Data Cooperatives for Neighborhood Watch

The increasing proliferation of user data is moving the world from the era of ’big data’ to a new era of shared data, and some are considering data as a factor of production that is paving the way for a new business economy. In this paper, we propose a solution that uses blockchain technology as a platform for online neighborhood watch using a form of data cooperative among individuals or organizations in the sharing of data through a peer-to-peer mechanism. We prove the concept by implementing a distributed phishing data sharing system that will maintain a community ledger of reported phishing activities with a consensus-based approval of the phishing transaction and a novel reputation scoring system thereby adding reliability to the system and effectively tackling the phishing problem. The data cooperative provides a way for timely multi-party sharing of phishing data among anti-phishing organizations and users of the internet eliminating the current approach of each organization maintaining its database. Our results show that blockchain is effective in complementing the existing methods of phishing detection and serves as a platform for sharing phishing data with respect to scalability, cost, and memory consumption. Also, our results further show that transaction times on the Ropsten test net follow a Gamma distribution. Our approach can be extrapolated to other data sharing systems like medical data, spam calls, discussion forums, etc.

[1]  Jeremy Mennis,et al.  Incorporating Geographic Information Science and Technology in Response to the COVID-19 Pandemic , 2020, Preventing chronic disease.

[2]  T. Chithralekha,et al.  Classification of Anti-phishing Solutions , 2019, SN Computer Science.

[3]  Yang Wang,et al.  PhishLedger: A Decentralized Phishing Data Sharing Mechanism , 2019 .

[4]  Ram Dantu,et al.  Distributed Ledger for Spammers' Resume , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).

[5]  Arun Vishwanath,et al.  Getting phished on social media , 2017, Decis. Support Syst..

[6]  Ed de Quincey,et al.  Using supervised machine learning algorithms to detect suspicious URLs in online social networks , 2017, ASONAM.

[7]  Elijah Blessing Rajsingh,et al.  Intelligent phishing url detection using association rule mining , 2016, Human-centric Computing and Information Sciences.

[8]  Li Zhang,et al.  Detection of phishing emails using data mining algorithms , 2015, 2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA).

[9]  Juan Benet,et al.  IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.

[10]  J. Hajgude,et al.  “Phish mail guard: Phishing mail detection technique by using textual and URL analysis” , 2012, 2012 World Congress on Information and Communication Technologies.

[11]  Tommy W. S. Chow,et al.  Textual and Visual Content-Based Anti-Phishing: A Bayesian Approach , 2011, IEEE Transactions on Neural Networks.

[12]  Stephen Groat,et al.  GoldPhish: Using Images for Content-Based Phishing Analysis , 2010, 2010 Fifth International Conference on Internet Monitoring and Protection.

[13]  Paul Sroufe,et al.  E‐Shape Analysis , 2009 .

[14]  Lorrie Faith Cranor,et al.  Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.

[15]  S. Resnick,et al.  QQ Plots, Random Sets and Data from a Heavy Tailed Distribution , 2007, math/0702551.

[16]  Srikanth Palla,et al.  A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails , 2006 .

[17]  Mostafa H. Ammar,et al.  A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.

[18]  A. Wechsler Statistics for the rest of us. , 2001, The Journal of thoracic and cardiovascular surgery.

[19]  Empowering Innovation through Data Cooperatives , 2021, Building the New Economy.

[20]  Ram Dantu,et al.  Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews , 2020, IACR Cryptol. ePrint Arch..

[21]  Towards an Internet of Trusted Data , 2019, Trusted Data.

[22]  Koichi Nakayama,et al.  An Algorithm that Prevents SPAM Attacks using Blockchain , 2018 .

[23]  Abdelfettah Belghith,et al.  Using Case-Based Reasoning for Phishing Detection , 2017, ANT/SEIT.

[24]  Daniel Davis Wood ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[25]  U. Vidya Sagar,et al.  Intelligent Phishing Website Detection and Prevention System by Using Link Guard Algorithm , 2013 .

[26]  L. Shenton,et al.  Gamma Distribution , 2011, International Encyclopedia of Statistical Science.

[27]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .