts through transactions to perform functions on dApps. With the growth in popularity of dApps, the occurrences of cyber-attacks have also noticeably increased. Hence, there is a need to ensure security and data on dApps are not easily breached. This project aims to develop a method to identify malicious transactions in smart contracts through the use of block explorers to consolidate historical transactional data, together with data analysis. Bachelor of Engineering (Computer Science) 2023-04-18T04:22:25Z 2023-04-18T04:22:25Z 2023 Final Year Project (FYP) Neo, R. K. L. (2023). Identifying malicious activities through anomaly detection in ethereum network. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/166150 https://hdl.handle.net/10356/166150 en SCSE22-0199 application/pdf Nanyang Technological University
spellingShingle Library and information science::Cryptography
Neo, Remus Keng Long
Identifying malicious activities through anomaly detection in ethereum network
title Identifying malicious activities through anomaly detection in ethereum network
title_full Identifying malicious activities through anomaly detection in ethereum network
title_fullStr Identifying malicious activities through anomaly detection in ethereum network
title_full_unstemmed Identifying malicious activities through anomaly detection in ethereum network
title_short Identifying malicious activities through anomaly detection in ethereum network
title_sort identifying malicious activities through anomaly detection in ethereum network
topic Library and information science::Cryptography
url https://hdl.handle.net/10356/166150
work_keys_str_mv AT neoremuskenglong identifyingmaliciousactivitiesthroughanomalydetectioninethereumnetwork