Identifying malicious activities through anomaly detection in ethereum network
The growth in blockchain technology has also brought about the rise in number of decentralized applications (dApps). dApps are open-sourced applications that operates on a blockchain network and has numerous benefits over conventional applications that we know. A key feature of dApps is the smart co...
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
Nanyang Technological University
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/166150 |
_version_ | 1811690436488593408 |
---|---|
author | Neo, Remus Keng Long |
author2 | Li Yi |
author_facet | Li Yi Neo, Remus Keng Long |
author_sort | Neo, Remus Keng Long |
collection | NTU |
description | The growth in blockchain technology has also brought about the rise in number of decentralized applications (dApps). dApps are open-sourced applications that operates on a blockchain network and has numerous benefits over conventional applications that we know. A key feature of dApps is the smart contract that powers it. Users interact with smart contracts through transactions to perform functions on dApps.
With the growth in popularity of dApps, the occurrences of cyber-attacks have also noticeably increased. Hence, there is a need to ensure security and data on dApps are not easily breached. This project aims to develop a method to identify malicious transactions in smart contracts through the use of block explorers to consolidate historical transactional data, together with data analysis. |
first_indexed | 2024-10-01T06:03:58Z |
format | Final Year Project (FYP) |
id | ntu-10356/166150 |
institution | Nanyang Technological University |
language | English |
last_indexed | 2024-10-01T06:03:58Z |
publishDate | 2023 |
publisher | Nanyang Technological University |
record_format | dspace |
spelling | ntu-10356/1661502023-04-21T15:39:16Z Identifying malicious activities through anomaly detection in ethereum network Neo, Remus Keng Long Li Yi School of Computer Science and Engineering yi_li@ntu.edu.sg Library and information science::Cryptography The growth in blockchain technology has also brought about the rise in number of decentralized applications (dApps). dApps are open-sourced applications that operates on a blockchain network and has numerous benefits over conventional applications that we know. A key feature of dApps is the smart contract that powers it. Users interact with smart contracts through transactions to perform functions on dApps. With the growth in popularity of dApps, the occurrences of cyber-attacks have also noticeably increased. Hence, there is a need to ensure security and data on dApps are not easily breached. This project aims to develop a method to identify malicious transactions in smart contracts through the use of block explorers to consolidate historical transactional data, together with data analysis. Bachelor of Engineering (Computer Science) 2023-04-18T04:22:25Z 2023-04-18T04:22:25Z 2023 Final Year Project (FYP) Neo, R. K. L. (2023). Identifying malicious activities through anomaly detection in ethereum network. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/166150 https://hdl.handle.net/10356/166150 en SCSE22-0199 application/pdf Nanyang Technological University |
spellingShingle | Library and information science::Cryptography Neo, Remus Keng Long Identifying malicious activities through anomaly detection in ethereum network |
title | Identifying malicious activities through anomaly detection in ethereum network |
title_full | Identifying malicious activities through anomaly detection in ethereum network |
title_fullStr | Identifying malicious activities through anomaly detection in ethereum network |
title_full_unstemmed | Identifying malicious activities through anomaly detection in ethereum network |
title_short | Identifying malicious activities through anomaly detection in ethereum network |
title_sort | identifying malicious activities through anomaly detection in ethereum network |
topic | Library and information science::Cryptography |
url | https://hdl.handle.net/10356/166150 |
work_keys_str_mv | AT neoremuskenglong identifyingmaliciousactivitiesthroughanomalydetectioninethereumnetwork |