{"id":"https://openalex.org/W4285224718","doi":"https://doi.org/10.1109/tnsm.2022.3173598","title":"A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking","display_name":"A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking","publication_year":2022,"publication_date":"2022-05-09","ids":{"openalex":"https://openalex.org/W4285224718","doi":"https://doi.org/10.1109/tnsm.2022.3173598"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2022.3173598","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3173598","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101877231","display_name":"Jinoh Kim","orcid":"https://orcid.org/0000-0002-9835-1866"},"institutions":[{"id":"https://openalex.org/I206651237","display_name":"East Texas A&M University","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jinoh Kim","raw_affiliation_strings":["Computer Science Department, Texas A&#x0026;M University, Commerce, TX, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Texas A&#x0026;M University, Commerce, TX, USA","institution_ids":["https://openalex.org/I206651237"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053208227","display_name":"Makiya Nakashima","orcid":null},"institutions":[{"id":"https://openalex.org/I206651237","display_name":"East Texas A&M University","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Makiya Nakashima","raw_affiliation_strings":["Computer Science Department, Texas A&#x0026;M University, Commerce, TX, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Texas A&#x0026;M University, Commerce, TX, USA","institution_ids":["https://openalex.org/I206651237"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058487069","display_name":"Wenjun Fan","orcid":"https://orcid.org/0000-0002-7363-9695"},"institutions":[{"id":"https://openalex.org/I69356397","display_name":"Xi\u2019an Jiaotong-Liverpool University","ror":"https://ror.org/03zmrmn05","country_code":"CN","type":"education","lineage":["https://openalex.org/I69356397"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjun Fan","raw_affiliation_strings":["Department of Communications and Networking, School of Advanced Technology, Xi&#x2019;an Jiaotong&#x2013;Liverpool University, Jiangsu, Suzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Communications and Networking, School of Advanced Technology, Xi&#x2019;an Jiaotong&#x2013;Liverpool University, Jiangsu, Suzhou, China","institution_ids":["https://openalex.org/I69356397"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080519285","display_name":"Simeon Wuthier","orcid":"https://orcid.org/0000-0003-4088-7518"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Simeon Wuthier","raw_affiliation_strings":["Department of Computer Science, University of Colorado, Colorado Springs, CO, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Colorado, Colorado Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078528016","display_name":"Xiaobo Zhou","orcid":"https://orcid.org/0000-0002-0466-7609"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaobo Zhou","raw_affiliation_strings":["Department of Computer Science, University of Colorado, Colorado Springs, CO, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Colorado, Colorado Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084546292","display_name":"Ikkyun Kim","orcid":"https://orcid.org/0000-0001-8915-3270"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ikkyun Kim","raw_affiliation_strings":["Cybersecurity Research Division, ETRI, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Research Division, ETRI, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025389734","display_name":"Sang\u2010Yoon Chang","orcid":"https://orcid.org/0000-0002-5736-5823"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sang-Yoon Chang","raw_affiliation_strings":["Department of Computer Science, University of Colorado, Colorado Springs, CO, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Colorado, Colorado Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101877231"],"corresponding_institution_ids":["https://openalex.org/I206651237"],"apc_list":null,"apc_paid":null,"fwci":6.2803,"has_fulltext":false,"cited_by_count":48,"citation_normalized_percentile":{"value":0.96944584,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"19","issue":"3","first_page":"3619","last_page":"3632"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8342947363853455},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8019218444824219},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.6188222765922546},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5341562032699585},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.5288706421852112},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5189685225486755},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5092440843582153},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.44548147916793823},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.41142237186431885},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3566470742225647},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28809887170791626}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8342947363853455},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8019218444824219},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.6188222765922546},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5341562032699585},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.5288706421852112},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5189685225486755},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5092440843582153},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44548147916793823},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.41142237186431885},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3566470742225647},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28809887170791626},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2022.3173598","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3173598","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2896300088","display_name":null,"funder_award_id":"20ZR1300","funder_id":"https://openalex.org/F4320322093","funder_display_name":"Electronics and Telecommunications Research Institute"},{"id":"https://openalex.org/G6345125027","display_name":null,"funder_award_id":"1922410","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320322093","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W13439346","https://openalex.org/W154851090","https://openalex.org/W179922057","https://openalex.org/W1444567531","https://openalex.org/W1487321909","https://openalex.org/W2122646361","https://openalex.org/W2126363659","https://openalex.org/W2128564705","https://openalex.org/W2134490011","https://openalex.org/W2135106139","https://openalex.org/W2295506186","https://openalex.org/W2296509296","https://openalex.org/W2340896621","https://openalex.org/W2398336627","https://openalex.org/W2562900330","https://openalex.org/W2613634265","https://openalex.org/W2756489700","https://openalex.org/W2768696376","https://openalex.org/W2770856063","https://openalex.org/W2782052028","https://openalex.org/W2783095957","https://openalex.org/W2792991436","https://openalex.org/W2810550035","https://openalex.org/W2885619172","https://openalex.org/W2886020981","https://openalex.org/W2891698621","https://openalex.org/W2900483609","https://openalex.org/W2904539465","https://openalex.org/W2936932113","https://openalex.org/W2955050922","https://openalex.org/W2963197901","https://openalex.org/W2963264685","https://openalex.org/W2963655955","https://openalex.org/W2964139938","https://openalex.org/W2969495950","https://openalex.org/W2981083866","https://openalex.org/W2997442262","https://openalex.org/W3005641848","https://openalex.org/W3037979863","https://openalex.org/W3087827179","https://openalex.org/W3134716518","https://openalex.org/W3151748982","https://openalex.org/W3153872861","https://openalex.org/W3173162515","https://openalex.org/W3197373657","https://openalex.org/W4211068006","https://openalex.org/W4248175462","https://openalex.org/W4289236186","https://openalex.org/W4289760775","https://openalex.org/W4293321333","https://openalex.org/W4295720041","https://openalex.org/W6680272842","https://openalex.org/W6686453509","https://openalex.org/W6737658843","https://openalex.org/W6748366383","https://openalex.org/W6753388362","https://openalex.org/W6754543342"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W2791075267","https://openalex.org/W3186512740","https://openalex.org/W3194885736","https://openalex.org/W4363671829"],"abstract_inverted_index":{"While":[0],"blockchain":[1,16,48,64,73,104,132],"technology":[2],"provides":[3],"strong":[4],"cryptographic":[5],"protection":[6],"on":[7,71,100,157,176,202,242],"the":[8,11,14,72,76,101,117,130,152,192,203,207,212,218],"ledger":[9,74,110],"and":[10,32,50,63,81,122,134,168,187,198],"system":[12],"operations,":[13],"underlying":[15,131],"networking":[17],"remains":[18],"vulnerable":[19],"due":[20],"to":[21,53,112,211,230],"potential":[22],"threats":[23],"such":[24,37],"as":[25],"denial":[26],"of":[27,85,103,119,163,178,194,220],"service":[28],"(DoS),":[29],"Eclipse,":[30],"spoofing,":[31],"Sybil":[33],"attacks.":[34],"Effectively":[35],"detecting":[36,164],"malicious":[38,114],"events":[39],"should":[40],"thus":[41],"be":[42],"an":[43],"essential":[44],"task":[45],"for":[46,239],"securing":[47],"networks":[49],"services.":[51],"Due":[52],"its":[54],"importance,":[55],"several":[56],"studies":[57],"investigated":[58],"anomaly":[59,123,145],"detection":[60,146,173,209],"in":[61,75,139],"Bitcoin":[62],"networks,":[65],"but":[66],"their":[67],"analyses":[68],"mainly":[69],"focused":[70],"application":[77],"context":[78],"(e.g.,":[79,87],"transactions)":[80],"targets":[82],"specific":[83],"types":[84],"attacks":[86],"double-spending,":[88],"deanonymization,":[89],"etc).":[90],"In":[91],"this":[92],"study,":[93],"we":[94,169],"present":[95],"a":[96,140,243],"security":[97,196],"mechanism":[98,197],"based":[99,156,201],"analysis":[102],"network":[105],"traffic":[106,133,189],"statistics":[107],"(rather":[108],"than":[109,236],"data)":[111],"detect":[113],"events,":[115],"through":[116,217],"functions":[118],"data":[120,126,137,154,190],"collection":[121,127],"detection.":[124],"The":[125,144,223],"engine":[128,147,174],"senses":[129],"generates":[135],"multi-dimensional":[136],"streams":[138],"periodic,":[141],"real-time":[142,232],"manner.":[143],"then":[148],"detects":[149],"anomalies":[150],"from":[151],"created":[153],"instances":[155],"semi-supervised":[158],"learning,":[159],"which":[160],"is":[161,227],"capable":[162],"previously":[165],"unseen":[166],"patterns,":[167],"introduce":[170],"our":[171,195],"profiling-based":[172],"implemented":[175],"top":[177],"AutoEncoder":[179],"(AE).":[180],"Our":[181],"experimental":[182],"results":[183],"evaluated":[184],"with":[185,206,234],"real":[186],"simulated":[188],"support":[191],"effectiveness":[193],"design":[199],"choices":[200],"AE":[204],"structure,":[205],"approximate":[208],"performance":[210],"supervised":[213],"learning":[214],"methods":[215],"only":[216],"profiling":[219],"normal":[221],"instances.":[222],"measured":[224],"time":[225],"complexity":[226],"sufficiently":[228],"cheap":[229],"perform":[231],"analysis,":[233],"less":[235],"1.4":[237],"msec":[238],"per-instance":[240],"testing":[241],"single":[244],"core":[245],"setting.":[246]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":18},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":3}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
