{"id":"https://openalex.org/W3173162515","doi":"https://doi.org/10.1109/icbc51069.2021.9461119","title":"Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking","display_name":"Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking","publication_year":2021,"publication_date":"2021-05-03","ids":{"openalex":"https://openalex.org/W3173162515","doi":"https://doi.org/10.1109/icbc51069.2021.9461119","mag":"3173162515"},"language":"en","primary_location":{"id":"doi:10.1109/icbc51069.2021.9461119","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icbc51069.2021.9461119","pdf_url":null,"source":{"id":"https://openalex.org/S4363608612","display_name":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101877231","display_name":"Jinoh Kim","orcid":"https://orcid.org/0000-0002-9835-1866"},"institutions":[{"id":"https://openalex.org/I206651237","display_name":"Texas A&M University \u2013 Commerce","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jinoh Kim","raw_affiliation_strings":["Texas A&M University, Commerce, TX, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Texas A&M University, Commerce, TX, USA","institution_ids":["https://openalex.org/I206651237"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053208227","display_name":"Makiya Nakashima","orcid":null},"institutions":[{"id":"https://openalex.org/I206651237","display_name":"Texas A&M University \u2013 Commerce","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Makiya Nakashima","raw_affiliation_strings":["Texas A&M University, Commerce, TX, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Texas A&M University, Commerce, TX, USA","institution_ids":["https://openalex.org/I206651237"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058487069","display_name":"Wenjun Fan","orcid":"https://orcid.org/0000-0002-7363-9695"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenjun Fan","raw_affiliation_strings":["University of Colorado, Colorado Springs, CO, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Colorado, Colorado Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080519285","display_name":"Simeon Wuthier","orcid":"https://orcid.org/0000-0003-4088-7518"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Simeon Wuthier","raw_affiliation_strings":["University of Colorado, Colorado Springs, CO, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Colorado, Colorado Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078528016","display_name":"Xiaobo Zhou","orcid":"https://orcid.org/0000-0002-0466-7609"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaobo Zhou","raw_affiliation_strings":["University of Colorado, Colorado Springs, CO, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Colorado, Colorado Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084546292","display_name":"Ikkyun Kim","orcid":"https://orcid.org/0000-0001-8915-3270"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ikkyun Kim","raw_affiliation_strings":["Cybersecurity Research Division, ETRI, Daejeon, Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cybersecurity Research Division, ETRI, Daejeon, Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025389734","display_name":"Sang\u2010Yoon Chang","orcid":"https://orcid.org/0000-0002-5736-5823"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sang-Yoon Chang","raw_affiliation_strings":["University of Colorado, Colorado Springs, CO, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Colorado, Colorado Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101877231"],"corresponding_institution_ids":["https://openalex.org/I206651237"],"apc_list":null,"apc_paid":null,"fwci":10.8247,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.99579208,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.780571460723877},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7184033989906311},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.633431077003479},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.5971192717552185},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5069313645362854},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.50301593542099},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4638044834136963},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.4606381356716156},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38067013025283813},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3553324043750763},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17248591780662537},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09260869026184082}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.780571460723877},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7184033989906311},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.633431077003479},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.5971192717552185},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5069313645362854},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.50301593542099},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4638044834136963},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.4606381356716156},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38067013025283813},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3553324043750763},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17248591780662537},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09260869026184082},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icbc51069.2021.9461119","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icbc51069.2021.9461119","pdf_url":null,"source":{"id":"https://openalex.org/S4363608612","display_name":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320322093","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W13439346","https://openalex.org/W154851090","https://openalex.org/W179922057","https://openalex.org/W1444567531","https://openalex.org/W1487321909","https://openalex.org/W2122646361","https://openalex.org/W2126363659","https://openalex.org/W2128564705","https://openalex.org/W2134490011","https://openalex.org/W2185744359","https://openalex.org/W2295506186","https://openalex.org/W2296509296","https://openalex.org/W2398336627","https://openalex.org/W2513903144","https://openalex.org/W2613634265","https://openalex.org/W2746911092","https://openalex.org/W2768696376","https://openalex.org/W2770856063","https://openalex.org/W2782052028","https://openalex.org/W2783095957","https://openalex.org/W2792991436","https://openalex.org/W2863404985","https://openalex.org/W2885619172","https://openalex.org/W2886020981","https://openalex.org/W2891698621","https://openalex.org/W2900483609","https://openalex.org/W2950226614","https://openalex.org/W2955050922","https://openalex.org/W2963197901","https://openalex.org/W2963264685","https://openalex.org/W2963424284","https://openalex.org/W2963655955","https://openalex.org/W2964139938","https://openalex.org/W2969495950","https://openalex.org/W2992906453","https://openalex.org/W2997442262","https://openalex.org/W3005641848","https://openalex.org/W3097993951","https://openalex.org/W3134716518","https://openalex.org/W3151748982","https://openalex.org/W3153872861","https://openalex.org/W4211068006","https://openalex.org/W4248175462","https://openalex.org/W4289236186","https://openalex.org/W4289760775","https://openalex.org/W4295720041","https://openalex.org/W4387237490","https://openalex.org/W6606249588","https://openalex.org/W6686453509","https://openalex.org/W6737658843","https://openalex.org/W6742947867","https://openalex.org/W6753388362","https://openalex.org/W6754543342","https://openalex.org/W6793285265","https://openalex.org/W7016021835"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W2791075267","https://openalex.org/W3186512740","https://openalex.org/W3017266184","https://openalex.org/W2918377632","https://openalex.org/W3194885736","https://openalex.org/W3046391934","https://openalex.org/W4363671829"],"abstract_inverted_index":{"While":[0],"the":[1,9,12,15,73,77,102,118,131,152,185,188,230,233],"blockchain":[2,17,49,65,74,105,133,200],"technology":[3],"provides":[4],"strong":[5],"cryptographic":[6],"protection":[7],"on":[8,72,101,157,176],"ledger":[10,75,111],"and":[11,33,51,64,82,123,135,168,217],"system":[13],"operations,":[14],"underlying":[16,132],"networking":[18,201],"remains":[19],"vulnerable":[20],"due":[21],"to":[22,54,113,213,229],"potential":[23],"threats":[24],"such":[25,38],"as":[26],"denial":[27],"of":[28,86,104,120,163,178,187,196,232],"service":[29],"(DoS),":[30],"Eclipse,":[31],"spoofing,":[32],"Sybil":[34],"attacks.":[35],"Effectively":[36],"detecting":[37,164],"malicious":[39,115,197],"events":[40,198],"should":[41],"thus":[42],"be":[43],"an":[44],"essential":[45],"task":[46],"for":[47,192,215,219],"securing":[48],"networks":[50],"services.":[52],"Due":[53],"its":[55],"importance,":[56],"several":[57],"studies":[58],"investigated":[59],"anomaly":[60,124,145],"detection":[61,146,173,195],"in":[62,76,140,209],"Bitcoin":[63],"networks,":[66],"but":[67],"their":[68],"analyses":[69],"mainly":[70],"focused":[71],"application":[78],"context":[79],"(e.g.,":[80,88],"transactions)":[81],"targets":[83],"specific":[84],"types":[85],"attacks":[87],"double-spending,":[89],"deanonymization,":[90],"etc).":[91],"In":[92],"this":[93],"study,":[94],"we":[95,169],"present":[96],"a":[97,141],"security":[98,190],"mechanism":[99,191],"based":[100,156],"analysis":[103],"network":[106],"traffic":[107,134,202],"statistics":[108],"(rather":[109],"than":[110],"data)":[112],"detect":[114],"events,":[116],"through":[117],"functions":[119],"data":[121,127,138,154],"collection":[122,128],"detection.":[125],"The":[126,144],"engine":[129,147,174],"senses":[130],"generates":[136],"multi-dimensional":[137],"streams":[139],"periodic":[142],"manner.":[143],"then":[148],"detects":[149],"anomalies":[150],"from":[151,199],"created":[153],"instances":[155],"semi-supervised":[158],"learning,":[159],"which":[160],"is":[161],"capable":[162],"previously":[165],"unseen":[166],"patterns,":[167],"introduce":[170],"our":[171],"profiling-based":[172],"implemented":[175],"top":[177],"AutoEncoder":[179],"(AE).":[180],"Our":[181],"experimental":[182],"results":[183],"support":[184],"effectiveness":[186],"presented":[189],"accurate,":[193],"online":[194],"data.":[203],"We":[204],"also":[205],"show":[206],"further":[207],"reduction":[208],"time":[210],"complexity":[211],"(up":[212],"66.8%":[214],"training":[216],"85.7%":[218],"testing),":[220],"without":[221],"any":[222],"performance":[223],"degradation":[224],"using":[225],"feature":[226],"prioritization":[227],"compared":[228],"utilization":[231],"entire":[234],"features.":[235]},"counts_by_year":[{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":4}],"updated_date":"2026-05-10T08:33:47.465468","created_date":"2025-10-10T00:00:00"}
