期刊文献+

区块链信息系统安全测评方法研究 被引量:1

Research on Security Evaluation Method of Blockchain Information System
下载PDF
导出
摘要 过往数年,区块链作为一种信任传递、价值共享的底层软件技术已进入人们视野,其前景受到各国政府、科学机构和跨国企业的极大关注,并受到资本和市场的强烈追捧。随着区块链与实体经济的深度融合,其存在的技术局限性和面临的安全问题也逐渐显现,尤其是系统安全事故层出不穷。从介绍区块链的概念及主要技术展开,逐步分析区块链面临的安全风险与原因,并结合测评实践,提出区块链安全测评方法。 In the past few years,blockchain,as a kind of trust transfer,the underlying software technology of value sharing has entered people's hori⁃zons,and its prospect has been paid great attention to by governments,scientific institutions and multinational enterprises,and has been strongly sought after by capital and markets.With the deep integration of blockchain and real economy,the technical limitations and securi⁃ty problems are gradually emerging,especially the system security accidents emerge in endlessly.In this paper,the concept and main tech⁃nology of blockchain are introduced,the security risks and causes of blockchain are analyzed step by step,and the security evaluation meth⁃od of blockchain is put forward according to the evaluation practice.
作者 相里朋 梅家争 徐志范 XIANG Li-peng;MEI Jia-zheng;XU Zhi-fan(The Fifth Electronic Research Institute of MIIT,Guangzhou 510610)
出处 《现代计算机》 2020年第33期35-39,共5页 Modern Computer
关键词 区块链 安全风险 安全测评方法 Blockchain Security Risks,Security Evaluation Method
  • 相关文献

参考文献6

二级参考文献24

  • 1FEINSTEIN L, SCHNACHENBERG D, BALUPARI R,et al. Statistical approaches to DDoS attack detection and response[ C]//Proc of DARPA Information Survivability Conference and Exposition. 2003.
  • 2MIRKOVIC J, DIETRICH S,. DITTRICH D,et al. Intemet denial of service: attack and defense mechanisms [ M ]. [ S. l. ] : Prentice Hall PTR, 2004.
  • 3PAXTON V. An analysis for using reflectors in distributed denial-of- service attacks [ J ]. ACM SIGCOMM Computer Communication Review, 2001,31 (3) :38-47.
  • 4XIANG Y, LIN Y, LEI W L,et al. Detecting DDoS attack based on network self similarity [ J ]. IEEE Proc Communication, 2004,151 (3) :292-295.
  • 5SIATERLIS C, MAGLARIS V. Detecting incoming and outgoing DDoS attack at the edge using a single set of network characteristics [ C]//Proc of the 10th IEEE Symposium on Computers and Communication. 2005.
  • 6LIU Yun-hao, LIU Xiao-mei, WANG Chen,et al. Defending P2Ps from overlay flooding-based DDoS [ C ]//Proc of International Conference on Parallel Processing. 2007.
  • 7NAOUMOV N, ROSS K W. Exploiting P2P systems for DDoS attacks [ C]//Proc of the 1st International Conference on Scalable Information Systems. Hong Kong: [ s. n. ] ,2006:47-54.
  • 8DASWANI N, GARCIA-MOLINA H. Query-flood DoS attacks in Gnutella[ C]//Proc of the 9th ACM Conference on Computer and Communications Security. Washington DC : [ s. n. ] ,2002 : 181-192.
  • 9WALFISH M, VUTUKURU M, BALAKRISHNAN H,et al. DDoS defense by offense[ C]//Proc of SIGCOMM. 2006.
  • 10SANGUK N, JUNG G, KYUNGHEE C, et al. Compiling network traffic into rules using soft computing methods for the detection of flooding attacks[ J ]. Applied Soft Computing,2008,8 ( 3 ) : 1200-1210.

共引文献74

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部