Quantum Deep Neural Network Based Classification of Attack Vectors on the Ethereum Blockchain

A. Rajawat, S. B. Goyal, Manoj Kumar, Saurabh Kumar
{"title":"Quantum Deep Neural Network Based Classification of Attack Vectors on the Ethereum Blockchain","authors":"A. Rajawat, S. B. Goyal, Manoj Kumar, Saurabh Kumar","doi":"10.4108/eetsis.5572","DOIUrl":null,"url":null,"abstract":"INTRODUCTION: The implementation of robust security protocols is imperative in light of the exponential growth of blockchain-based platforms such as Ethereum. The importance of developing more effective strategies to detect and counter potential attacks is growing in tandem with the sophistication of the methods employed by attackers. In this study, we present a novel approach that leverages quantum computing to identify and predict attack vectors on the Ethereum blockchain. \nOBJECTIVES: The primary objective of this study is to suggest an innovative methodology for enhancing the security of Ethereum by leveraging quantum computing. The purpose of this study is to demonstrate that QRBM and QDN are efficient in identifying and predicting security flaws in blockchain transactions. \nMETHODS: We combined methods from quantum computing with social network research approaches. An enormous dataset containing both genuine Ethereum transactions and a carefully chosen spectrum of malicious activity indicative of popular attack vectors was used to train our model, the QRBM. Thanks to the dataset, the QRBM was able to learn to distinguish between typical and out-of-the-ordinary activities. \nRESULTS: In comparison to more conventional deep learning models, the QRBM showed substantially better accuracy when it came to identifying transaction behaviours. The model's improved scalability and efficiency were made possible by its quantum nature, which is defined by features like entanglement and superposition. Specifically, the QRBM handled non-informative inputs better and solved problems faster. \nCONCLUSION: This study paves the way for further investigation into quantum-enhanced cybersecurity measures and highlights the promise of quantum neural networks in strengthening the security of blockchain technology. According to our research, quantum computing has the potential to be an essential tool in creating Ethereum-style blockchain security systems that are more advanced, efficient, and resilient.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"39 15","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICST Transactions on Scalable Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/eetsis.5572","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

INTRODUCTION: The implementation of robust security protocols is imperative in light of the exponential growth of blockchain-based platforms such as Ethereum. The importance of developing more effective strategies to detect and counter potential attacks is growing in tandem with the sophistication of the methods employed by attackers. In this study, we present a novel approach that leverages quantum computing to identify and predict attack vectors on the Ethereum blockchain. OBJECTIVES: The primary objective of this study is to suggest an innovative methodology for enhancing the security of Ethereum by leveraging quantum computing. The purpose of this study is to demonstrate that QRBM and QDN are efficient in identifying and predicting security flaws in blockchain transactions. METHODS: We combined methods from quantum computing with social network research approaches. An enormous dataset containing both genuine Ethereum transactions and a carefully chosen spectrum of malicious activity indicative of popular attack vectors was used to train our model, the QRBM. Thanks to the dataset, the QRBM was able to learn to distinguish between typical and out-of-the-ordinary activities. RESULTS: In comparison to more conventional deep learning models, the QRBM showed substantially better accuracy when it came to identifying transaction behaviours. The model's improved scalability and efficiency were made possible by its quantum nature, which is defined by features like entanglement and superposition. Specifically, the QRBM handled non-informative inputs better and solved problems faster. CONCLUSION: This study paves the way for further investigation into quantum-enhanced cybersecurity measures and highlights the promise of quantum neural networks in strengthening the security of blockchain technology. According to our research, quantum computing has the potential to be an essential tool in creating Ethereum-style blockchain security systems that are more advanced, efficient, and resilient.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于量子深度神经网络的以太坊区块链攻击向量分类
简介:鉴于以太坊等基于区块链的平台呈指数级增长,实施稳健的安全协议势在必行。随着攻击者使用的方法越来越复杂,制定更有效的策略来检测和应对潜在攻击的重要性也与日俱增。在本研究中,我们提出了一种利用量子计算来识别和预测以太坊区块链上攻击载体的新方法。目标:本研究的主要目的是提出一种利用量子计算增强以太坊安全性的创新方法。本研究的目的是证明 QRBM 和 QDN 能够有效识别和预测区块链交易中的安全漏洞。方法:我们将量子计算方法与社交网络研究方法相结合。我们使用了一个庞大的数据集来训练我们的模型 QRBM,该数据集包含真实的以太坊交易和精心挑选的恶意活动,这些恶意活动表明了流行的攻击载体。借助该数据集,QRBM 能够学会区分典型活动和异常活动。结果:与更传统的深度学习模型相比,QRBM 在识别交易行为方面表现出更高的准确性。该模型之所以能够提高可扩展性和效率,是因为它具有量子特性,即纠缠和叠加等特征。具体来说,QRBM 能更好地处理非信息输入,更快地解决问题。结论:本研究为进一步研究量子增强网络安全措施铺平了道路,并强调了量子神经网络在加强区块链技术安全性方面的前景。根据我们的研究,量子计算有可能成为创建以太坊式区块链安全系统的重要工具,使其更先进、更高效、更有弹性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Review on DDoS Attack in Controller Environment of Software Defined Network A novel color image encryption method using Fibonacci transformation and chaotic systems Eye Disease Detection Using Deep Learning Models with Transfer Learning Techniques FaceNet – A Framework for Age Variation Facial Digital Images JWTAMH: JSON Web Tokens Based Authentication Mechanism for HADOOP.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1