{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T17:08:49Z","timestamp":1723741729913},"reference-count":9,"publisher":"Association for Computing Machinery (ACM)","issue":"4","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMETRICS Perform. Eval. Rev."],"published-print":{"date-parts":[[2021,5,17]]},"abstract":"Ethereum is one of the most popular cryptocurrency currently and it has been facing security threats and attacks. As a consequence, Ethereum users may experience long periods to validate transactions. Despite the maintenance on the Ethereum mechanisms, there are still indications that it remains susceptible to a sort of attacks. In this work, we analyze the Ethereum network behavior during an under-priced DoS attack, where malicious users try to perform denial-of-service attacks that exploit flaws in the fee mechanism of this cryptocurrency. We propose the application of machine learning techniques and ensemble methods to detect this attack, using the available transaction attributes. The proposals present notable performance as the Decision Tree models, with AUC-ROC, F-score and recall larger than 0.94, 0.82, and 0.98, respectively.<\/jats:p>","DOI":"10.1145\/3466826.3466835","type":"journal-article","created":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T16:09:27Z","timestamp":1621440567000},"page":"24-27","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Fighting Under-price DoS Attack in Ethereum with Machine Learning Techniques"],"prefix":"10.1145","volume":"48","author":[{"given":"Jose","family":"Eduardo A. Sousa","sequence":"first","affiliation":[{"name":"UFJF - DCC, Brazil"}]},{"given":"Vinicius C.","family":"Oliveira","sequence":"additional","affiliation":[{"name":"UFJF - DCC, Brazil"}]},{"given":"Julia","family":"Almeida Valadares","sequence":"additional","affiliation":[{"name":"UFJF - DCC, Brazil"}]},{"given":"Alex","family":"Borges Vieira","sequence":"additional","affiliation":[{"name":"UFJF - DCC, Brazil"}]},{"given":"Heder S.","family":"Bernardino","sequence":"additional","affiliation":[{"name":"UFJF - DCC, Brazil"}]},{"given":"Saulo","family":"Moraes Villela","sequence":"additional","affiliation":[{"name":"UFJF - DCC, Brazil"}]},{"given":"Glauber","family":"Dias Goncalves","sequence":"additional","affiliation":[{"name":"UFPI - CSHNB, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2021,5,19]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_1"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3391195"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72359-4_1"},{"key":"e_1_2_1_5_1","volume-title":"FloodXMR: Low-Cost Transaction Flooding Attack with Monero's Bulletproof Protocol. IACR Cryptology ePrint Archive, page 455","author":"Chervinski J. O. M.","year":"2019"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/3165196"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751476"},{"key":"e_1_2_1_9_1","volume-title":"V. Oliveira, J. Valadares, A. B. Vieira, S. M. Villela, H. S.","author":"J.","year":"2020"}],"container-title":["ACM SIGMETRICS Performance Evaluation Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466826.3466835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T23:39:47Z","timestamp":1672616387000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466826.3466835"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,17]]},"references-count":9,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,5,17]]}},"alternative-id":["10.1145\/3466826.3466835"],"URL":"https:\/\/doi.org\/10.1145\/3466826.3466835","relation":{},"ISSN":["0163-5999"],"issn-type":[{"value":"0163-5999","type":"print"}],"subject":[],"published":{"date-parts":[[2021,5,17]]},"assertion":[{"value":"2021-05-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}