TY - JOUR
T1 - A Detection Method Against Selfish Mining-Like Attacks Based On Ensemble Deep Learning in IoT
AU - Wang, Yilei
AU - Li, Chunmei
AU - Zhang, Yiting
AU - Li, Tao
AU - Ning, Jianting
AU - Gai, Keke
AU - Choo, Kim Kwang Raymond
N1 - Publisher Copyright:
IEEE
PY - 2024
Y1 - 2024
N2 - Cryptojacking is a new type of IoT (Internet of Things) attack, where an attacker hijacks the computing power of IoT devices such as wireless routers, smart TVs, set-top boxes, or cameras to mine cryptocurrencies, e.g., PyRoMineIoT. The attackers launch selfish mining-like (SM-like) attacks to obtain lucrative mining rewards with the stolen computing power, once the power exceeds a threshold. Generally, a single deep learning (DL) model with a single feature (e.g. fork height) is trained to detect SM-like attacks. However, the existing model fails to detect every SM-like attack since the model training ignores other distinctive features (e.g. mining rewards and blocking rate) of SM-like attacks. In this paper, SM-NEEDLE, an eNsEmblE Deep LEarning (NEEDLE) method is proposed to detect SM-like attacks. More specifically, the distinctive features are extracted from the blockchain system, where SM-like simulators emulate the strategies of SM-like attacks. Further, to circumvent the local optima problem caused by the single DL model (e.g. Back-Propagation Neural Network, BPNN), the SM-NEEDLE trains multiple BPNNs with these distinctive features. Evaluation results indicate the accuracy and false negative rate (FNR) of SM-NEEDLE for detecting SM-like attacks (including SM1 and its variants) are 98.9% and 1.48% respectively. That is, 98.9% of SM-like attacks are correctly identified and only 1.48% of attacks are undetectable.
AB - Cryptojacking is a new type of IoT (Internet of Things) attack, where an attacker hijacks the computing power of IoT devices such as wireless routers, smart TVs, set-top boxes, or cameras to mine cryptocurrencies, e.g., PyRoMineIoT. The attackers launch selfish mining-like (SM-like) attacks to obtain lucrative mining rewards with the stolen computing power, once the power exceeds a threshold. Generally, a single deep learning (DL) model with a single feature (e.g. fork height) is trained to detect SM-like attacks. However, the existing model fails to detect every SM-like attack since the model training ignores other distinctive features (e.g. mining rewards and blocking rate) of SM-like attacks. In this paper, SM-NEEDLE, an eNsEmblE Deep LEarning (NEEDLE) method is proposed to detect SM-like attacks. More specifically, the distinctive features are extracted from the blockchain system, where SM-like simulators emulate the strategies of SM-like attacks. Further, to circumvent the local optima problem caused by the single DL model (e.g. Back-Propagation Neural Network, BPNN), the SM-NEEDLE trains multiple BPNNs with these distinctive features. Evaluation results indicate the accuracy and false negative rate (FNR) of SM-NEEDLE for detecting SM-like attacks (including SM1 and its variants) are 98.9% and 1.48% respectively. That is, 98.9% of SM-like attacks are correctly identified and only 1.48% of attacks are undetectable.
KW - Biological neural networks
KW - Blockchain
KW - Data mining
KW - Deep learning
KW - Feature extraction
KW - Internet of Things
KW - Needles
KW - Training
KW - back-propagation neural network
KW - ensemble deep learning
KW - selfish mining attack
UR - http://www.scopus.com/inward/record.url?scp=85186077060&partnerID=8YFLogxK
U2 - 10.1109/JIOT.2024.3367689
DO - 10.1109/JIOT.2024.3367689
M3 - Article
AN - SCOPUS:85186077060
SN - 2327-4662
SP - 1
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
ER -