The rise in the adoption of blockchain technology has led to increased illegal activities by cyber-criminals costing billions of dollars. Many machine learning algorithms are applied to detect such illegal behavior. These algorithms are often trained on the transaction behavior and, in some cases, trained on the vulnerabilities that exist in the system. In our approach, we study the feasibility of using metadata such as Domain Name (DN) associated with the account in the blockchain and identify whether an account should be tagged malicious or not. Here, we leverage the temporal aspects attached to the DNs. Our results identify 144930 DNs that show malicious behavior, and out of these, 54114 DNs show persistent malicious behavior over time. Nonetheless, none of these identified malicious DNs were reported in new officially tagged malicious blockchain DNs.
翻译:采用封锁链技术的上升导致网络犯罪增加了非法活动,耗资数十亿美元。许多机器学习算法被用于检测此类非法行为。这些算法经常就交易行为进行培训,有时还就系统存在的脆弱性进行培训。在我们的方法中,我们研究使用与封锁链中账户相关的元数据,如域名(DN)的可行性,并查明一个账户是否应该贴上恶意标签。在这里,我们利用了与 DN 连接的时间方面。我们的结果确定了144930 个显示恶意行为的DN,其中54114个DN显示了长期的恶意行为。然而,在新的官方标记的恶意构件中,没有报告过这些被识别的恶意DN。