Advanced Techniques for Anomaly Detection in Blockchain: Leveraging Clustering and Machine Learning
DOI:
https://doi.org/10.51519/journalisi.v7i1.1047Keywords:
Blockchain Security, Anomaly Detection, Machine Learning, Fraud DetectionAbstract
Blockchain technology has revolutionized data security and transaction transparency across various industries. However, the increasing complexity of blockchain networks has led to anomalies that require further investigation. This study aims to analyze anomalies in blockchain systems using machine learning approaches. Various anomaly detection techniques, including supervised and unsupervised methods, are evaluated for their effectiveness in identifying irregularities. The results indicate that machine learning models can detect anomalies with high accuracy, providing insights into potential threats and system vulnerabilities. The findings of this research contribute to improving blockchain security and developing more robust monitoring systems.
Downloads
References
Z. Liu, H. Gao, H. Lei, Z. Liu, and C. Liu, “Blockchain anomaly transaction detection: An overview, challenges, and open issues,” in Int. Conf. Inf. Sci., Commun. Comput., 2023, pp. 126–140.
E. P.-E. George, C. Idemudia, and A. B. Ige, “Blockchain technology in financial services: Enhancing security, transparency, and efficiency in transactions and services,” Open Access Res. J. Multidiscip. Stud., 2024, doi: 10.53022/oarjms.2024.8.1.0042
A. Judmayer, N. Stifter, K. Krombholz, and E. Weippl, Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms. Synth. Lect. Inf. Secur. Priv. Trust, 2017, doi: 10.2200/s00773ed1v01y201704spt020.
K. Croman et al., “On scaling decentralized blockchains: (A position paper),” in Int. Conf. Financial Cryptography Data Secur., 2016, pp. 106–125.
Y. Ikeda, R. Hadfi, T. Ito, and A. Fujihara, “Anomaly detection and facilitation AI to empower decentralized autonomous organizations for secure crypto-asset transactions,” AI Soc., pp. 1–12, 2025.
Ł. Apiecionek and P. Karbowski, “Fuzzy neural network for detecting anomalies in blockchain transactions,” Electronics, vol. 13, no. 23, p. 4646, 2024.
G. S. Rai, S. B. Goyal, and P. Chatterjee, “Anomaly detection in blockchain using machine learning,” in Comput. Intell. Eng. Manag. Appl.: Sel. Proc. CIEMA 2022, Springer, 2023, pp. 487–499.
J. Bonneau et al., “SOK: Research perspectives and challenges for bitcoin and cryptocurrencies,” in Proc. 2015 IEEE Symp. Secur. Privacy, 2015, pp. 104–121.
M. Hasan, M. S. Rahman, H. Janicke, and I. H. Sarker, “Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis,” Blockchain Res. Appl., vol. 5, no. 3, p. 100207, 2024.
S. Siddamsetti, C. Tejaswi, and P. Maddula, “Anomaly detection in blockchain using machine learning,” J. Electr. Syst., vol. 20, pp. 619–634, 2024.
M. T. R. Laskar et al., “Extending isolation forest for anomaly detection in big data via K-means,” ACM Trans. Cyber-Phys. Syst., vol. 5, no. 4, pp. 1–26, 2021.
A. B. Nassif, M. A. Talib, Q. Nasir, and F. M. Dakalbab, “Machine learning for anomaly detection: A systematic review,” IEEE Access, vol. 9, pp. 78658–78700, 2021.
X. Ugarte-Pedrero et al., “On the adoption of anomaly detection for packed executable filtering,” Comput. Secur., vol. 43, pp. 126–144, 2014, doi: 10.1016/j.cose.2014.03.012.
J. Akoto and T. Salman, “Machine learning vs deep learning for anomaly detection and categorization in multi-cloud environments,” in Proc. 2022 IEEE Cloud Summit, 2022, pp. 44–50.
M. Conti, E. S. Kumar, C. Lal, and S. Ruj, “A survey on security and privacy issues of bitcoin,” IEEE Commun. Surv. Tutorials, vol. 20, no. 4, pp. 3416–3452, 2018.
A. Kiayias, A. Russell, B. David, and R. Oliynykov, “Ouroboros: A provably secure proof-of-stake blockchain protocol,” in Annu. Int. Cryptol. Conf., 2017, pp. 357–388.
Q. Kong, H. Gong, X. Ding, and R. Hou, “Classification application based on mutual information and random forest method for high dimensional data,” in 2017 9th Int. Conf. Intell. Human-Machine Syst. Cybern. (IHMSC), 2017, pp. 171–174.
M. Mehrotra and N. Joshi, “Anomaly detection in temporal data using KMeans clustering with C5.0,” Int. J. Eng. Sci., vol. 6, no. 5, pp. 77–81, 2017.
A. Sreenivasulu, “Evaluation of cluster based anomaly detection,” 2019.
D. R. Cutler et al., “Random forests for classification in ecology,” Ecology, vol. 88, no. 11, pp. 2783–2792, 2007.
L. Breiman, “Random forests,” Mach. Learn., vol. 45, no. 1, pp. 5–32, 2001, doi: 10.1023/A:1010933404324.
H. S. Galal, Y. B. Mahdy, and M. A. Atiea, “Behavior-based features model for malware detection,” J. Comput. Virol. Hacking Tech., vol. 12, no. 2, pp. 59–67, 2016, doi: 10.1007/s11416-015-0244-0.
M. Staron, H. O. Hergés, L. Block, and M. Sjödin, “Comparing anomaly detection and classification algorithms: A case study in two domains,” in Int. Conf. Softw. Qual., 2023, pp. 121–136.
J. Henriques, F. Caldeira, T. Cruz, and P. Simões, “Combining k-means and XGBoost models for anomaly detection using log datasets,” Electronics, vol. 9, no. 7, p. 1164, 2020.
B. Apurva, “Anomaly detection in transactions.” Accessed: Feb. 17, 2025.
Downloads
Published
Issue
Section
License
Authors Declaration
- The Authors certify that they have read, understood, and agreed to the Journal of Information Systems and Informatics (JournalISI) submission guidelines, policies, and submission declaration. The submission has been prepared using the provided template.
- The Authors certify that all authors have approved the publication of this manuscript and that there is no conflict of interest.
- The Authors confirm that the manuscript is their original work, has not received prior publication, is not under consideration for publication elsewhere, and has not been previously published.
- The Authors confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- The Authors confirm that the manuscript is not copied from or plagiarized from any other published work.
- The Authors declare that the manuscript will not be submitted for publication in any other journal or magazine until a decision is made by the journal editors.
- If the manuscript is finally accepted for publication, the Authors confirm that they will either proceed with publication immediately or withdraw the manuscript in accordance with the journal’s withdrawal policies.
- The Authors agree that, upon publication of the manuscript in this journal, they transfer copyright or assign exclusive rights to the publisher, including commercial rights














