From: Blockchain abnormal behavior awareness methods: a survey
Awareness purpose | Technical methods | Technical details | Applicable scene | Advantage | Disadvantage | Quantitative performance | Data using |
---|---|---|---|---|---|---|---|
Identity tracing | Group signature and ring signature | The identity of the signer is confidential but verifiable, and the administrator can open the identity of the signer (Zheng et al. 2018; Fujisaki and Suzuki 2007; Liu et al. 2004) | Consortium blockchain acquiring anonymity while can tracing identity in the abnormal situation | Satisfy identity anonymity and linkability | Long preparation time and slow speed before signing | Operations of Multiplication: 20 Operations of Exponentiation: 27 Low computational complexity | – |
Public key and certificate binding | Register the public key with a trusted third party to in- crease the credibility of the address (Ateniese et al. 2014) | Consortium blockchain with single institution of the supervision center | Fast and accurate identity tracing | Abuse of supervisory power | Script efficiency is as good as Bitcoin | – | |
Cooperative registration of public keys based on multi-party secure computing (El Defrawy and Lampkins 2014) | Consortium blockchain with multi-institutions of supervision centers | Can prevent abuse of supervisory power | Low tracking efficiency and slower speed | – | – | ||
With the change of the user’s public key, only a single registration to the supervision center (Li et al. 2021) | Consortium blockchain with single institution of the supervision center | Reduce the burden on users and the supervision center | Abuse of supervisory power | Efficiency is as good as Groth–Sahai proof system (Groth and Sahai 2008) | – | ||
Biometrics blockchain (BBC) | Using biometric information to track malicious accounts on-chain by BBC architecture (Alharthi et al. 2021) | Internet of vehicles with consortium blockchain | Use biometric information to label message senders for privacy and ensure message credibility | Latency time of chain updated | Packet Loss Rate: Less than 5% Computational Cost: 0.1–0.3 ms | Self-made chain with simulation attacks by OMNeT++ (Pongor 1993) | |
Attack on PBFT leaders | Based on reputation schemes | Use reputation model to evaluate leaders’ scores and perceive leader nodes (Lei et al. 2018) | Consortium blockchain using PBFT consensus mechanism | Identify malicious leader leader nodes in time | The effects in non-experimental environments need to be further tested | Feasibility: Delay time with in 22.0 s Reliability: Linear | Self-made chain prototype |
Forensic support based | Use cryptographic primitives such as aggregate signatures and commitments to take BFT forensic support (Sheng et al. 2021) | Consortium blockchain using BFT consensus mechanism | Forensic support can visualize | Large scale test need to be further tested | – | – | |
Auditing under privacy protection | Zero-knowledge proof and commitment | Additive homomorphism commitment to hide sensitive data and complete the audit with zero-knowledge proof guaranteeing audit reliability (Narula et al. 2018) | Consortium blockchain with audit content kept confidential | High privacy and audit reliability | Limited auditing operations | Computational Cost: Linear (Validate for 20 nodes in less than 200 ms) Auditing Time with More Nodes: Linear | Self-made chain prototype |
Collusion attack | Based on reputation schemes | Use Bayesian inference model to evaluate reputation scores and perceive collusion attacks (Yang et al. 2018) | Internet of vehicles with consortium blockchain | High feasibility in consortium ranges | Latency time of chain updated | Feasibility: Less than 1 s Reliability: Exponent | Users in vehicular and blockchain simulation platform |
Use the reputation chain to improve the performance of the transaction chain and perceive collusion attacks (Huang et al. 2020) | E-commerce environment with consortium blockchain | Sharding improves chain’s throughput | The effects in non-experimental environments need to be further tested | Feasibility: 20.4 s delay time at least Reliability: Linear | Self-made chain prototype with simulated users | ||
Use smart contracts to evaluate reputation scores and resist collusion attacks (Zhou et al. 2021) | E-commerce environment with consortium blockchain | High feasibility and reliability | The robust effect on other attacks remains to be verified | Feasibility: Less than 0.8 s Reliability: Constant | Partial Ethereum users participant in | ||
“Govern blockchains by blockchains” | Double-chain architecture | The double-chain consists of a detection chain and a data public chain. The detection chain deploys multi-feature models to detect malicious behaviors on the data public chain (Gu et al. 2018) | Consortium blockchain with multi-institutions of supervision centers | High accuracy and small scale high detection speed | Large scale testing is inefficient | Accuracy: 92.5% Recall: 94.6% F1: 93.5% | Drebin Dataset (Arp et al. 2014) |
The double-chain consists of the transaction chain and the custody chain. The custody chain uses a neural network to identify illegal transactions, and the double-chain anchors the public blockchain (Wu et al. 2020a) | Consortium blockchain with multi-institutions of supervision centers | Fast transaction speed, high scalability, and strong credibility | Practicability needs to be verified | Accuracy: 90.1% Recall: 18.5% F1: 30.8% | Elliptic Dataset |