计算机科学 ›› 2018, Vol. 45 ›› Issue (2): 8-14.doi: 10.11896/j.issn.1002-137X.2018.02.002

所属专题: 区块链技术

• 区块链技术 • 上一篇    下一篇

基于免疫的区块链eclipse攻击的异常检测

吕婧淑,杨培,陈文,操晓春,李涛   

  1. 中国科学院信息工程研究所信息安全国家重点实验室 北京100093,32081部队 北京100093,四川大学计算机学院 成都610065,中国科学院信息工程研究所信息安全国家重点实验室 北京100093,四川大学计算机学院 成都610065
  • 出版日期:2018-02-15 发布日期:2018-11-13
  • 基金资助:
    本文受国家重点研发计划(2016YFB0800603)资助

Abnormal Detection of Eclipse Attacks on Blockchain Based on Immunity

LV Jing-shu, YANG Pei, CHEN Wen, CAO Xiao-chun and LI Tao   

  • Online:2018-02-15 Published:2018-11-13

摘要: 区块链的eclipse攻击具有并发性、隐蔽性的特点,且往往依赖多节点协作完成垄断受害节点网络连接的攻击;相应地,计算机免疫系统具有分布式、自学习和自适应能力强的特点,能够良好地适应区块链多节点P2P分布式网络连接的环境。因此,为了检测区块链是否受到eclipse攻击,提出了一种基于免疫的区块链eclipse攻击的新型检测模型,并且建立了该模型的架构,给出了模型中各要素的形式定义及各模块的执行流程。根据模型进行了仿真实验,结果表明该模型具有较高的准确性和效率。

关键词: 计算机免疫系统,区块链,P2P网络,eclipse攻击

Abstract: The eclipse attack against the blockchain has the characteristics of concurrency and concealment,and often relies on multi-node to collaboratively complete the attack of monopolizing victim’s network connections.Correspon-dingly,the computer immune system has the characteristics of distribution,self-learning and strong adaptive ability.To detect whether the blockchain suffers from eclipse attacks,this paper proposed a new immunity based model to detect eclipse attacks on blockchain.At the same time,this paper established the architecture of the detection model,and pre-sented the formal definitions of each element and the execution processes of each module in this model.The simulated experiments were carried out according to the proposed detection model.The experimental results show higher accuracy and efficiency of this model.

Key words: Computer immune system,Blockchain,P2P network,Eclipse attacks

[1] NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[R].2008.
[2] TSAI W T,YU L,WANG R,et al.Blockchain Application Development Techniques[J].Journal of Software,2017,28(6):1474-1487.(in Chinese) 蔡维德,郁莲,王荣,等.基于区块链的应用系统开发方法研究[J].软件学报,2017,28(6):1474-1487.
[3] HE P,YU G,ZHANG Y F,et al.Survey on Blockchain Technology and Its Application Prospect[J].Computer Science,2017,44(4):1-7.(in Chinese) 何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7.
[4] BASTIAAN M.Preventing the 51%-attack:a stochastic analysis of two phase proof of work in bitcoin.http://referaat.cs.utwente.nl/conference/22/paper/7473/preventingthe-51-attack-a-stochasticanalysis-of-two-phase-proof-of-work-in-bitcoin.pdf.2015.
[5] MALHOTRA Y.Bitcoin Protocol:Model of Cryptographic ProofBased Global Crypto-Currency & Electronic Payments System.http://www.yogeshmalhotra.com/BitcoinProtocol.html.
[6] KARAME G O,ANDROULAKI E,CAPKUN S.Double-spen-ding fast payments in bitcoin[C]∥Proceedings of the 2012 ACM Conference on Computer and Communications Security.ACM,2012:906-917.
[7] JOHNSON B,LASZKA A,GROSSKLAGS J,et al.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools[C]∥International Conference on Financial Cryptography and Data Security.Springer,2014:72-86.
[8] HEILMAN E,KENDLER A,ZOHAR A,et al.Eclipse Attacks on Bitcoin’s Peer-to-Peer Network[C]∥USENIX Security Symposium.2015:129-144.
[9] HARMER P K,WILLIAMS P D,GUNSCH G H,et al.An artificial immune system architecture for computer security applications[J].IEEE Transactions on Evolutionary Computation,2002,6(3):252-280.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!