Securing Smart Contracts in Fog Computing: Machine Learning-Based Attack Detection for Registration and Resource Access Granting

Abstract

Attack resistance in smart contracts has become one of the paramount concerns in this fog computing evolving landscape. Based on this problem, this study utilizes machine learning for the detection of attacks from the analysis of Ethereum transaction data and smart contract interactions. There are different methods for feature extraction: Term Frequency-Inverse Document Frequency (TF-IDF), Bag of Words (BoW), and N-gram methods for converting raw data into readable formats by machine. Several machine learning classifiers, including XGBoost, Random Forest, Light Gradient Boosting, and Extra Trees, are applied to detect the attacks. These models should offer high detection accuracy with low computational complexity, enabling scalability for real-time fog computing applications. Experimental results show that Extra Trees, with N-gram features, outperformed other models by achieving an accuracy of 83%. The proposed system is promising toward the efficient detection and classification of attacks in a dynamic fog environment.

Country : India

1 A.Gowtham2 K.Nanda Kishore Reddy3 M.Somu Sekhar Naik

  1. Assistant Professor, Department of Computer Science and Engineering and Cyber Security (UG), Madanapalle Institute of Technology & Science (Autonomous), Madanapalle, India
  2. UG Scholar, Department of Computer Science and Engineering and Cyber Security (UG), Madanapalle Institute of Technology & Science (Autonomous), Madanapalle, India
  3. UG Scholar, Department of Computer Science and Engineering and Cyber Security (UG), Madanapalle Institute of Technology & Science (Autonomous), Madanapalle, India

IRJIET, Volume 9, Special Issue of ICCIS-2025 May 2025 pp. 48-54

doi.org/10.47001/IRJIET/2025.ICCIS-202507

References

  1. F. Akbarian, W. Tärneberg, E. Fitzgerald and M. Kihl, "Attack Resilient Cloud-Based Control Systems for Industry 4.0," in IEEE Access, vol. 11, pp. 27865-27882, 2023, doi: 10.1109/ACCESS.2023.3259063.
  2. A.V. Nagarjun and S. Rajkumar, "Design of an Anomaly Detection Framework for Delay and Privacy-Aware Blockchain-Based Cloud Deployments," in IEEE Access, vol. 12, pp. 84843-84862, 2024, doi: 10.1109/ACCESS.2024.3414998.
  3. A.M. Abdallah, A. Saif Rashed Obaid Alkaabi, G. Bark Nasser Douman Alameri, S. H. Rafique, N. S. Musa and T. Murugan, "Cloud Network Anomaly Detection Using Machine and Deep Learning Techniques— Recent Research Advancements," in IEEE Access, vol. 12, pp. 56749-56773, 2024, doi: 10.1109/ACCESS.2024.3390844.
  4. U. Islam, A. Al-Atawi, H. S. Alwageed, M. Ahsan, F. A. Awwad and M. R. Abonazel, "Real-Time Detection Schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications," in IEEE Access, vol. 11, pp. 74641-74656, 2023, doi: 10.1109/ACCESS.2023.3290910.
  5. W. Wang, X. Du, D. Shan, R. Qin and N. Wang, "Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine," in IEEE Transactions on Cloud Computing, vol. 10, no. 3, pp. 1634-1646, 1 July-Sept. 2022, doi: 10.1109/TCC.2020.3001017.
  6. V. D. M. Rios, P. R. M. Inácio, D. Magoni and M. M. Freire, "Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey," in IEEE Access, vol. 10, pp. 76648-76668, 2022, doi: 10.1109/ACCESS.2022.3191430.
  7. J. Deng et al., "A Survey on Vehicular Cloud Network Security," in IEEE Access, vol. 11, pp. 136741-136757, 2023, doi: 10.1109/ACCESS.2023.3339192.
  8. J. M. Singh and R. Ramachandra, "3-D Face Morphing Attacks: Generation, Vulnerability and Detection," in IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 6, no. 1, pp. 103-117, Jan. 2024, doi: 10.1109/TBIOM.2023.3324684.
  9. A.B. Bhutto, X. S. Vu, E. Elmroth, W. P. Tay and M. Bhuyan, "Reinforced Transformer Learning for VSI-DDoS Detection in Edge Clouds," in IEEE Access, vol. 10, pp. 94677-94690, 2022, doi: 10.1109/ACCESS.2022.3204812.
  10. M. Mehmood, R. Amin, M. M. A. Muslam, J. Xie and H. Aldabbas, "Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning," in IEEE Access, vol. 11, pp. 46561-46576, 2023, doi: 10.1109/ACCESS.2023.3273895.
  11. H. Attou, A. Guezzaz, S. Benkirane, M. Azrour and Y. Farhaoui, "Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques," in Big Data Mining and Analytics, vol. 6, no. 3, pp. 311-320, September 2023, doi: 10.26599/BDMA.2022.9020038.
  12. A.Ahmim, F. Maazouzi, M. Ahmim, S. Namane and I. B. Dhaou, "Distributed Denial of Service Attack Detection for the Internet of Things Using Hybrid Deep Learning Model," in IEEE Access, vol. 11, pp. 119862-119875, 2023, doi: 10.1109/ACCESS.2023.3327620.
  13. E. Taherian-Fard, T. Niknam, R. Sahebi, M. Javidsharifi, A. Kavousi-Fard and J. Aghaei, "A Software Defined Networking Architecture for DDoS-Attack in the Storage of Multimicrogrids," in IEEE Access, vol. 10, pp. 83802-83812, 2022, doi: 10.1109/ACCESS.2022.3197283.
  14. J. Jasmine Shirley and M. Priya, "Hybrid MRMR-PCA BagDT—An Effective Feature Selection Based Ensemble Model for Real-Time Intrusion Detection in IoT Environment," in IEEE Access, vol. 12, pp. 144230-144248, 2024, doi: 10.1109/ACCESS.2024.3468897.
  15. M. F. Saiyedand and I. Al-Anbagi, "Deep Ensemble Learning With Pruning for DDoS Attack Detection in IoT Networks," in IEEE Transactions on Machine Learning in Communications and Networking, vol. 2, pp. 596-616, 2024, doi: 10.1109/TMLCN.2024.3395419.
  16. L. Almuqren, H. Alqahtani, S. S. Aljameel, A. S. Salama, I. Yaseen and A. A. Alneil, "Hybrid Metaheuristics With Machine Learning Based Botnet Detection in Cloud Assisted Internet of Things Environment," in IEEE Access, vol. 11, pp. 115668-115676, 2023, doi: 10.1109/ACCESS.2023.3322369.
  17. S. An, A. Leung, J. B. Hong, T. Eom and J. S. Park, "Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security," in IEEE Access, vol. 10, pp. 75117-75134, 2022, doi: 10.1109/ACCESS.2022.3190545.
  18. Y. Zhang et al., "Pattern Corruption-Assisted Physical Attacks Against Object Detection in UAV Remote Sensing," in IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 17, pp. 12931-12944, 2024, doi: 10.1109/JSTARS.2024.3422377.
  19. R. Flowers, "A Zero-Day Cloud Timing Channel Attack," in IEEE Access, vol. 10, pp. 128177-128186, 2022, doi: 10.1109/ACCESS.2022.3227420.
  20. P. Rana, I. Batra, A. Malik, I. -H. Ra, O. -S. Lee and A. S. M. Sanwar Hosen, "Efficacious Novel Intrusion Detection System for Cloud Computing Environment," in IEEE Access, vol. 12, pp. 99223-99239, 2024, doi: 10.1109/ACCESS.2024.3424528.