期刊文献+

基于免疫的区块链eclipse攻击的异常检测 被引量:3

Abnormal Detection of Eclipse Attacks on Blockchain Based on Immunity
下载PDF
导出
摘要 区块链的eclipse攻击具有并发性、隐蔽性的特点,且往往依赖多节点协作完成垄断受害节点网络连接的攻击;相应地,计算机免疫系统具有分布式、自学习和自适应能力强的特点,能够良好地适应区块链多节点P2P分布式网络连接的环境。因此,为了检测区块链是否受到eclipse攻击,提出了一种基于免疫的区块链eclipse攻击的新型检测模型,并且建立了该模型的架构,给出了模型中各要素的形式定义及各模块的执行流程。根据模型进行了仿真实验,结果表明该模型具有较高的准确性和效率。 The eclipse attack against the blockchain has the characteristics of concurrency and concealment,and often relies on multi-node to collaboratively complete the attack of monopolizing victim's network connections.Correspondingly,the computer immune system has the characteristics of distribution,self-learning and strong adaptive ability.To detect whether the blockchain suffers from eclipse attacks,this paper proposed a new immunity based model to detect eclipse attacks on blockchain.At the same time,this paper established the architecture of the detection model,and presented the formal definitions of each element and the execution processes of each module in this model.The simulated experiments were carried out according to the proposed detection model.The experimental results show higher accuracy and efficiency of this model.
出处 《计算机科学》 CSCD 北大核心 2018年第2期8-14,共7页 Computer Science
基金 国家重点研发计划(2016YFB0800603)资助
关键词 计算机免疫系统 区块链 P2P网络 eclipse攻击 characteristics concurrency concealment multi-node collaboratively complete monopolizing victim's network connections
  • 相关文献

参考文献4

二级参考文献29

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8Butler D.. Computer security: Who's been looking at your data? Nature, 2002, 418:580-582
  • 9Albert R. , Jeong H. , Barabasi A. L.. Diameter of the worldwide Web. Nature, 1999, 401:130-131
  • 10Balthrop J. , Forrest S. , Newman M. E. J. , Williamson M.M.. Technological networks and the spread of computer viruses. Science, 2004, 304(5670): 527-529

共引文献871

同被引文献33

引证文献3

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部