计算机科学 ›› 2018, Vol. 45 ›› Issue (2): 8-14.doi: 10.11896/j.issn.1002-137X.2018.02.002
所属专题: 区块链技术
吕婧淑,杨培,陈文,操晓春,李涛
LV Jing-shu, YANG Pei, CHEN Wen, CAO Xiao-chun and LI Tao
摘要: 区块链的eclipse攻击具有并发性、隐蔽性的特点,且往往依赖多节点协作完成垄断受害节点网络连接的攻击;相应地,计算机免疫系统具有分布式、自学习和自适应能力强的特点,能够良好地适应区块链多节点P2P分布式网络连接的环境。因此,为了检测区块链是否受到eclipse攻击,提出了一种基于免疫的区块链eclipse攻击的新型检测模型,并且建立了该模型的架构,给出了模型中各要素的形式定义及各模块的执行流程。根据模型进行了仿真实验,结果表明该模型具有较高的准确性和效率。
[1] NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[R].2008. [2] TSAI W T,YU L,WANG R,et al.Blockchain Application Development Techniques[J].Journal of Software,2017,28(6):1474-1487.(in Chinese) 蔡维德,郁莲,王荣,等.基于区块链的应用系统开发方法研究[J].软件学报,2017,28(6):1474-1487. [3] HE P,YU G,ZHANG Y F,et al.Survey on Blockchain Technology and Its Application Prospect[J].Computer Science,2017,44(4):1-7.(in Chinese) 何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7. [4] BASTIAAN M.Preventing the 51%-attack:a stochastic analysis of two phase proof of work in bitcoin.http://referaat.cs.utwente.nl/conference/22/paper/7473/preventingthe-51-attack-a-stochasticanalysis-of-two-phase-proof-of-work-in-bitcoin.pdf.2015. [5] MALHOTRA Y.Bitcoin Protocol:Model of Cryptographic ProofBased Global Crypto-Currency & Electronic Payments System.http://www.yogeshmalhotra.com/BitcoinProtocol.html. [6] KARAME G O,ANDROULAKI E,CAPKUN S.Double-spen-ding fast payments in bitcoin[C]∥Proceedings of the 2012 ACM Conference on Computer and Communications Security.ACM,2012:906-917. [7] JOHNSON B,LASZKA A,GROSSKLAGS J,et al.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools[C]∥International Conference on Financial Cryptography and Data Security.Springer,2014:72-86. [8] HEILMAN E,KENDLER A,ZOHAR A,et al.Eclipse Attacks on Bitcoin’s Peer-to-Peer Network[C]∥USENIX Security Symposium.2015:129-144. [9] HARMER P K,WILLIAMS P D,GUNSCH G H,et al.An artificial immune system architecture for computer security applications[J].IEEE Transactions on Evolutionary Computation,2002,6(3):252-280. |
No related articles found! |
|