<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Deep Learning Approach for Detecting Security Attacks on Blockchain</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Francesco Scicchitano</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Angelica Liguori</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Massimo Guarascio</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ettore Ritacco</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giuseppe Manco</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>ICAR-CNR</institution>
          ,
          <addr-line>Via P. Bucci, 8/9c, Rende</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In these last years, Blockchain technologies have been widely used in several application elds to improve data privacy and trustworthiness and security of systems. Although the blockchain is a powerful tool, it is not immune to cyber attacks: for instance, recently (January 2019) a successful 51% attack on Ethereum Classic has revealed security vulnerabilities of its platform. Under a statistical perspective, attacks can be seen as an anomalous observation, with a strong deviation from the regular behavior. Machine Learning is a science whose goal is to learn insights, patterns and outliers within large data repositories; hence, it can be exploit for blockchain attack detection. In this work, we de ne an anomaly detection system based on a encoder-decoder deep learning model, that is trained exploiting aggregate information extracted by monitoring blockchain activities. Experiments on complete historical logs of Ethereum Classic network prove the capability of the our model to e ectively detect the publicly reported attacks. To the best of our knowledge, our approach is the rst one that provides a comprehensive and feasible solution to monitor the security of blockchain transactions.</p>
      </abstract>
      <kwd-group>
        <kwd>{ Blockchain</kwd>
        <kwd>Anomaly detection</kwd>
        <kwd>Attack detection</kwd>
        <kwd>Autoencoders</kwd>
        <kwd>Sequence to sequence models</kwd>
        <kwd>Encoder-decoder models</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The Blockchain is largely considered an e ective solution able to ensure security and
trustworthiness. Nevertheless, it can be prone to attacks and security threats, as discussed in [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
In particular, Ethereum Classic (ETC), a permissionless (public) blockchain-based
decentralized platform for smart contracts [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], has recently experienced two signi cant attacks which
compromised the functionality of the network [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Roughly, the blockchain is characterized by a global ledger that can record transactions
e ciently and permanently through a timed sequence of blocks, called chain. Blocks contain
information about the transactions, and each block is added to the chain after a validation
process, based on a distributed consensus mechanism. Consensus is reached whenever a
sufcient number of nodes validates the block, that is then considered trustworthy. This whole
process is logged and it is possible to collect information characterizing the activities within the
underlying ledger. It is natural to ask whether such information can be exploited to monitor the
process and provide early analysis and detection mechanisms capable of reporting anomalous
situations and prospective attacks.</p>
      <p>
        Historically, data analysis techniques have been extensively exploited in the cyber security
domain [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], and the recent di usion of advanced machine learning techniques has allowed to
accurately identify cyber-attacks and detect threats, both real-time and in post-incident
analysis [
        <xref ref-type="bibr" rid="ref15 ref20">20, 15</xref>
        ]. Notably, both supervised and unsupervised machine learning algorithms have
been successfully employed to support intrusion detection and prevention systems, as well as to
detect system misuses and security breaches. The scenarios of interest are usually characterized
by a continuous stream of data (such as packet-level or application-level data) summarizing the
behavior of the underlying network or system. The role of the machine learning algorithms
consists either in identifying known attacks (supervised approach), or anomalous behavior
(unsupervised approach). Anomaly-based techniques are able to t normal system operating
status, isolating and identifying anomalies as unexpected behavioral deviations. For this reason,
anomaly detection approaches result to be appealing for their ability to detect zero-day attacks,
i.e., attacks exploiting unknown vulnerabilities.
      </p>
      <p>In this paper, we propose an encoder-decoder model that exploits the information collected
by the activities within a blockchain, to highlight anomalies in the underlying network activity,
that can represent a potential symptom of a forthcoming or current attack on the system
integrity. The contribution of the paper is twofold:</p>
      <p>We identify a set of properties to be computed from the blockchain logs, which describe
the status of the system at every time step.</p>
      <p>Next, we devise an unsupervised neural architecture, which takes as input a time series
representing the status of the blockchain network for a time window, able to compute a
score representing the degree of anomaly exhibited by the time series.</p>
      <p>Experiments on the historical logs of the ETC network show that the system is e ective in
detecting the reported attacks. To the best of our knowledge, our approach is the rst one that
provides a comprehensive and feasible solution to monitor the security of blockchain
transactions.</p>
      <p>The paper is organized as follows. In section 2 we review the architecture of the ETC
network and describe the attacks that exposed its potential vulnerabilities. We also review
how machine learning and blockchain technology have been combined in the current literature.
Section 3 provides two contributions: rst, it gives details about the structure of the ETC logs
and the preprocessing steps applied to engineer the relevant features describing the blockchain
status. Next, we discuss about the details of the Encoder/Decoder architecture. Section 4
describes the experiments that demonstrate the e ectiveness of the proposed architecture, and
nally in section 5 we discuss open problems and pointers to future directions.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background and Related Work</title>
      <p>
        The blockchain is a Distributed Ledger Technology [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], i.e. a system that allows to store
exchanges and information in a secure and permanent way. Given the structure and protocol,
blockchain removes the need to have intermediaries, who were previously required to act as
trusted third parties to verify, register and coordinate data.
      </p>
      <p>From a technical perspective, a blockchain is a distributed database shared into a
peer-topeer network: data are stored under the form of transactions within speci c structures named
blocks. Each block is the collection of all transactions performed in a time window and di erent
blocks may contain a di erent number of transactions. Blocks are connected by a cryptographic
bond in the chain: a hash function is computed on the concatenation of the signature of the
current block with the hash computed on the previous one. By repeating this step for each
block the chain is created and the references to the previous block are maintained, as shown in</p>
      <p>
        The security is guaranteed by a consensus mechanism that allows to con rm transactions
and produce new blocks. The most popular consensus algorithm is named "Proof-of-Work"
(PoW), rst adopted in the Bitcoin blockchain [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]: special nodes in the network, called miners,
compete in validating the blocks, and only one will produce the nal validation.
      </p>
      <p>
        PoW is considered a robust method, able to reach the Byzantine-fault-tolerant consensus
[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] and to minimize the risk for a Double Spending attack [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. In fact, any modi cation to
the ledger would require to re-validate all the blocks between the altered block and the current
one, before any other validation: the con rmation is achieved when at least 51% miners agree
about the validation.
      </p>
      <p>Originally, blockchain was proposed as a technology to support cryptocurrencies. It later
evolved with smart contracts, i.e. computer programs performed in decentralized way on
Blockchain so that they can be executed and veri ed automatically. ETC implements such
a technology, by providing a platform for decentralized applications that run and are regulated
on a distributed ledger. Each contract is composed of a sequence of operations whose cost is
expressed as gas, i.e., the amount of cryptocurrency that is deemed necessary to execute them.
Actually, ETC implements a priority mechanism of the transaction execution. The priority
depends on the provided gas, that corresponds to the fee received by the rst miner able to
compute the solution for the puzzle associated to a block: the higher the provided gas, the
higher the priority.</p>
      <p>
        Blockchain is not immune to attacks. The ETC network exhibits some vulnerabilities [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
and has experienced several attacks in the recent years. In particular, [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] reports an attack
on 18 June 2016 (referred as DAO from now on), where a vulnerability of the transaction
protocol was exploited. More recently, in January 2019 researchers con rmed a successful 51%
attack 1 on the ETC blockchain, where hackers were able to roll back transactions. Besides a
detailed analysis of the vulnerabilities and countermeasures to improve the robustness of the
overall architecture, it is natural to ask whether it is possible to devise an Intrusion or Anomaly
detection systems capable of detecting signals of malicious behaviors and issue early warnings.
However, to the best of our knowledge, only a limited number of approaches have been proposed
in the current literature.
      </p>
      <p>
        Signorini et al.[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] propose BAD, a blockchain anomaly detection system that collects
information from blocks in the main chain as well as orphan blocks (i.e., blocks contained within
pruned branches). There are two issues with this approach: rst of all the amount of considered
information could be infeasible to handle, as they aim at storing data about each branch
occurring on the blockchain; second, it would require nevertheless a modi cation of the protocol, as
1See http://cointelegraph.com/news/ethereum-classic-51-attack-the-reality-of-proof-of-work
information concerning the orphan blocks is not currently stored according to the blockchain
protocol speci cs.
      </p>
      <p>
        More similar to our approach is the study proposed in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Here, the authors propose a visual
analytical approach where statistics are collected from Ethereum public blockchain and
visualized through a chronological dashboard. The authors show that the collected statistics allow
to detect the DAO attack, by highlighting an anomalous peak close to the corresponding date.
Our method extends this approach by proposing a fully automatic and accurate architecture
based on deep neural networks.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Methodology</title>
      <p>In this section we devise a machine learning approach to identify anomalies in the usage of
Blockchain-based systems. As discussed before, the approach we propose is essentially
unsupervised, due to the lack of labeled data: successful attacks represent very rare events and
typically they don't share common patterns. As a consequence, supervised models exhibit poor
detection performances.</p>
      <p>The proposed anomaly detection system builds a neural encoder-decoder model, capable of
summarizing the information about the status of the ledger within a latent space and then to
rebuild the original information from this space. The underlying intuition is that, whenever
the current status is consistent, the encoding/decoding operation preserves the basic properties
of the data. By contrast, anomalous situations exhibit inconsistent values that ultimately
result in a failing reconstruction. This happens, for example, when the amount of ether (the
cryptocurrency of the ETC blockchain) is anomalously high compared to all the remaining
parameters of the system. An encoder-decoder would interpret this quantity as noise and
consequently would ignore such a value in the reconstruction. As a consequence, the di erence
between the original and the reconstructed values would highlight the anomalous situation and
consequently trigger the alert.</p>
      <p>The model works on sequences of temporally-sorted events. Formally, we assume that
the data is organized as a sequence X = f~x1; : : : ; ~xN g relative to a period of observation,
where ~xt is a vector of features describing the t-th event in chronological order within X. An
anomaly is an unexpected event in X, i.e. a vector ~xt signi cantly di erent from its neighbors
~xt w; : : : ; ~xt 1; ~xt+1; : : : ; ~xt+v (for a given window [t w; t + v] to be determined). Thus, the
model should be capable of summarizing all the regularities in the data that characterize the
sequence ~xt w; : : : ; ~xt+v.</p>
      <p>
        Autoencoders [
        <xref ref-type="bibr" rid="ref11 ref2">11, 2</xref>
        ] represent an e ective solution to the unsupervised task of learning a
compact representation of the latent features characterizing a piece of information. An
autoencoder is a neural architecture trained to reproduce as output a duplicate of its input. It is
composed by two elements, as shown in Figure 2a.
      </p>
      <p>The encoder , a neural network whose goal is to map an input ~x to a latent compact
representation (~x) = ~z 2 RK . This mapping produces an embedding of the original
input into a latent vector of size K.</p>
      <p>A decoder , another neural networks that, given a K-dimensional vector ~z, aims at
producing an output (~z) = ~y that is as close as possible to the original input.</p>
      <p>
        In the above description, the components , , ~x and ~y are unspeci ed. In our framework,
we consider the input and output ~x; ~y of the autoencoder to be temporally marked events. As a
consequence and can be speci ed as recurrent networks (RNNs) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. An RNN naturally ts
~x
~z
      </p>
      <p>~y
(a) General autoencoder structure.</p>
      <p>
        (b) Recurrent Autoencoder (RAE).
sequential data, since, iterating over the sequence, it saves (partial) memory of each event. In
our implementation we decided to instantiate the RNNs as Long short-term memory networks
(LSTM, see [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] for a detailed description).
      </p>
      <p>
        The resulting architecture is a sequence to sequence recurrent autoencoder (RAE) model [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]
shown in Figure 2b. In short, the objective of RAE is to: (i) read all the events in the sequence,
(ii) extract a compact representation of all the events within the sequence; (iii) generate a
new sequence that is a copy of (or close to) the input one, by exploiting the representation.
Mathematically, this can be speci ed as follows: given an input sequence I = f~x1; : : : ; ~xng, we
compute an output sequence O = f~y1; : : : ; ~yng where:
(1)
(2)
~h(d) = LSTM (~z; ~h(d) )
t t 1
~yt = mlp'(~ht(d))
      </p>
      <p>n
1 X
`(I; O) = n
t=1
k~xt
~ytk2
where LSTM and mlp# represent the encoder, with internal state ~h(e) given the t-th event;
t
symmetrically, LSTM and mlp' represent the decoder, with inner state ~ht(d). Further, mlp# and
mlp' represent multilayer networks parameterized by and , respectively.</p>
      <p>Since the main purpose of RAE is to reconstruct the input from a compact representation,
the model can be trained by considering a reconstruction loss:</p>
      <p>Input subsequences are obtained from X through a sliding window mechanism. Each
timestep within X is associated with a subsequence Wt = f~xt m+1; : : : ; : : : ; ~xtg, where m
is the window size. Thus, RAE is trained on the set fWm; : : : ; WN g of subsequences that can
obtained from X, as illustrated in Figure 2, by learning to reconstruct them in a way that
minimizes the speci ed loss.</p>
      <p>RAE will learn to model normal behavior, by mapping input data to compact representations
that can capture all the relevant features characterizing it. An anomalous event will compromise
this reconstruction capability. Thus, the distance between the input and the output can be
exploited as a score to measure the outlierness of the analyzed sequence. Since each event can
be included within several overlapping windows, its nal score is computed as the average of
the outlierness scores of all the involved windows:
where W~ i = dec(enc(Wi)) is the output of the RAE with input Wi.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Analysis of the Ethereum Classic Network</title>
      <p>The model proposed in the previous section represents a general approach to anomaly detection
on sequential data. In this section, we apply our model to the ETC network to identify abnormal
situations that can be symptoms of incoming attacks. As discussed in section 2, ETC has
experienced two (known) successful attacks: the DAO attack (18 June 2016) and the 51%
attack. The latter is scarcely documented and the reports state that it happened in a period
within the interval 5-8 January 2019. Hence, our objective is to adopt the RAE model to check
whether these events exhibit an anomaly score signi cantly higher than the other ones.
4.1</p>
      <sec id="sec-4-1">
        <title>Data source and preprocessing</title>
        <p>Our experiments have been conducted on a sample of ETC blockchain spanning over a period
of four years (July 2015 - July 2019). The dataset is available on Kaggle2 and consists of seven
tables, namely blocks, transactions, contracts, logs, token transfers, tokens and traces. These
tables provide information about the usage of the network, the working status and the blocks.</p>
        <p>A preliminary analysis of these tables highlighted that only two of them stored relevant
information for our purposes, respectively blocks and transactions.</p>
        <p>The raw data have been preprocessed as follows: (i) feature engineering, i.e. selection of the
most relevant attribute, correlation analysis, ltering and aggregation; (ii) normalization; (iii)
data view generation according to the sliding window mechanism.</p>
        <p>2https://www.kaggle.com/bigquery/crypto-ethereum-classic</p>
        <p>The rst two steps result in the following subset of relevant features, computed on a daily
basis:</p>
        <p>(i) block size average, the average size (in bytes) of a block; (ii) provided gas average,
referring to the average provided gas needed to perform the transaction; (iii) block difficulty
average, the average di culty (i.e. the e ort) necessary to validate a block; (iv) transaction
average per block, the average number of transactions contained in a block; (v) gas used sum,
the total amount of employed gas; (vi) transactions number, the total number of transactions
in all blocks.</p>
        <p>
          The normalization steps is meant to re-scale values to avoid instability e ects with the neural
modeling, as well as to regularize values by removing seasonal, cyclic and trending uctuations
in the data [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] and it is performed via moving quantile ratio [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. Figure 2 shows both the
original and the normalized data, plotted along the time window. Within the plots, the red
lines highlight the periods when the attacks took place.
        </p>
        <p>We partitioned the whole dataset in four periods as shown in Figure 3. Data prior to 7
August 2015 were ignored: they correspond to the rst week of the chain genesis and contain
several missing values. The time series were nally produced for each block, to feed the RAE
according to the learning/evaluation strategy outlined as follows. In practice, we consider two
di erent training set, namely D1 (relative to the interval August 2015 - April 2016) and D2
(covering the interval July 2016 - November 2018). T1 and T2 (the periods within a range of
about two months from the attacks, exact dates are listed in Figure 3) are used as test sets, for
evaluating the outlierness scores.
4.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Experimental Results</title>
        <p>We performed three di erent tests by training two instances of RAE. The rst two exploited D1
as training set and scored all the events within T1 and T2, respectively. In the third experiment
RAE is trained on D1 [ D2 and scores events in T2.</p>
        <p>
          Figures 4a and 4b plot the outlierness scores computed by RAE on both T1 and T2. We
can see that the DAO attack is perfectly detected by RAE, as shown in Figure 4a. The network
provides no warning until day 295 where we can see a small peak. Instead, the outlierness score
exhibits a di erence of two orders of magnitude on day 316, corresponding to the DAO attack.
The result is consistent with the ndings of [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], but in our case RAE is capable of perfectly
detect the exact day of the attack.
        </p>
        <p>
          Within Figure 4b, the same model is used to score events in T2. We can see that the
outlierness score changes its pattern as the attack period approaches. However, the peak is
translated of a few days. The situation represented here needs some interpretation. The
network highlights a strong anomaly on day 1255, a few days after the actual attack. A close
inspection of the events occurring during the 51% attack witnesses that a signi cant number
of companies, working on ETC, detected the attack and decided to freeze their activities3 4 5.
Then, on the basis of our analysis, block size and related features seems not fully su cient to
early detect some types of attacks occurring on blockchain, but we gure out that integrating
data from other sources (e.g. the server operating system and the application [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]) could improve
the detection performances of our approach. As a result, the blockchain didn't register a core
amount of transactions which were instead restarted in the forthcoming days. In practice,
day 1255 (where the anomaly score is the highest) appears to be the day where all the frozen
3http://shorturl.at/giz14
4http://blog.coinbase.com/ethereum-classic-etc-is-currently-being-51-attacked-33be13ce32de
5http://cryptonomist.ch/2019/01/07/ethereum-classic-attacco-del-51/
0
0 0
5
0
2
5
1
5
0
s
a 0
1
G
(g) transaction average per block
        </p>
        <p>(h) transaction average per block norm
2
1
0
1
8
s
a 6
G
4
2
0
activities were recorded on the network, thus representing the actual moment where the anomaly
was injected within the blockchain. This nding is consistent with the ndings of the third
experiment, where RAE is trained both on D1 and D2: Figure 4c shows a similar pattern, thus
demonstrating that the preprocessing steps make the RAE ndings consistent even on di erent
time periods. The only false positive seems to be represented by the peak on day 1291, which
appears in both models. Although there is no reporting of attacks in those periods, it would be
interesting to provide a close inspection to the activities during that period and try to explain
such anomaly based on those.
15
7
10
5
15
2
re100
o
c
S 75
0
5
5
2
0
246 252 258 264 270 276 28 T2imesta3mp
2 88 294 00 306 312 318 324 330 336 342 348
0
3
re15
o
c
S
0
1
5
0</p>
        <p>1200 1206 1212 1218 1224 1230 1236Ti1m242e1s24t8a1m254p1260 1266 1272 1278 1284 1290 1296 1302
(c) Outlierness score on T2. RAE is trained on</p>
        <p>D1 [ D2.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5 Concluding Remarks</title>
      <p>In this work, we de ne an encoder-decoder deep learning model to detect anomalies in the
usage of blockchain systems. In this scenario, the main problem is the rarity of the events
to identify (i.e. the attacks), therefore, an unsupervised solution is adopted to address this
issue. Speci cally, the contribution of the paper is twofold: (i) we identi ed a relevant set of
features computed on blockchain logs describing network status in determined time steps; (ii)
a sequence-to-sequence neural network model is used to recognize anomalous changes in the
blockchain network. Experiments on the complete historical logs of Ethereum Classic prove our
model capability to e ectively detect security attacks.</p>
      <p>
        As future works, we plan to study the usage of hybrid architectures based on the combination
of RNNs with Convolutional Neural Networks [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] to obtain an automatic feature engineering
and evaluate eventual improvements. On the other hand, we are interested in de ning models
able to predict attacks before they happen, improving the network security.
      </p>
    </sec>
    <sec id="sec-6">
      <title>6 Acknowledgment</title>
      <p>This work has been partially supported by MIUR - PON Research and Innovation 2014-2020
under project Secure Open Nets.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>N.</given-names>
            <surname>Atzei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bartoletti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Cimoli</surname>
          </string-name>
          .
          <article-title>A survey of attacks on ethereum smart contracts (sok)</article-title>
          .
          <source>In Principles of Security and Trust"</source>
          , pages
          <fpage>164</fpage>
          {
          <fpage>186</fpage>
          . Springer,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bengio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Pascal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Dan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Larochelle</surname>
          </string-name>
          .
          <article-title>Greedy layer-wise training of deep networks</article-title>
          .
          <source>In Advances in Neural Information Processing Systems</source>
          , volume
          <volume>19</volume>
          , pages
          <fpage>153</fpage>
          {
          <fpage>160</fpage>
          . MIT Press,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bogner</surname>
          </string-name>
          .
          <article-title>Seeing is understanding: Anomaly detection in blockchains with visualized features</article-title>
          .
          <source>In Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers</source>
          ,
          <source>UbiComp '17</source>
          , pages
          <fpage>5</fpage>
          <article-title>{8</article-title>
          . ACM,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Buczak</surname>
          </string-name>
          and
          <string-name>
            <given-names>E.</given-names>
            <surname>Guven</surname>
          </string-name>
          .
          <article-title>A survey of data mining and machine learning methods for cyber security intrusion detection</article-title>
          .
          <source>IEEE Communications Surveys Tutorials</source>
          ,
          <volume>18</volume>
          (
          <issue>2</issue>
          ):
          <volume>1153</volume>
          {
          <fpage>1176</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V</given-names>
            <surname>Buterin</surname>
          </string-name>
          .
          <article-title>Ethereum white paper. a next-generation smart contract and decentralized application platform</article-title>
          . https://github.com/ethereum/wiki/wiki/White-Paper,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] Chris Chat eld</article-title>
          .
          <article-title>The analysis of time series: an introduction</article-title>
          .
          <source>CRC Press, 6th edition</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>H.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pendleton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Njilla</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Xu</surname>
          </string-name>
          .
          <article-title>A survey on ethereum systems security: Vulnerabilities, attacks and defenses</article-title>
          . arXiv,
          <year>1908</year>
          .04507v1,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K.</given-names>
            <surname>Cho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. B. v.</given-names>
            <surname>Merrienboer</surname>
          </string-name>
          , Gulcehre,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bougares</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Schwenk</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bengio</surname>
          </string-name>
          .
          <article-title>Learning phrase representations using RNN encoder-decoder for statistical machine translation</article-title>
          .
          <source>CoRR, abs/1406.1078</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Nabil</given-names>
            <surname>El Ioini</surname>
          </string-name>
          and
          <string-name>
            <given-names>Claus</given-names>
            <surname>Pahl</surname>
          </string-name>
          .
          <article-title>A review of distributed ledger technologies</article-title>
          . In Herve Panetto, Christophe Debruyne, Henderik A.
          <string-name>
            <surname>Proper</surname>
          </string-name>
          , Claudio Agostino Ardagna, Dumitru Roman, and Robert Meersman, editors,
          <source>On the Move to Meaningful Internet Systems. OTM 2018 Conferences</source>
          , pages
          <volume>277</volume>
          {
          <fpage>288</fpage>
          . Springer International Publishing,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Graves</surname>
          </string-name>
          .
          <article-title>Supervised Sequence Labelling with Recurrent Neural Networks</article-title>
          , volume
          <volume>385</volume>
          <source>of Studies in Computational Intelligence</source>
          . Springer,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>G.</given-names>
            <surname>Hinton</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Salakhutdinov</surname>
          </string-name>
          .
          <article-title>Reducing the dimensionality of data with neural networks</article-title>
          .
          <source>Science</source>
          ,
          <volume>313</volume>
          (
          <issue>5786</issue>
          ):
          <volume>504</volume>
          {
          <fpage>507</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>David</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Hoaglin</surname>
          </string-name>
          , Frederick Mosteller, and John W. Tukey (Editor).
          <source>Understanding Robust and Exploratory Data Analysis. Wiley-Interscience, 1 edition</source>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Hochreiter</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Schmidhuber</surname>
          </string-name>
          .
          <article-title>Long short-term memory</article-title>
          .
          <source>Neural Comput.</source>
          ,
          <volume>9</volume>
          (
          <issue>8</issue>
          ):
          <volume>1735</volume>
          {
          <fpage>1780</fpage>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>L.</given-names>
            <surname>Lamport</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Shostak</surname>
          </string-name>
          , and Ma. Pease.
          <article-title>The byzantine generals problem</article-title>
          .
          <source>ACM Trans. Program. Lang. Syst.</source>
          ,
          <volume>4</volume>
          (
          <issue>3</issue>
          ):
          <volume>382</volume>
          {
          <fpage>401</fpage>
          ,
          <year>1982</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Mahdavifar</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Ghorbani</surname>
          </string-name>
          .
          <article-title>Application of deep learning to cybersecurity: A survey</article-title>
          .
          <source>Neurocomputing</source>
          ,
          <volume>347</volume>
          :
          <fpage>149</fpage>
          {
          <fpage>176</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Nakamoto</surname>
          </string-name>
          .
          <article-title>Bitcoin: A peer-to-peer electronic cash system</article-title>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Keiron O'Shea</surname>
            and
            <given-names>Ryan</given-names>
          </string-name>
          <string-name>
            <surname>Nash</surname>
          </string-name>
          .
          <article-title>An introduction to convolutional neural networks</article-title>
          .
          <source>CoRR, abs/1511.08458</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Meni</given-names>
            <surname>Rosenfeld</surname>
          </string-name>
          .
          <article-title>Analysis of hashrate-based double spending</article-title>
          .
          <source>In arXiv, eprint 1402</source>
          .
          <year>2009</year>
          .,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Signorini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pontecorvi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Kanoun</surname>
          </string-name>
          , and
          <string-name>
            <surname>Di Pietro R. BAD</surname>
          </string-name>
          <article-title>: blockchain anomaly detection</article-title>
          .
          <source>CoRR</source>
          , abs/
          <year>1807</year>
          .03833,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>M.</given-names>
            <surname>Usman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Jan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>He</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          .
          <article-title>A survey on representation learning e orts in cybersecurity domain</article-title>
          .
          <source>ACM Comput. Surv.</source>
          ,
          <volume>52</volume>
          (
          <issue>6</issue>
          ):
          <volume>111</volume>
          :1{
          <fpage>111</fpage>
          :
          <fpage>28</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>C.</given-names>
            <surname>Ye</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Cai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gu</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Fukuda</surname>
          </string-name>
          .
          <article-title>Analysis of security in blockchain: Case study in 51%-attack detecting</article-title>
          .
          <source>In 2018 5th International Conference on Dependable Systems and Their Applications (DSA)</source>
          , pages
          <fpage>15</fpage>
          {
          <fpage>24</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>