Over the past decade, blockchain technology has attracted a huge attention from both industry and academia because it can be integrated with a large number of everyday applications working over features of modern information and communication technologies (ICT). Peer-to-peer (P2) architecture of blockchain enhances these applications by providing strong security and trust-oriented guarantees, such as immutability, verifiability, and decentralization. Despite of these incredible features that blockchain technology brings to these ICT applications, modern research have indicated that these strong guarantees are not sufficient enough and blockchain networks may still prone to various security, privacy, and reliability related issues. In order to overcome these issues, it is important to identify the anomalous behaviour within time. Therefore, nowadays anomaly detection models are playing an important role in protection of modern blockchain networks. These anomaly detection models autonomously detect and predict anomaly in the network in order to protect network from unexpected attacks. In this article, we provide an in-depth survey regarding integration of anomaly detection models in blockchain technology. For this, we first discuss that how anomaly detection can aid in ensuring security of blockchain based applications. Then, we demonstrate certain fundamental evaluation matrices and key requirements that can play a critical role while developing anomaly detection models for blockchain. Afterwards, we present a thorough survey of various anomaly detection models from perspective of each layer of blockchain to provide readers an in-depth overview of integration that has been carried out till date. Finally, we conclude the article by highlighting certain important challenges alongside discussing that how they can serve as a future research directions for new researchers in the field.
翻译:过去十年来,供应链技术吸引了产业界和学术界的极大关注,因为它可以与大量日常应用结合起来,这些应用都与现代信息和通信技术的特点有关,因此,可以与大量日常应用结合起来。 因此,现在的异常检测模型通过提供强有力的安全和以信任为导向的保障,例如不易移动、可核查和权力下放,加强了这些应用。尽管这些障碍链技术给这些信通技术应用带来了这些令人难以置信的特征,但现代研究表明,这些强有力的保障还不够充分,封闭链网络可能仍然容易遇到各种安全、隐私和可靠性方面的问题。为了克服这些问题,必须及时查明异常行为。因此,现在的异常检测模型正在保护现代链网络方面发挥重要作用。这些异常检测模型自主地探测和预测网络中的异常现象,以保护网络免遭意外袭击。在文章中,我们对这些异常检测模型进行了深入的调查。我们首先讨论了异常检测如何有助于确保基于链的应用的安全。然后,我们展示了某些根本性的评估矩阵和关键的要求,从每一条系的深度的深度调查中,我们从一个关键的深度的深度的深度的深度的深度观察中,我们从开始,从开始,从一个关键的深度的深度的深度的深度的深度的深度的深度的深度观察,从开始,从一个深度的深度的深度的测测算。