信息网络安全 ›› 2024, Vol. 24 ›› Issue (1): 24-35.doi: 10.3969/j.issn.1671-1122.2024.01.003

• 区块链与可信交易 • 上一篇    下一篇

一种基于AdaBoost模型的区块链异常交易检测方案

宋玉涵(), 祝跃飞, 魏福山   

  1. 中国人民解放军信息工程大学网络空间安全学院,郑州 450001
  • 收稿日期:2023-08-02 出版日期:2024-01-10 发布日期:2024-01-24
  • 通讯作者: 宋玉涵 E-mail:lynn.redhead@hotmail.com
  • 作者简介:宋玉涵(1989—),女,安徽,博士研究生,主要研究方向为隐私计算和区块链|祝跃飞(1962—),男,浙江,教授,博士,主要研究方向为网络空间安全|魏福山(1983—),男,甘肃,副教授,博士,主要研究方向为密码学
  • 基金资助:
    国家自然科学基金(61772548);国家重点研发计划(2019QY1300);河南省优秀青年基金(222300420099);河南省重大公益项目(201300210200)

An Anomaly Detection Scheme for Blockchain Transactions Based on AdaBoost Model

SONG Yuhan(), ZHU Yuefei, WEI Fushan   

  1. Institute of Cyberspace Security, Information Engineering University of PLA, Zhengzhou 450001, China
  • Received:2023-08-02 Online:2024-01-10 Published:2024-01-24
  • Contact: SONG Yuhan E-mail:lynn.redhead@hotmail.com

摘要:

针对区块链系统加密货币交易记录中存在的盗币异常行为,文章基于AdaBoost模型提出一种具有隐私保护功能的异常交易检测方案。该方案采用加法同态加密和矩阵混淆技术,在有效识别并预测异常交易的同时,保证交易数据的隐私性。此外,在云外包环境中设计实现方案的底层协议,并证明了方案的正确性和隐私保护性质。与同类协议相比,该方案在保证隐私性的同时,具有较高的检测准确率和召回率,平均每条记录的检测时间为毫秒级,适用于真实加密货币交易的检测场景。

关键词: 隐私保护, 机器学习, 异常检测, 同态加密

Abstract:

In response to potential anomalous behaviors, such as coin theft in the transaction records of the blockchain-based cryptocurrency, a detection scheme with privacy protection function based on the adaptive boosting (AdaBoost) model was proposed. This scheme integrated additive homomorphic encryption and matrix perturbation techniques, ensuring the preservation of transaction data privacy while effectively identifying and predicting anomalies. The scheme’s underlying protocol was designed and implemented in a cloud outsourcing environment, and its correctness and privacy protection properties were proven. Compared with similar protocols, this scheme has high detection accuracy and recall while ensuring privacy. The detection time for each record was at the millisecond level, making it suitable for real cryptocurrency transaction detection scenarios.

Key words: privacy protection, machine learning, anomaly detection, homomorphic encryption

中图分类号: