Over the past decade, blockchain technology has attracted a huge attention from both industry and academia because it can be integrated with a large number of everyday applications working over features of modern information and communication technologies (ICT). Peer-to-peer (P2) architecture of blockchain enhances these applications by providing strong security and trust-oriented guarantees, such as immutability, verifiability, and decentralization. Despite these incredible features} that blockchain technology brings to these ICT applications, \rev{modern research has indicated that these strong} guarantees are not sufficient enough and blockchain \rev{networks may still be prone to various security, privacy, and reliability related issues. In order to overcome these issues, it is important to identify the anomalous behaviour within the actionable time frame. In this article, we provide an in-depth survey regarding integration of anomaly detection models in blockchain technology. For this, we first discuss how anomaly detection can aid in ensuring security of blockchain based applications. Then, we demonstrate certain fundamental evaluation matrices and key requirements that can play a critical role while developing anomaly detection models for blockchain. Afterwards, we present a thorough survey of various anomaly detection models from the perspective of each layer of blockchain} to provide readers an in-depth overview of integration that has been carried out till date. Finally, we conclude the article by highlighting certain \rev{important challenges alongside discussing how they can serve as future research directions for new researchers in the field.
翻译:过去十年来,供应链技术吸引了产业和学术界的极大关注,因为它可以与大量日常应用结合起来,这些应用都与现代信息和通信技术的特点有关,因此可以与大量日常应用结合起来。为了克服这些问题,必须确定在可操作的时间框架内的反常行为。在本篇文章中,我们就将异常检测模型纳入封闭链技术提供了深入的调查。为此,我们首先讨论闭链技术为这些应用带来的这些令人难以置信的特征如何能有助于确保基于封锁的应用的安全。然后,我们展示某些基本的评估矩阵和关键要求,它们可以发挥关键的作用,同时开发与障碍相关的异常检测模型。之后,我们从各个深度的深度研究角度,从每个层次到每个层次的深度研究,我们讨论各种异常检测模型的深度调查。