Skip to the content.

Blockchain for Cyber Security

banner.webp image taken from mailguard

It has not been too long since blockchain has emerged in sight. But, within last few years, we have noticed a really rapid growth in the same. Presently the blockchain has span into a realy large area of application to solve many real world problems.

Since the arrival of Bitcoin blockchain, development of the decentralized network and management system have become such a revolution that presently there are plenty of the orginations as well as countries who have started to accept the blockchain for there mainstream workflows.

In such a rapidly growing world of BC technology, it has ben noticed that there exist a lot of the bugs and vulnarabilities in this domain those are highly prone to the cyber attecks. The issue is that a large number of such issues are yet to be resolved.

In order to understand it better, we have analyzed many research works done in past 10 years. We have noticed that with the growth the of new vulnerabilities in BC technologies, there has been a noticable boost in the security oriented researches, too. We also analyzed the different vulnerabilities from the CVE database, those are specific to the blockchain network.

Folowing tabular representation shows a set of 13 topics generated after applying the topic modeling on the analyzed dataset:

TOPICS Top 10 Tokens (along with their coherence score)
Topic 1 0.037 * iot + 0.021 * device + 0.020 * network + 0.017 * technology + 0.016 * datum + 0.015 * internet + 0.014 * smart + 0.013 * service + 0.012 * application + 0.011 * privacy
Topic 2 0.022 * technology + 0.022 * application + 0.019 * research + 0.015 * study + 0.012 * network + 0.012 * detection + 0.011 * issue + 0.010 * provide + 0.009 * model + 0.009 * present
Topic 3 0.057 * network + 0.026 * payment + 0.019 * protocol + 0.019 * channel + 0.015 * transaction + 0.015 * party + 0.013 * node + 0.011 * bitcoin + 0.010 * peer + 0.010 * privacy
Topic 4 0.033 * protocol + 0.031 * transaction + 0.031 * consensus + 0.019 * node + 0.015 * design + 0.014 * network + 0.013 * byzantine + 0.013 * throughput + 0.013 * performance + 0.012 * distribute
Topic 5 0.049 * datum + 0.030 * data + 0.029 * share + 0.021 * privacy + 0.020 * access + 0.018 * technology + 0.017 * healthcare + 0.016 * secure + 0.013 * control + 0.013 * health
Topic 6 0.106 * contract + 0.075 * smart + 0.028 * ethereum + 0.026 * vulnerability + 0.013 * execution + 0.013 * detect + 0.012 * program + 0.011 * tool + 0.010 * analysis + 0.008 * deploy
Topic 7 0.051 * model + 0.041 * learn + 0.024 * framework + 0.021 * fl + 0.017 * datum + 0.017 * train + 0.015 * privacy + 0.015 * federate + 0.012 * result + 0.012 * dataset
Topic 8 0.046 * bitcoin + 0.037 * miner + 0.030 * block + 0.027 * work + 0.021 * reward + 0.017 * proof + 0.017 * incentive + 0.016 * pow + 0.016 * pool + 0.014 * power
Topic 9 0.034 * quantum + 0.033 * node + 0.016 * access + 0.015 * cryptographic + 0.014 * proof + 0.012 * control + 0.011 * model + 0.011 * code + 0.011 * provide + 0.011 * agent
Topic 10 0.051 * protocol + 0.040 * chain + 0.039 * block + 0.022 * proof + 0.021 * consensus + 0.017 * stake + 0.014 * analysis + 0.013 * time + 0.012 * provide + 0.012 * guarantee
Topic 11 0.040 * chain + 0.032 * transaction + 0.026 * protocol + 0.019 * decentralize + 0.017 * defi + 0.017 * financial + 0.013 * ethereum + 0.012 * exchange + 0.012 * cryptocurrencie + 0.012 * find
Topic 12 0.036 * user + 0.027 * energy + 0.023 * information + 0.021 * datum + 0.021 * transaction + 0.016 * trace + 0.015 * address + 0.015 * privacy + 0.012 * smart + 0.011 * risk
Topic 13 0.025 * model + 0.022 * account + 0.020 * contract + 0.020 * transaction + 0.018 * platform + 0.015 * user + 0.015 * ethereum + 0.013 * smart + 0.012 * technology + 0.012 * issue

To reduce such threats even more for existing as well as upcoming BC networks, we followed the topic modeling approache. We have also created a web-portal to explore the relevance of analyzed papers with the different topics, which will be helpful for the research communities as well. This is done with the LDA topic modeling method and the same web-portal can be acessed here.

You may also access some of the visualization generated using VOSviewer by clicking here and wordclouds by clicking here