- The paper presents the HPSAD algorithm that combines parallel and sequential anomaly detection for blockchain transactions.
- It leverages dependency analysis using read/write sets to identify interactions between transactions and optimize simulation steps.
- The approach reduces computational overhead and enhances detection accuracy by adapting processing based on transaction dependencies.
Anomaly Transaction Detection Algorithm
Anomaly detection for blockchain transactions can be optimized by combining parallel and sequential simulations. In scenarios where transactions can either be analyzed at the tip of the chain or within their specific block context, leveraging both methodologies can maximize speed while ensuring accuracy.
Algorithm Overview
- Algorithm Name: Hybrid Parallel-Sequential Anomaly Detection (HPSAD)
- Algorithm Description:
The algorithm described here aims to detect malicious or anomalous behavior within blockchain transactions, considering dependencies among them for efficient processing. The steps blend independent parallel processing with careful sequential analysis to yield a robust detection mechanism.
Algorithm Steps
Step 0: Transaction Selection
- Assume the sequencer has identified a list of transactions, T1​,T2​,…,Tn​, for potential inclusion in the next block.
Step 1: Parallel Simulation on the Tip of the Chain
- Execute each transaction independently using the current blockchain state at the tip of the chain.
- Perform simulations in parallel to improve speed.
- Gather results:
- Simulation results for each transaction.
- States read (Ri​) by each transaction Ti​.
- States written (Wi​) by each transaction Ti​.
Step 2: Transaction Dependency Analysis
- For every pair of transactions (Ti​,Tj​), with i<j, determine if Tj​ is dependent on Ti​.
- A transaction Tj​ is "dependent" on Ti​ if Wi​∩Rjâ€‹î€ =∅.
- Record these dependencies for further analysis.
Step 3: Parallel Detection for Independent Transactions
- Evaluate transactions identified as independent (no earlier dependencies based on sequence) in parallel.
- Use simulation results and dependency data to flag potential anomalies.
Step 4: Sequential Detection for Dependent Transactions
- For transactions identified as dependent, proceed with sequential simulation.
- Adjust the blockchain state incrementally based on the sequence of transactions.
- Each transaction, in order, considers the state changes introduced by previous transactions.
Step 5: Final Malice Detection
- Identify and flag transactions as anomalous based on simulations and dependency checks.
- Consider anomalies detected during independent and dependent transaction checks.
- Report malicious transactions to the network for appropriate action.
Conclusion
By utilizing both parallel processing for independent transaction identification and sequential processing for dependent transactions, the Hybrid Parallel-Sequential Anomaly Detection (HPSAD) algorithm efficiently reduces computational overhead while maintaining detection accuracy. This dual approach ensures quick identification of potential threats, thereby maintaining transaction security and integrity.