Loading...

Media is loading
 

Paper Type

Complete

Description

We analyze the most common security vulnerabilities in distributed ledger systems. We performed predictive analytics on the REKT database to predict the attack pattern using predictive algorithms, including logistic regression and random forests. The results show that the month of the attack and the cryptocurrency chain affected were significant predictors of the type of scam that occurred. The most important predictors were the Log of funds lost, the chain or platform of the cryptocurrency attacked, and the Log of funds returned after the attack. The study highlights the need for greater scrutiny and improved security measures in DeFi projects to mitigate the risks associated with the DeFi ecosystem.

Paper Number

1333

Comments

SIG SEC

Share

COinS
 
Aug 10th, 12:00 AM

DEFIYIELD: Exploitation of Open Blockchain Platforms

We analyze the most common security vulnerabilities in distributed ledger systems. We performed predictive analytics on the REKT database to predict the attack pattern using predictive algorithms, including logistic regression and random forests. The results show that the month of the attack and the cryptocurrency chain affected were significant predictors of the type of scam that occurred. The most important predictors were the Log of funds lost, the chain or platform of the cryptocurrency attacked, and the Log of funds returned after the attack. The study highlights the need for greater scrutiny and improved security measures in DeFi projects to mitigate the risks associated with the DeFi ecosystem.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.