SlideShare a Scribd company logo
1 of 12
BLOCK HUNTER
PROJECT TITLE:-
20TQ5A0508
A.Sravan Kumar
| TEAM MEMBERS:-
01
03
20TQ5A0509
C.Rakesh
20TQ5A0504
S.Chandana
02
19TQ1A0576
V.Sai Kumar
Under The Guidance Of:-
Swetha Madam
04
| CONTENTS :-
1) Abstract
2) Literature Survey
3) Existing system
4) Proposed System
ABSTRACT
1
Nowadays, blockchain-based technologies are being developed in various
industries to improve data security. In the context of the Industrial Internet
of Things, a chain-based network is one of the most notable applications of
blockchain technology. IIoT devices have become increasingly prevalent in
our digital world, especially in support of developing smart factories.
Although blockchain is a powerful tool, it is vulnerable to cyber attacks.
Detecting anomalies in blockchain-based IIoT networks in smart factories is
crucial in protecting networks and systems from unexpected attacks. we use
Federated Learning (FL) to build a threat hunting framework called Block
Hunter to automatically hunt for attacks in blockchain-based IIoT networks.
|Literature Survey
A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory
AUTHORS:- J. Wan, J. Li, M. Imran, D. Li, and F. e Amin
Through the Industrial Internet of Things (IIoT), a smart factory has
entered the booming period. However, as the number of nodes and
network size become larger, the traditional IIoT architecture can no
longer provide effective support for such enormous system.
Therefore, they introduce the Blockchain architecture, which is an
emerging scheme for constructing the distributed networks, to
reshape the traditional IIoT architecture
2
Blockchain Attack Discovery via Anomaly Detection
AUTHORS:- F. Scicchitano, A. Liguori, M. Guarascio, E. Ritacco, and G. Manco,.
In this work, they define an anomaly detection system based on a encoder-decoder
deep learning model, that is trained exploiting information extracted by monitoring
blockchain activities. Experiments on complete historical logs of Ethereum Classic
network prove the capability of the our model to effectively detect the publicly
reported attacks. To the best of their knowledge, their approach was the first one that
provides a comprehensive and feasible solution to monitor the security of blockchain
transactions.
➢ A Blockchain based IOT network security already exists it is a
link-mining tool based on anomaly detection within Blockchain
networks.
➢ It Aim’s at gathering Meta-data in the form of forks (i.e.
divergent paths from the Blockchain protocol) in order to find
the semantic interpretation of anomalous paths/activities,
through mutual information based measure
EXISTING SYSTEM
3
DISADVANTAGES OF EXISTING SYSTEM:-
❖ The system is not implemented on
Cluster-Based Local Outlier Factor.
❖ It is not implemented in IIOT
❖ It is not implemented in Federated
Learning
➔ We use FL to update the model frequently and to obtain a
global model for detecting an anomaly. After learning about
each smart factory’s data, devices, and service provider, the
model’s parameters will be sent to the parameter server for
aggregation and to update our general model.
PROPOSED SYSTEM
4
❖ Federation Construction: The subset of smart factory
members, cluster, selected to receive the model locally.
❖ Decentralized Training: When a cluster of smart factories is
selected, it updates its model using its local data.
❖ Model Accumulation: Responsible for accumulating and
merging the data models. Data is not sent and integrated
from the federation to the server individually.
ADVANTAGES OF PROPOSED SYSTEM:-
Any Queries ?
Thank You !

More Related Content

What's hot

Diffie_Hellman-Merkle Key Exchange
Diffie_Hellman-Merkle Key ExchangeDiffie_Hellman-Merkle Key Exchange
Diffie_Hellman-Merkle Key ExchangeKevin OBrien
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Mazin Alwaaly
 
Indexing and hashing
Indexing and hashingIndexing and hashing
Indexing and hashingJeet Poria
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Ahmed Mohamed Mahmoud
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan PhdSMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan PhdHealthcare consultant
 
Conceptual foundations of text mining and preprocessing steps nfaoui el_habib
Conceptual foundations of text mining and preprocessing steps nfaoui el_habibConceptual foundations of text mining and preprocessing steps nfaoui el_habib
Conceptual foundations of text mining and preprocessing steps nfaoui el_habibEl Habib NFAOUI
 
Data Structures : hashing (1)
Data Structures : hashing (1)Data Structures : hashing (1)
Data Structures : hashing (1)Home
 
Merkle Trees and Fusion Trees
Merkle Trees and Fusion TreesMerkle Trees and Fusion Trees
Merkle Trees and Fusion TreesRohithND
 
Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)MdFazleRabbi18
 

What's hot (20)

SHA-256.pptx
SHA-256.pptxSHA-256.pptx
SHA-256.pptx
 
Diffie_Hellman-Merkle Key Exchange
Diffie_Hellman-Merkle Key ExchangeDiffie_Hellman-Merkle Key Exchange
Diffie_Hellman-Merkle Key Exchange
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
 
Wafl overview
Wafl overviewWafl overview
Wafl overview
 
Unit 2
Unit 2Unit 2
Unit 2
 
Indexing and hashing
Indexing and hashingIndexing and hashing
Indexing and hashing
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan PhdSMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
 
Conceptual foundations of text mining and preprocessing steps nfaoui el_habib
Conceptual foundations of text mining and preprocessing steps nfaoui el_habibConceptual foundations of text mining and preprocessing steps nfaoui el_habib
Conceptual foundations of text mining and preprocessing steps nfaoui el_habib
 
Data Structures : hashing (1)
Data Structures : hashing (1)Data Structures : hashing (1)
Data Structures : hashing (1)
 
Merkle Trees and Fusion Trees
Merkle Trees and Fusion TreesMerkle Trees and Fusion Trees
Merkle Trees and Fusion Trees
 
Bloom filters
Bloom filtersBloom filters
Bloom filters
 
Linkedlist
LinkedlistLinkedlist
Linkedlist
 
Tesxt mining
Tesxt miningTesxt mining
Tesxt mining
 
Des
DesDes
Des
 
Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)
 
Cryptography
CryptographyCryptography
Cryptography
 
Hashing
HashingHashing
Hashing
 

Similar to BLOCKHUNTER.pptx

Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)IJCNCJournal
 
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)IJCNCJournal
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized SystemIRJET Journal
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”IRJET Journal
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYIRJET Journal
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
 
IRJET - A Detailed Study on Cryptocurrency
IRJET -  	  A Detailed Study on CryptocurrencyIRJET -  	  A Detailed Study on Cryptocurrency
IRJET - A Detailed Study on CryptocurrencyIRJET Journal
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKIRJET Journal
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET Journal
 
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...IRJET Journal
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
Creating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainCreating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainIRJET Journal
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of ChunksIRJET Journal
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem IJECEIAES
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...IRJET Journal
 

Similar to BLOCKHUNTER.pptx (20)

Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
 
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized System
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
 
inteross-iot.pdf
inteross-iot.pdfinteross-iot.pdf
inteross-iot.pdf
 
IRJET - A Detailed Study on Cryptocurrency
IRJET -  	  A Detailed Study on CryptocurrencyIRJET -  	  A Detailed Study on Cryptocurrency
IRJET - A Detailed Study on Cryptocurrency
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
 
A05510105
A05510105A05510105
A05510105
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
 
Showcase poster
Showcase posterShowcase poster
Showcase poster
 
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
Creating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainCreating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using Blockchain
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 

More from BhanuCharan9

SOCIAL DISTANCE DETECTION.pptx
SOCIAL DISTANCE DETECTION.pptxSOCIAL DISTANCE DETECTION.pptx
SOCIAL DISTANCE DETECTION.pptxBhanuCharan9
 
diskmanagement-170307012154.pdf
diskmanagement-170307012154.pdfdiskmanagement-170307012154.pdf
diskmanagement-170307012154.pdfBhanuCharan9
 
productionanalysis-090913125852-phpapp01.pdf
productionanalysis-090913125852-phpapp01.pdfproductionanalysis-090913125852-phpapp01.pdf
productionanalysis-090913125852-phpapp01.pdfBhanuCharan9
 
marketstructurereview-121123101318-phpapp02.pdf
marketstructurereview-121123101318-phpapp02.pdfmarketstructurereview-121123101318-phpapp02.pdf
marketstructurereview-121123101318-phpapp02.pdfBhanuCharan9
 
unit1rulesofinference-170113152312.pdf
unit1rulesofinference-170113152312.pdfunit1rulesofinference-170113152312.pdf
unit1rulesofinference-170113152312.pdfBhanuCharan9
 
mathematicalinductionanddivisibilityrules-160711105713.pdf
mathematicalinductionanddivisibilityrules-160711105713.pdfmathematicalinductionanddivisibilityrules-160711105713.pdf
mathematicalinductionanddivisibilityrules-160711105713.pdfBhanuCharan9
 
Blockchain Banking 0th Review.pptx
Blockchain Banking 0th Review.pptxBlockchain Banking 0th Review.pptx
Blockchain Banking 0th Review.pptxBhanuCharan9
 
timesproet-180212053847.pdf
timesproet-180212053847.pdftimesproet-180212053847.pdf
timesproet-180212053847.pdfBhanuCharan9
 
slide5keys-140722233859-phpapp02.pdf
slide5keys-140722233859-phpapp02.pdfslide5keys-140722233859-phpapp02.pdf
slide5keys-140722233859-phpapp02.pdfBhanuCharan9
 
neerajppt-130323071407-phpapp02.pdf
neerajppt-130323071407-phpapp02.pdfneerajppt-130323071407-phpapp02.pdf
neerajppt-130323071407-phpapp02.pdfBhanuCharan9
 
criticalsectionproblem-160905215747.pdf
criticalsectionproblem-160905215747.pdfcriticalsectionproblem-160905215747.pdf
criticalsectionproblem-160905215747.pdfBhanuCharan9
 
analysisofsupply-160417044322.pdf
analysisofsupply-160417044322.pdfanalysisofsupply-160417044322.pdf
analysisofsupply-160417044322.pdfBhanuCharan9
 
relationsandfunctionslessonproper-160929053921.pdf
relationsandfunctionslessonproper-160929053921.pdfrelationsandfunctionslessonproper-160929053921.pdf
relationsandfunctionslessonproper-160929053921.pdfBhanuCharan9
 

More from BhanuCharan9 (16)

SOCIAL DISTANCE DETECTION.pptx
SOCIAL DISTANCE DETECTION.pptxSOCIAL DISTANCE DETECTION.pptx
SOCIAL DISTANCE DETECTION.pptx
 
diskmanagement-170307012154.pdf
diskmanagement-170307012154.pdfdiskmanagement-170307012154.pdf
diskmanagement-170307012154.pdf
 
productionanalysis-090913125852-phpapp01.pdf
productionanalysis-090913125852-phpapp01.pdfproductionanalysis-090913125852-phpapp01.pdf
productionanalysis-090913125852-phpapp01.pdf
 
marketstructurereview-121123101318-phpapp02.pdf
marketstructurereview-121123101318-phpapp02.pdfmarketstructurereview-121123101318-phpapp02.pdf
marketstructurereview-121123101318-phpapp02.pdf
 
unit1rulesofinference-170113152312.pdf
unit1rulesofinference-170113152312.pdfunit1rulesofinference-170113152312.pdf
unit1rulesofinference-170113152312.pdf
 
mathematicalinductionanddivisibilityrules-160711105713.pdf
mathematicalinductionanddivisibilityrules-160711105713.pdfmathematicalinductionanddivisibilityrules-160711105713.pdf
mathematicalinductionanddivisibilityrules-160711105713.pdf
 
0th-review-1.pptx
0th-review-1.pptx0th-review-1.pptx
0th-review-1.pptx
 
Blockchain Banking 0th Review.pptx
Blockchain Banking 0th Review.pptxBlockchain Banking 0th Review.pptx
Blockchain Banking 0th Review.pptx
 
timesproet-180212053847.pdf
timesproet-180212053847.pdftimesproet-180212053847.pdf
timesproet-180212053847.pdf
 
slide5keys-140722233859-phpapp02.pdf
slide5keys-140722233859-phpapp02.pdfslide5keys-140722233859-phpapp02.pdf
slide5keys-140722233859-phpapp02.pdf
 
neerajppt-130323071407-phpapp02.pdf
neerajppt-130323071407-phpapp02.pdfneerajppt-130323071407-phpapp02.pdf
neerajppt-130323071407-phpapp02.pdf
 
criticalsectionproblem-160905215747.pdf
criticalsectionproblem-160905215747.pdfcriticalsectionproblem-160905215747.pdf
criticalsectionproblem-160905215747.pdf
 
analysisofsupply-160417044322.pdf
analysisofsupply-160417044322.pdfanalysisofsupply-160417044322.pdf
analysisofsupply-160417044322.pdf
 
relationsandfunctionslessonproper-160929053921.pdf
relationsandfunctionslessonproper-160929053921.pdfrelationsandfunctionslessonproper-160929053921.pdf
relationsandfunctionslessonproper-160929053921.pdf
 
coloring.pptx
coloring.pptxcoloring.pptx
coloring.pptx
 
coloring.ppt
coloring.pptcoloring.ppt
coloring.ppt
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

BLOCKHUNTER.pptx

  • 2. 20TQ5A0508 A.Sravan Kumar | TEAM MEMBERS:- 01 03 20TQ5A0509 C.Rakesh 20TQ5A0504 S.Chandana 02 19TQ1A0576 V.Sai Kumar Under The Guidance Of:- Swetha Madam 04
  • 3. | CONTENTS :- 1) Abstract 2) Literature Survey 3) Existing system 4) Proposed System
  • 4. ABSTRACT 1 Nowadays, blockchain-based technologies are being developed in various industries to improve data security. In the context of the Industrial Internet of Things, a chain-based network is one of the most notable applications of blockchain technology. IIoT devices have become increasingly prevalent in our digital world, especially in support of developing smart factories. Although blockchain is a powerful tool, it is vulnerable to cyber attacks. Detecting anomalies in blockchain-based IIoT networks in smart factories is crucial in protecting networks and systems from unexpected attacks. we use Federated Learning (FL) to build a threat hunting framework called Block Hunter to automatically hunt for attacks in blockchain-based IIoT networks.
  • 5. |Literature Survey A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory AUTHORS:- J. Wan, J. Li, M. Imran, D. Li, and F. e Amin Through the Industrial Internet of Things (IIoT), a smart factory has entered the booming period. However, as the number of nodes and network size become larger, the traditional IIoT architecture can no longer provide effective support for such enormous system. Therefore, they introduce the Blockchain architecture, which is an emerging scheme for constructing the distributed networks, to reshape the traditional IIoT architecture 2
  • 6. Blockchain Attack Discovery via Anomaly Detection AUTHORS:- F. Scicchitano, A. Liguori, M. Guarascio, E. Ritacco, and G. Manco,. In this work, they define an anomaly detection system based on a encoder-decoder deep learning model, that is trained exploiting information extracted by monitoring blockchain activities. Experiments on complete historical logs of Ethereum Classic network prove the capability of the our model to effectively detect the publicly reported attacks. To the best of their knowledge, their approach was the first one that provides a comprehensive and feasible solution to monitor the security of blockchain transactions.
  • 7. ➢ A Blockchain based IOT network security already exists it is a link-mining tool based on anomaly detection within Blockchain networks. ➢ It Aim’s at gathering Meta-data in the form of forks (i.e. divergent paths from the Blockchain protocol) in order to find the semantic interpretation of anomalous paths/activities, through mutual information based measure EXISTING SYSTEM 3
  • 8. DISADVANTAGES OF EXISTING SYSTEM:- ❖ The system is not implemented on Cluster-Based Local Outlier Factor. ❖ It is not implemented in IIOT ❖ It is not implemented in Federated Learning
  • 9. ➔ We use FL to update the model frequently and to obtain a global model for detecting an anomaly. After learning about each smart factory’s data, devices, and service provider, the model’s parameters will be sent to the parameter server for aggregation and to update our general model. PROPOSED SYSTEM 4
  • 10. ❖ Federation Construction: The subset of smart factory members, cluster, selected to receive the model locally. ❖ Decentralized Training: When a cluster of smart factories is selected, it updates its model using its local data. ❖ Model Accumulation: Responsible for accumulating and merging the data models. Data is not sent and integrated from the federation to the server individually. ADVANTAGES OF PROPOSED SYSTEM:-