Swapna Siddamsetti,Dr. Muktevi Srivenkatesh,



Honeypot,smart contract,Ethereum,classification ,


The blockchain with the Ethereum platform has involved millions of accounts because of its powerful potential for providing countless services based on smart contracts. Millions of internet bots and hackers are looking forward to hitting open systems. Proactive security measures to secure our systems, data assets, and networks thus need to be facilitated. Each firm that does not wish to compromise its data must focus more on network security. Almost all commercial organizations and institutions worldwide create and utilize several cyber security technologies, such as intrusion detection systems to prevent unauthorized users or malware-related antivirus. Honeypots are one of these technologies. The efficiency of honeypots has deteriorated as the years have passed. We integrate the honeypot with Blockchain technology to enhance efficiency and effectiveness. We provide a data science detection method in this research that is mostly based on contract transaction behaviour. As a result, we suggest a specific kind of unfavorable honeypot. Through a comparison of the 352 honeypots and the 158,568 non-honeypots, the code and behavioral characteristics of honeypots are discovered. We try to separate these parts of an adversarial honeypot so that it can work around the ways that hackers can find it now.


I. Choi SK, Yang CH, Kwak J. 2018. System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats. KSII Transactions on Internet and Information Systems 12(2):906–918.
II. Dairu, Xie & Shilong, Zhang. (2021). Machine Learning Model for Sales Forecasting by Using XGBoost. 480-483. 10.1109/ICCECE51280.2021.9342304.
III. Etherscan, “Ethereum developer apis,” December 2019,
IV. Guo D, Zhong RY, Ling S, Rong Y, Huang GQ. 2020. A roadmap for Assembly 4.0: self-configuration of fixed-position assembly islands under Graduation Intelligent Manufacturing System. International Journal of Production Research 58(15):4631–4646 DOI 10.1080/00207543.2020.1762944.
V. Ja’fari F, Mostafavi S, Mizanian K, Jafari E. 2020. An intelligent botnet blocking approach in software-defined networks using honeypots. Journal of Ambient Intelligence and Humanized Computing.
VI. Jiafu W, Shenglong T, Zhaogang S, Di L, Shiyong W, Muhammad I, Athanasios VV. 2016. Software-defined industrial internet of things in the context of industry 4. 0. IEEE Sensors Journal 16(20):7373–7380.
VII. Mitchell, “Machine learning and data mining,” Communications of the ACM, vol. 42, no. 11, 1999.
VIII. Park ST, Li G, Hong JC. 2018. A study on smart factory-based ambient intelligence context-aware intrusion detection system using machine learning. Journal of Ambient Intelligence and Humanized Computing 11:1405–1412 DOI 10.1007/s12652-018-0998-6.
IX. Seungjin L, Abdullah A, Jhanjhi NZ. 2020. A review on honeypot-based botnet detection models for smart factory. International Journal of Advanced Computer Science and Applications 11(6):418–435.
X. Sharma, Vivek. (2012). Design & Implementation of Honeyd to Simulate Virtual Honeypots. IOSR Journal of Computer Engineering. 3. 28-34. 10.9790/0661-0312834.
XI. Vishwakarma R. 2019. A honeypot with machine learning based detection framework for defending IoT based Botnet DDoS attacks. In: 3rd International Conference on Trends in Electronics and Informatics, 23rd to 25th April 2019, Tirunelveli, Tamil Nadu, India. 1019–1024.
XII. Wang W, Shang Y, He Y, Li Y, Liu J. 2020. BotMark: automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Information Sciences 511:284–296 DOI 10.1016/j.ins.2019.09.024.

View Download