This document summarizes research on using blockchain technology to detect various types of fraud. It first provides background on blockchain and discusses how blockchain can help prevent fraud by creating permanent, immutable records of transactions. It then summarizes 10 research papers that propose different blockchain-based approaches to detecting fraud in areas like employment history, online businesses, insurance claims, and digital media. Each proposed approach is briefly described along with its key challenges. Overall, the document finds that while blockchain shows promise in fraud detection, more work is still needed to address challenges like high costs, reliance on private keys, and the need for more robust fraud detection strategies as fraud tactics evolve.
A survey on security and policy aspects of blockchain technologyTELKOMNIKA JOURNAL
This survey talks about the problem of security and privacy in the blockchain ecosystem which is currently a hot issue in the blockchain community. The survey intended to study this problem by considering different types of attacks in the blockchain network with respect to algorithms presented. After a preliminary literature review it seems that some focus has been given to study the first use case while, to the best of my knowledge, the second use case requires more attention when blockchain is applied to study it. The research is also interested in exploring the link between these two use cases to study the overall data ownership preserving accountable system which will be a novel contribution of this work. However, due to the subsequent government mandated secrecy around the implementation of data encryption standard (DES), and the distrust of the academic community because of this, a movement was spawned that put a premium on individual privacy and decentralized control. This movement brought together the top minds in encryption and spawned the technology we know of as blockchain today. This survey explores the genesis of encryption, its early adoption, and the government meddling which eventually spawned a movement which gave birth to the ideas behind blockchain.
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...ijaia
The increasing popularity of crypto assets has resulted in greater cryptocurrency investor interest and more exposure in both industry and academia. Despite the substantial socioeconomic benefits, the anonymous character of cryptocurrency trading makes it prone to abuse and a magnet for illicit purposes, which cause monetary losses for individual traders and erosion in the standing of the tokenomics industry. To regulate the illicit behavior and secure users' privacy for cryptocurrency trading, we present an Anomaly Detection and Privacy-Preserving (ADPP) Framework integrating blockchain and deep learning technologies. Specifically, ADPP leverages blockchain technologies to build a user management platform that ensures anonymity and enhances the privacy-preservation of user information. Atop the user management system, an Anomaly Detection System adapts neural networks and imbalanced learning on topological cryptocurrency flow among users to identify anomalous addresses and maintain a sanction list repository. The experiments on the real-world dataset demonstrate the effectiveness and superior performance of ADPP. The flexible framework can be easily generalized to the crypto assets with public real-time transaction (e.g., Non-fungible Token), which takes up a significant proportion of market capitalization in the domain of tokenomics.
A survey on security and policy aspects of blockchain technologyTELKOMNIKA JOURNAL
This survey talks about the problem of security and privacy in the blockchain ecosystem which is currently a hot issue in the blockchain community. The survey intended to study this problem by considering different types of attacks in the blockchain network with respect to algorithms presented. After a preliminary literature review it seems that some focus has been given to study the first use case while, to the best of my knowledge, the second use case requires more attention when blockchain is applied to study it. The research is also interested in exploring the link between these two use cases to study the overall data ownership preserving accountable system which will be a novel contribution of this work. However, due to the subsequent government mandated secrecy around the implementation of data encryption standard (DES), and the distrust of the academic community because of this, a movement was spawned that put a premium on individual privacy and decentralized control. This movement brought together the top minds in encryption and spawned the technology we know of as blockchain today. This survey explores the genesis of encryption, its early adoption, and the government meddling which eventually spawned a movement which gave birth to the ideas behind blockchain.
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...ijaia
The increasing popularity of crypto assets has resulted in greater cryptocurrency investor interest and more exposure in both industry and academia. Despite the substantial socioeconomic benefits, the anonymous character of cryptocurrency trading makes it prone to abuse and a magnet for illicit purposes, which cause monetary losses for individual traders and erosion in the standing of the tokenomics industry. To regulate the illicit behavior and secure users' privacy for cryptocurrency trading, we present an Anomaly Detection and Privacy-Preserving (ADPP) Framework integrating blockchain and deep learning technologies. Specifically, ADPP leverages blockchain technologies to build a user management platform that ensures anonymity and enhances the privacy-preservation of user information. Atop the user management system, an Anomaly Detection System adapts neural networks and imbalanced learning on topological cryptocurrency flow among users to identify anomalous addresses and maintain a sanction list repository. The experiments on the real-world dataset demonstrate the effectiveness and superior performance of ADPP. The flexible framework can be easily generalized to the crypto assets with public real-time transaction (e.g., Non-fungible Token), which takes up a significant proportion of market capitalization in the domain of tokenomics.
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)IJCNCJournal
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger technology that can manage many intelligent transactions and ensure greater security in data management. The Blockchain-based security mechanisms with specific adaptation and additional layers of authentication and verification can offer a complete resources' management system. It has demonstrated it’s superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication system-based API Gateway model that provides network and communication security. Reasonable implementation is proposed and the obtained results demonstrate that our approach shows satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality of user data.
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)IJCNCJournal
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and
availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the
Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger
technology that can manage many intelligent transactions and ensure greater security in data
management. The Blockchain-based security mechanisms with specific adaptation and additional layers of
authentication and verification can offer a complete resources' management system. It has demonstrated
it’s superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication
system-based API Gateway model that provides network and communication security.
Reasonable implementation is proposed and the obtained results demonstrate that our approach shows
satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic
analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality
of user data.
The article outlines a number of disadvantages, advantages and advantages of the blockchain today. Also, the types of blockchain are given and how blockchain allows you to organize trade without intermediaries, which can later introduce many services into everyday life and change the way the banking sector works. Mukhammedova Zarina Murodovna "Disadvantages and Advantages of Blockchain" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46253.pdf Paper URL: https://www.ijtsrd.com/economics/other/46253/disadvantages-and-advantages-of-blockchain/mukhammedova-zarina-murodovna
Comprehensive List Of Blockchain Security ToolsSoluLab1231
In the fast-evolving landscape of digital transactions and decentralized systems, the importance of blockchain security cannot be overstated. Blockchain, initially designed as the underlying technology for cryptocurrencies like Bitcoin, has now transcended its origins to become a transformative force in various industries. As organizations increasingly rely on blockchain technology to streamline processes, enhance transparency, and ensure trust in digital interactions, the need for robust security measures has become a paramount concern.
Role of blockchain technology in critical infrastructure securityGlobal Tech Council
Blockchain is a distributed ledger system that was once referred to as Bitcoin's underlying exchange technology, but has now widened its field and emerged as a mainstream technology that embraces other innovations such as artificial intelligence, machine learning, data science, big data, and more.
"Show me the industry that lacks Trust, Transparency, Security, and Privacy and I will show you the use case of blockchain technology in that industry."
Blockchain is a Global, Decentralized, and Distributed transactional database/ ledger that records the provenance of a digital asset. It is Highly Transparent, Secure, and Immutable.
This presentation will explore the intricacies of blockchain security, examining its tools, potential, and inherent challenges.
(Balanced and informative)
From promise to peril: Navigating the security landscape of blockchain technology.
(Intriguing and emphasizes security challenges)
Building fortresses on sand: Securing the promises and mitigating the drawbacks of blockchain.
(Metaphorical and highlights both sides)
A decentralized consensus application using blockchain ecosystem IJECEIAES
The consensus is a critical operation of any decision-making process. It involves a set of eligible members; whose decision need to be honored by taking their acknowledgment before making any decision. The traditional consensus process follows centralized architecture, the members need to rely on and trust this architecture. The proposed system aims to develop a secure decentralized consensus application in the untrusted environment by making use of blockchain technology along with smart contract and interplanetary file system (IPFS).
A blockchain is essentially a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participating parties. Each transaction in the public ledger is verified by consensus of a majority of the participants in the system. And, once entered, information can never be erased. The blockchain contains a certain and verifiable record of every single transaction ever made. To use a basic analogy, it is easy to steal a cookie from a cookie jar, kept in a secluded place than stealing the cookie from a cookie jar kept in a marketplace, being observed by thousands of people. In the report, it distinguishes between multiple types of blockchains and explains the two biggest platforms, namely Bitcoin and Ethereum. While introducing those two platforms we explain the most important technology and algorithms used such as proof of work concept. Some of the security issues and solutions are also covered. We conclude with some concrete Ethereum based applications that demonstrate the usage of blockchain technology beyond cryptocurrency and illustrate current developments in this field.
Blockchain technology for secure and decentralised app developmentAResourcePool
In today's digital ecosystem, blockchain technology has emerged as a revolutionary force that is reshaping businesses and how we think about trust, security, and transparency.
https://aresourcepool.com/full-stack-development/
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)IJCNCJournal
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger technology that can manage many intelligent transactions and ensure greater security in data management. The Blockchain-based security mechanisms with specific adaptation and additional layers of authentication and verification can offer a complete resources' management system. It has demonstrated it’s superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication system-based API Gateway model that provides network and communication security. Reasonable implementation is proposed and the obtained results demonstrate that our approach shows satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality of user data.
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)IJCNCJournal
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and
availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the
Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger
technology that can manage many intelligent transactions and ensure greater security in data
management. The Blockchain-based security mechanisms with specific adaptation and additional layers of
authentication and verification can offer a complete resources' management system. It has demonstrated
it’s superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication
system-based API Gateway model that provides network and communication security.
Reasonable implementation is proposed and the obtained results demonstrate that our approach shows
satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic
analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality
of user data.
The article outlines a number of disadvantages, advantages and advantages of the blockchain today. Also, the types of blockchain are given and how blockchain allows you to organize trade without intermediaries, which can later introduce many services into everyday life and change the way the banking sector works. Mukhammedova Zarina Murodovna "Disadvantages and Advantages of Blockchain" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46253.pdf Paper URL: https://www.ijtsrd.com/economics/other/46253/disadvantages-and-advantages-of-blockchain/mukhammedova-zarina-murodovna
Comprehensive List Of Blockchain Security ToolsSoluLab1231
In the fast-evolving landscape of digital transactions and decentralized systems, the importance of blockchain security cannot be overstated. Blockchain, initially designed as the underlying technology for cryptocurrencies like Bitcoin, has now transcended its origins to become a transformative force in various industries. As organizations increasingly rely on blockchain technology to streamline processes, enhance transparency, and ensure trust in digital interactions, the need for robust security measures has become a paramount concern.
Role of blockchain technology in critical infrastructure securityGlobal Tech Council
Blockchain is a distributed ledger system that was once referred to as Bitcoin's underlying exchange technology, but has now widened its field and emerged as a mainstream technology that embraces other innovations such as artificial intelligence, machine learning, data science, big data, and more.
"Show me the industry that lacks Trust, Transparency, Security, and Privacy and I will show you the use case of blockchain technology in that industry."
Blockchain is a Global, Decentralized, and Distributed transactional database/ ledger that records the provenance of a digital asset. It is Highly Transparent, Secure, and Immutable.
This presentation will explore the intricacies of blockchain security, examining its tools, potential, and inherent challenges.
(Balanced and informative)
From promise to peril: Navigating the security landscape of blockchain technology.
(Intriguing and emphasizes security challenges)
Building fortresses on sand: Securing the promises and mitigating the drawbacks of blockchain.
(Metaphorical and highlights both sides)
A decentralized consensus application using blockchain ecosystem IJECEIAES
The consensus is a critical operation of any decision-making process. It involves a set of eligible members; whose decision need to be honored by taking their acknowledgment before making any decision. The traditional consensus process follows centralized architecture, the members need to rely on and trust this architecture. The proposed system aims to develop a secure decentralized consensus application in the untrusted environment by making use of blockchain technology along with smart contract and interplanetary file system (IPFS).
A blockchain is essentially a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participating parties. Each transaction in the public ledger is verified by consensus of a majority of the participants in the system. And, once entered, information can never be erased. The blockchain contains a certain and verifiable record of every single transaction ever made. To use a basic analogy, it is easy to steal a cookie from a cookie jar, kept in a secluded place than stealing the cookie from a cookie jar kept in a marketplace, being observed by thousands of people. In the report, it distinguishes between multiple types of blockchains and explains the two biggest platforms, namely Bitcoin and Ethereum. While introducing those two platforms we explain the most important technology and algorithms used such as proof of work concept. Some of the security issues and solutions are also covered. We conclude with some concrete Ethereum based applications that demonstrate the usage of blockchain technology beyond cryptocurrency and illustrate current developments in this field.
Blockchain technology for secure and decentralised app developmentAResourcePool
In today's digital ecosystem, blockchain technology has emerged as a revolutionary force that is reshaping businesses and how we think about trust, security, and transparency.
https://aresourcepool.com/full-stack-development/
Similar to Fraud Detection: A Review on Blockchain (20)
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
An Approach to Detecting Writing Styles Based on Clustering Techniquesambekarshweta25
An Approach to Detecting Writing Styles Based on Clustering Techniques
Authors:
-Devkinandan Jagtap
-Shweta Ambekar
-Harshit Singh
-Nakul Sharma (Assistant Professor)
Institution:
VIIT Pune, India
Abstract:
This paper proposes a system to differentiate between human-generated and AI-generated texts using stylometric analysis. The system analyzes text files and classifies writing styles by employing various clustering algorithms, such as k-means, k-means++, hierarchical, and DBSCAN. The effectiveness of these algorithms is measured using silhouette scores. The system successfully identifies distinct writing styles within documents, demonstrating its potential for plagiarism detection.
Introduction:
Stylometry, the study of linguistic and structural features in texts, is used for tasks like plagiarism detection, genre separation, and author verification. This paper leverages stylometric analysis to identify different writing styles and improve plagiarism detection methods.
Methodology:
The system includes data collection, preprocessing, feature extraction, dimensional reduction, machine learning models for clustering, and performance comparison using silhouette scores. Feature extraction focuses on lexical features, vocabulary richness, and readability scores. The study uses a small dataset of texts from various authors and employs algorithms like k-means, k-means++, hierarchical clustering, and DBSCAN for clustering.
Results:
Experiments show that the system effectively identifies writing styles, with silhouette scores indicating reasonable to strong clustering when k=2. As the number of clusters increases, the silhouette scores decrease, indicating a drop in accuracy. K-means and k-means++ perform similarly, while hierarchical clustering is less optimized.
Conclusion and Future Work:
The system works well for distinguishing writing styles with two clusters but becomes less accurate as the number of clusters increases. Future research could focus on adding more parameters and optimizing the methodology to improve accuracy with higher cluster values. This system can enhance existing plagiarism detection tools, especially in academic settings.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.