Computer Science ›› 2018, Vol. 45 ›› Issue (2): 8-14.doi: 10.11896/j.issn.1002-137X.2018.02.002

Previous Articles     Next Articles

Abnormal Detection of Eclipse Attacks on Blockchain Based on Immunity

LV Jing-shu, YANG Pei, CHEN Wen, CAO Xiao-chun and LI Tao   

  • Online:2018-02-15 Published:2018-11-13

Abstract: The eclipse attack against the blockchain has the characteristics of concurrency and concealment,and often relies on multi-node to collaboratively complete the attack of monopolizing victim’s network connections.Correspon-dingly,the computer immune system has the characteristics of distribution,self-learning and strong adaptive ability.To detect whether the blockchain suffers from eclipse attacks,this paper proposed a new immunity based model to detect eclipse attacks on blockchain.At the same time,this paper established the architecture of the detection model,and pre-sented the formal definitions of each element and the execution processes of each module in this model.The simulated experiments were carried out according to the proposed detection model.The experimental results show higher accuracy and efficiency of this model.

Key words: Computer immune system,Blockchain,P2P network,Eclipse attacks

[1] NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[R].2008.
[2] TSAI W T,YU L,WANG R,et al.Blockchain Application Development Techniques[J].Journal of Software,2017,28(6):1474-1487.(in Chinese) 蔡维德,郁莲,王荣,等.基于区块链的应用系统开发方法研究[J].软件学报,2017,28(6):1474-1487.
[3] HE P,YU G,ZHANG Y F,et al.Survey on Blockchain Technology and Its Application Prospect[J].Computer Science,2017,44(4):1-7.(in Chinese) 何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7.
[4] BASTIAAN M.Preventing the 51%-attack:a stochastic analysis of two phase proof of work in bitcoin.http://referaat.cs.utwente.nl/conference/22/paper/7473/preventingthe-51-attack-a-stochasticanalysis-of-two-phase-proof-of-work-in-bitcoin.pdf.2015.
[5] MALHOTRA Y.Bitcoin Protocol:Model of Cryptographic ProofBased Global Crypto-Currency & Electronic Payments System.http://www.yogeshmalhotra.com/BitcoinProtocol.html.
[6] KARAME G O,ANDROULAKI E,CAPKUN S.Double-spen-ding fast payments in bitcoin[C]∥Proceedings of the 2012 ACM Conference on Computer and Communications Security.ACM,2012:906-917.
[7] JOHNSON B,LASZKA A,GROSSKLAGS J,et al.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools[C]∥International Conference on Financial Cryptography and Data Security.Springer,2014:72-86.
[8] HEILMAN E,KENDLER A,ZOHAR A,et al.Eclipse Attacks on Bitcoin’s Peer-to-Peer Network[C]∥USENIX Security Symposium.2015:129-144.
[9] HARMER P K,WILLIAMS P D,GUNSCH G H,et al.An artificial immune system architecture for computer security applications[J].IEEE Transactions on Evolutionary Computation,2002,6(3):252-280.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .