{"id":"https://openalex.org/W7116930123","doi":"https://doi.org/10.1109/itnac66378.2025.11302763","title":"A Private Ethereum Testbed for Network Traffic Dataset Collection","display_name":"A Private Ethereum Testbed for Network Traffic Dataset Collection","publication_year":2025,"publication_date":"2025-11-26","ids":{"openalex":"https://openalex.org/W7116930123","doi":"https://doi.org/10.1109/itnac66378.2025.11302763"},"language":null,"primary_location":{"id":"doi:10.1109/itnac66378.2025.11302763","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac66378.2025.11302763","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 35th International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030994788","display_name":"Zubaida Rehman","orcid":"https://orcid.org/0000-0001-5825-3498"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Zubaida Rehman","raw_affiliation_strings":["RMIT University,School of Computing Technologies,Melbourne,Australia"],"affiliations":[{"raw_affiliation_string":"RMIT University,School of Computing Technologies,Melbourne,Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069000114","display_name":"Mark A. Gregory","orcid":"https://orcid.org/0000-0001-5587-4686"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mark A. Gregory","raw_affiliation_strings":["RMIT University,School of Engineering,Melbourne,Australia"],"affiliations":[{"raw_affiliation_string":"RMIT University,School of Engineering,Melbourne,Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110457886","display_name":"Iqbal Gondal","orcid":null},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Iqbal Gondal","raw_affiliation_strings":["RMIT University,School of Computing Technologies,Melbourne,Australia"],"affiliations":[{"raw_affiliation_string":"RMIT University,School of Computing Technologies,Melbourne,Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121059380","display_name":"Hai Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hai Dong","raw_affiliation_strings":["RMIT University,School of Computing Technologies,Melbourne,Australia"],"affiliations":[{"raw_affiliation_string":"RMIT University,School of Computing Technologies,Melbourne,Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121082754","display_name":"Mengmeng Ge","orcid":null},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mengmeng Ge","raw_affiliation_strings":["Monash University,Melbourne,Australia"],"affiliations":[{"raw_affiliation_string":"Monash University,Melbourne,Australia","institution_ids":["https://openalex.org/I56590836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5030994788"],"corresponding_institution_ids":["https://openalex.org/I82951845"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.76478341,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.35580000281333923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.35580000281333923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.24009999632835388,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.051100000739097595,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.8831999897956848},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6096000075340271},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4496999979019165},{"id":"https://openalex.org/keywords/planetlab","display_name":"PlanetLab","score":0.4408999979496002},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4169999957084656},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.37709999084472656},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.376800000667572},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.35600000619888306},{"id":"https://openalex.org/keywords/eclipse","display_name":"Eclipse","score":0.3458999991416931}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.8831999897956848},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7211999893188477},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6096000075340271},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.511900007724762},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4496999979019165},{"id":"https://openalex.org/C2780300890","wikidata":"https://www.wikidata.org/wiki/Q851973","display_name":"PlanetLab","level":3,"score":0.4408999979496002},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4325999915599823},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4169999957084656},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.37709999084472656},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.376800000667572},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.35600000619888306},{"id":"https://openalex.org/C2778505590","wikidata":"https://www.wikidata.org/wiki/Q141022","display_name":"Eclipse","level":2,"score":0.3458999991416931},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.33899998664855957},{"id":"https://openalex.org/C187713609","wikidata":"https://www.wikidata.org/wiki/Q2465461","display_name":"Default gateway","level":2,"score":0.3343000113964081},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.3262999951839447},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.3100999891757965},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.30889999866485596},{"id":"https://openalex.org/C95981142","wikidata":"https://www.wikidata.org/wiki/Q772532","display_name":"Peering","level":3,"score":0.3070000112056732},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.2957000136375427},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.28299999237060547},{"id":"https://openalex.org/C2781009160","wikidata":"https://www.wikidata.org/wiki/Q735604","display_name":"AspectJ","level":4,"score":0.28119999170303345},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.26249998807907104},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.26159998774528503},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.25999999046325684},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.2583000063896179},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.25600001215934753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac66378.2025.11302763","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac66378.2025.11302763","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 35th International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2969915801","https://openalex.org/W2971532963","https://openalex.org/W3211034881","https://openalex.org/W4324007065","https://openalex.org/W4387734759","https://openalex.org/W4390535926","https://openalex.org/W4407128477","https://openalex.org/W7084159323"],"related_works":[],"abstract_inverted_index":{"Ethereum":[0,25,42,95,120,185],"has":[1],"emerged":[2],"as":[3,118,126],"one":[4,123],"of":[5,67,75,92,103,184,219],"the":[6,24,39,65,73,88,158,162,202,204,211,220],"most":[7],"widely":[8],"used":[9],"blockchain":[10,70,138],"platforms,":[11],"underpinning":[12],"decentralized":[13],"finance,":[14],"smart":[15],"contracts,":[16],"and":[17,43,48,55,72,90,122,144,147,174,197,213,216,225],"distributed":[18],"applications.":[19],"With":[20],"its":[21],"growing":[22],"adoption,":[23],"peer-to-peer":[26],"network":[27,57,163],"is":[28,155],"susceptible":[29],"to":[30,41,44,64,160,167,192],"networklayer":[31],"attacks":[32],"including":[33],"eclipse":[34,132,209],"(node-isolation)":[35],"attacks.":[36,133],"To":[37],"study":[38],"threats":[40],"develop":[45],"effective":[46],"detection":[47,224],"mitigation":[49],"strategies,":[50],"researchers":[51],"require":[52],"controlled,":[53],"reproducible,":[54],"labeled":[56,190],"datasets.":[58],"However,":[59],"datasets":[60],"are":[61],"scarce":[62],"due":[63],"complexity":[66],"capturing":[68],"live":[69],"traffic":[71,189],"difficulty":[74],"confidently":[76],"labeling":[77,214],"malicious":[78,128],"activity":[79],"on":[80,151,157],"public":[81],"networks.":[82],"In":[83],"this":[84],"paper,":[85],"we":[86],"present":[87],"design":[89],"deployment":[91],"a":[93,112,127,181],"private":[94],"testbed":[96,101,135],"for":[97,172,207,222],"dataset":[98,179,221],"collection.":[99],"Our":[100],"consists":[102],"five":[104],"virtual":[105],"machines":[106],"running":[107],"Geth":[108],"clients":[109],"interconnected":[110],"via":[111],"controlled":[113],"gateway:":[114],"four":[115],"nodes":[116],"act":[117],"benign":[119,173],"peers":[121],"node":[124,152],"acts":[125],"entity":[129],"that":[130],"performs":[131],"The":[134,177],"emulates":[136],"normal":[137],"operations":[139],"(block":[140],"propagation,":[141],"transaction":[142],"exchanges,":[143],"peer":[145],"discovery)":[146],"adversarial":[148],"scenarios":[149],"focused":[150],"isolation.":[153],"Wireshark":[154],"deployed":[156],"gateway":[159],"capture":[161,212],"traffic,":[164],"enabling":[165],"us":[166],"record":[168],"raw":[169],"packet":[170],"traces":[171],"attack":[175,198,205],"scenarios.":[176],"resulting":[178],"provides":[180],"comprehensive":[182],"view":[183],"network-layer":[186],"behavior,":[187],"with":[188],"according":[191],"ground":[193],"truth":[194],"(node":[195],"role":[196],"phase).":[199],"We":[200],"describe":[201],"testbed,":[203],"procedure":[206],"generating":[208],"conditions,":[210],"pipeline,":[215],"potential":[217],"uses":[218],"intrusion":[223],"resilience":[226],"analysis.":[227]},"counts_by_year":[],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-12-23T00:00:00"}
