Automating Intrusion Detection Systems in Smart Contracts
Authors:
Date: 07.06.2021
Abstract
Blockchain technology has gained a lot of relevance in recent years, specifically the smart connect functionality, due to its great potential to decentralize different day-to-day scenarios. This technology brings many advantages thanks to its immutability, specifically smart contracts give blockchain a very great versatility. However, these smart contracts can bring many threats to the blockchain, considering that vulnerabilities they may have, which are immutable once deployed, can be exploited to attack them. Several studies have focused on studying these vulnerabilities in order to identify and fix them, thus deploying smart contracts in a secure way. This study has focused on developing an intrusion detection system (IDS) based on the path study. This IDS is deployed with the smart contract to be defended, which will monitor the transactions received by the defended smart contract looking at where the transaction comes from. This generates a path in the blockchain network, which will have some characteristics that are extracted and analyzed. This will detect possible threats received. Our approach suggests the implementation of an automated IDS in the smart contracts to defend them from possible threats.
BIB_text
title = {Automating Intrusion Detection Systems in Smart Contracts},
keywds = {
Cybersecurity analysis, Behavioural classification, Smart contract analysis, Intrusion Detection
}
abstract = {
Blockchain technology has gained a lot of relevance in recent years, specifically the smart connect functionality, due to its great potential to decentralize different day-to-day scenarios. This technology brings many advantages thanks to its immutability, specifically smart contracts give blockchain a very great versatility. However, these smart contracts can bring many threats to the blockchain, considering that vulnerabilities they may have, which are immutable once deployed, can be exploited to attack them. Several studies have focused on studying these vulnerabilities in order to identify and fix them, thus deploying smart contracts in a secure way. This study has focused on developing an intrusion detection system (IDS) based on the path study. This IDS is deployed with the smart contract to be defended, which will monitor the transactions received by the defended smart contract looking at where the transaction comes from. This generates a path in the blockchain network, which will have some characteristics that are extracted and analyzed. This will detect possible threats received. Our approach suggests the implementation of an automated IDS in the smart contracts to defend them from possible threats.
}
isbn = {978-84-9044-463-4},
date = {2021-06-07},
}