Blockchain for Cyber Security
image taken from mailguard
It has not been too long since blockchain has emerged in sight. But, within last few years, we have noticed a really rapid growth in the same. Presently the blockchain has span into a realy large area of application to solve many real world problems.
Since the arrival of Bitcoin blockchain, development of the decentralized network and management system have become such a revolution that presently there are plenty of the orginations as well as countries who have started to accept the blockchain for there mainstream workflows.
In such a rapidly growing world of BC technology, it has ben noticed that there exist a lot of the bugs and vulnarabilities in this domain those are highly prone to the cyber attecks. The issue is that a large number of such issues are yet to be resolved.
In order to understand it better, we have analyzed many research works done in past 10 years. We have noticed that with the growth the of new vulnerabilities in BC technologies, there has been a noticable boost in the security oriented researches, too. We also analyzed the different vulnerabilities from the CVE database, those are specific to the blockchain network.
Folowing tabular representation shows a set of 13 topics generated after applying the topic modeling on the analyzed dataset:
TOPICS | Top 10 Tokens (along with their coherence score) |
---|---|
Topic 1 | 0.037 * iot + 0.021 * device + 0.020 * network + 0.017 * technology + 0.016 * datum + 0.015 * internet + 0.014 * smart + 0.013 * service + 0.012 * application + 0.011 * privacy |
Topic 2 | 0.022 * technology + 0.022 * application + 0.019 * research + 0.015 * study + 0.012 * network + 0.012 * detection + 0.011 * issue + 0.010 * provide + 0.009 * model + 0.009 * present |
Topic 3 | 0.057 * network + 0.026 * payment + 0.019 * protocol + 0.019 * channel + 0.015 * transaction + 0.015 * party + 0.013 * node + 0.011 * bitcoin + 0.010 * peer + 0.010 * privacy |
Topic 4 | 0.033 * protocol + 0.031 * transaction + 0.031 * consensus + 0.019 * node + 0.015 * design + 0.014 * network + 0.013 * byzantine + 0.013 * throughput + 0.013 * performance + 0.012 * distribute |
Topic 5 | 0.049 * datum + 0.030 * data + 0.029 * share + 0.021 * privacy + 0.020 * access + 0.018 * technology + 0.017 * healthcare + 0.016 * secure + 0.013 * control + 0.013 * health |
Topic 6 | 0.106 * contract + 0.075 * smart + 0.028 * ethereum + 0.026 * vulnerability + 0.013 * execution + 0.013 * detect + 0.012 * program + 0.011 * tool + 0.010 * analysis + 0.008 * deploy |
Topic 7 | 0.051 * model + 0.041 * learn + 0.024 * framework + 0.021 * fl + 0.017 * datum + 0.017 * train + 0.015 * privacy + 0.015 * federate + 0.012 * result + 0.012 * dataset |
Topic 8 | 0.046 * bitcoin + 0.037 * miner + 0.030 * block + 0.027 * work + 0.021 * reward + 0.017 * proof + 0.017 * incentive + 0.016 * pow + 0.016 * pool + 0.014 * power |
Topic 9 | 0.034 * quantum + 0.033 * node + 0.016 * access + 0.015 * cryptographic + 0.014 * proof + 0.012 * control + 0.011 * model + 0.011 * code + 0.011 * provide + 0.011 * agent |
Topic 10 | 0.051 * protocol + 0.040 * chain + 0.039 * block + 0.022 * proof + 0.021 * consensus + 0.017 * stake + 0.014 * analysis + 0.013 * time + 0.012 * provide + 0.012 * guarantee |
Topic 11 | 0.040 * chain + 0.032 * transaction + 0.026 * protocol + 0.019 * decentralize + 0.017 * defi + 0.017 * financial + 0.013 * ethereum + 0.012 * exchange + 0.012 * cryptocurrencie + 0.012 * find |
Topic 12 | 0.036 * user + 0.027 * energy + 0.023 * information + 0.021 * datum + 0.021 * transaction + 0.016 * trace + 0.015 * address + 0.015 * privacy + 0.012 * smart + 0.011 * risk |
Topic 13 | 0.025 * model + 0.022 * account + 0.020 * contract + 0.020 * transaction + 0.018 * platform + 0.015 * user + 0.015 * ethereum + 0.013 * smart + 0.012 * technology + 0.012 * issue |
To reduce such threats even more for existing as well as upcoming BC networks, we followed the topic modeling approache. We have also created a web-portal to explore the relevance of analyzed papers with the different topics, which will be helpful for the research communities as well. This is done with the LDA topic modeling method and the same web-portal can be acessed here.
You may also access some of the visualization generated using
VOSviewer
by clicking here andwordclouds
by clicking here