Abstract

Cryptocurrencies have been a target for cybercriminal activities because of the pseudo-anonymity and privacy they offer. Researchers have been actively working on analyzing and developing innovative defensive mechanisms to prevent these activities. A significant challenge facing researchers is collecting datasets to train defensive systems to detect and analyze these cyberattacks. Our aims in this systematic review are to explore and aggregate the state of the art threats that have emerged with cryptocurrencies and the defensive mechanisms that have been proposed. We also discuss the threats type, scale, and how efficient the defensive mechanisms are in providing early detection and prevention. We also list out the resources that have been used to collect datasets, and we identify the publicly available ones. In this study, we extracted 1,221 articles from four top scientific and engineering databases and libraries in Computer Science: IEEE Xplore, ACM Digital Library, Elsevier's Scopus, and Crarivate's Web of Science. We defined inclusion, exclusion, and quality of assessment criteria, and after a detailed review process, 66 publications were included in the final review. Our analysis revealed that the literature contains a significant amount of research to detect and analyze several attack types, such as the high yield investment programs and pump and dump. These attacks have been used to steal millions of USD, abuse millions of connected devices, and have created even more significant loss in denial of services and productivity losses. We have found that the researchers use various sources to collect training datasets. Many authors have made their dataset publicly available. We have created a list of these datasets, which we have made available along with other supplementary websites, tools, and libraries that can be used in the data collection and analysis process.

Highlights

  • IntroductionThere has been a rise in the use of cryptocurrencies as an investment platform [1]

  • In recent years, there has been a rise in the use of cryptocurrencies as an investment platform [1]

  • DATA RESULTS In recent years, researchers have been actively working on analyzing the cyberattacks that emerged with the introduction of cryptocurrencies

Read more

Summary

Introduction

There has been a rise in the use of cryptocurrencies as an investment platform [1]. Bitcoin is a decentralized cryptocurrency that has become popular in the last ten years It is a peer-to-peer electronic currency that can be sent from one user to another without the involvement of a trusted authority such as an administrator. Bitcoin has two key features: Transparency and Pseudo-anonymity [2], [4], [5] It is transparent because the transactions are publicly announced in a decentralized ledger called a blockchain. The Pseudo-anonymity comes from the fact that the users use pseudonyms (addresses). These pseudonyms are not related to individuals; they are computed from the user’s public key [2]. This increases privacy by creating an additional layer to keep the addresses from being linked to a specific owner [2]

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call