Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange

Suah Kim, Beomjoong Kim, Hyong Joong Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Bitcoin exchanges rely heavily on traditional intrusion detection system to secure their system. However, this reliance has proven to be high risk, since Bitcoin and other blockchain-based transactions are not easily reversible. Many of the attacks have shown that the traditional intrusion detection system is not enough to safeguard against all possible attacks, and most importantly, in some cases, it takes a long time to assess the damage. In this paper, we first describe three types of intrusion models in Bitcoin exchanges and propose a detection and mitigation system using blockchain analysis for each. The proposed detection and mitigation system exploit the decentralized and public nature of Bitcoin blockchain to complement the existing traditional intrusion detection system as a fail-safe. The proposed method provides real-time intrusion detection capability that the existing work cannot provide. Although the proposed method is specifically for Bitcoin blockchain, similar ideas can be extended to other proof-of-work based blockchain cryptocurrencies.

Original languageEnglish
Title of host publicationProceedings of 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018
PublisherAssociation for Computing Machinery
Pages40-44
Number of pages5
ISBN (Electronic)9781450365765
DOIs
Publication statusPublished - 2018 Oct 29
Event2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018 - Singapore, Singapore
Duration: 2018 Oct 292018 Oct 31

Publication series

NameACM International Conference Proceeding Series

Conference

Conference2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018
CountrySingapore
CitySingapore
Period18/10/2918/10/31

Fingerprint

Intrusion detection

Keywords

  • Bitcoin
  • Bitcoin exchange
  • Blockchain
  • Blockchain analysis
  • Intrusion detection system
  • Mitigation

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Cite this

Kim, S., Kim, B., & Kim, H. J. (2018). Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange. In Proceedings of 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018 (pp. 40-44). (ACM International Conference Proceeding Series). Association for Computing Machinery. https://doi.org/10.1145/3291064.3291075

Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange. / Kim, Suah; Kim, Beomjoong; Kim, Hyong Joong.

Proceedings of 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018. Association for Computing Machinery, 2018. p. 40-44 (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, S, Kim, B & Kim, HJ 2018, Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange. in Proceedings of 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018. ACM International Conference Proceeding Series, Association for Computing Machinery, pp. 40-44, 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018, Singapore, Singapore, 18/10/29. https://doi.org/10.1145/3291064.3291075
Kim S, Kim B, Kim HJ. Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange. In Proceedings of 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018. Association for Computing Machinery. 2018. p. 40-44. (ACM International Conference Proceeding Series). https://doi.org/10.1145/3291064.3291075
Kim, Suah ; Kim, Beomjoong ; Kim, Hyong Joong. / Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange. Proceedings of 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018. Association for Computing Machinery, 2018. pp. 40-44 (ACM International Conference Proceeding Series).
@inproceedings{3ede10465c314b6faf837c1f1b0623c4,
title = "Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange",
abstract = "Bitcoin exchanges rely heavily on traditional intrusion detection system to secure their system. However, this reliance has proven to be high risk, since Bitcoin and other blockchain-based transactions are not easily reversible. Many of the attacks have shown that the traditional intrusion detection system is not enough to safeguard against all possible attacks, and most importantly, in some cases, it takes a long time to assess the damage. In this paper, we first describe three types of intrusion models in Bitcoin exchanges and propose a detection and mitigation system using blockchain analysis for each. The proposed detection and mitigation system exploit the decentralized and public nature of Bitcoin blockchain to complement the existing traditional intrusion detection system as a fail-safe. The proposed method provides real-time intrusion detection capability that the existing work cannot provide. Although the proposed method is specifically for Bitcoin blockchain, similar ideas can be extended to other proof-of-work based blockchain cryptocurrencies.",
keywords = "Bitcoin, Bitcoin exchange, Blockchain, Blockchain analysis, Intrusion detection system, Mitigation",
author = "Suah Kim and Beomjoong Kim and Kim, {Hyong Joong}",
year = "2018",
month = "10",
day = "29",
doi = "10.1145/3291064.3291075",
language = "English",
series = "ACM International Conference Proceeding Series",
publisher = "Association for Computing Machinery",
pages = "40--44",
booktitle = "Proceedings of 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018",

}

TY - GEN

T1 - Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange

AU - Kim, Suah

AU - Kim, Beomjoong

AU - Kim, Hyong Joong

PY - 2018/10/29

Y1 - 2018/10/29

N2 - Bitcoin exchanges rely heavily on traditional intrusion detection system to secure their system. However, this reliance has proven to be high risk, since Bitcoin and other blockchain-based transactions are not easily reversible. Many of the attacks have shown that the traditional intrusion detection system is not enough to safeguard against all possible attacks, and most importantly, in some cases, it takes a long time to assess the damage. In this paper, we first describe three types of intrusion models in Bitcoin exchanges and propose a detection and mitigation system using blockchain analysis for each. The proposed detection and mitigation system exploit the decentralized and public nature of Bitcoin blockchain to complement the existing traditional intrusion detection system as a fail-safe. The proposed method provides real-time intrusion detection capability that the existing work cannot provide. Although the proposed method is specifically for Bitcoin blockchain, similar ideas can be extended to other proof-of-work based blockchain cryptocurrencies.

AB - Bitcoin exchanges rely heavily on traditional intrusion detection system to secure their system. However, this reliance has proven to be high risk, since Bitcoin and other blockchain-based transactions are not easily reversible. Many of the attacks have shown that the traditional intrusion detection system is not enough to safeguard against all possible attacks, and most importantly, in some cases, it takes a long time to assess the damage. In this paper, we first describe three types of intrusion models in Bitcoin exchanges and propose a detection and mitigation system using blockchain analysis for each. The proposed detection and mitigation system exploit the decentralized and public nature of Bitcoin blockchain to complement the existing traditional intrusion detection system as a fail-safe. The proposed method provides real-time intrusion detection capability that the existing work cannot provide. Although the proposed method is specifically for Bitcoin blockchain, similar ideas can be extended to other proof-of-work based blockchain cryptocurrencies.

KW - Bitcoin

KW - Bitcoin exchange

KW - Blockchain

KW - Blockchain analysis

KW - Intrusion detection system

KW - Mitigation

UR - http://www.scopus.com/inward/record.url?scp=85061284797&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85061284797&partnerID=8YFLogxK

U2 - 10.1145/3291064.3291075

DO - 10.1145/3291064.3291075

M3 - Conference contribution

AN - SCOPUS:85061284797

T3 - ACM International Conference Proceeding Series

SP - 40

EP - 44

BT - Proceedings of 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018

PB - Association for Computing Machinery

ER -