Computer Science ›› 2018, Vol. 45 ›› Issue (2): 8-14.doi: 10.11896/j.issn.1002-137X.2018.02.002

Special Issue: Block Chain Technology

Previous Articles     Next Articles

Abnormal Detection of Eclipse Attacks on Blockchain Based on Immunity

LV Jing-shu, YANG Pei, CHEN Wen, CAO Xiao-chun and LI Tao   

  • Online:2018-02-15 Published:2018-11-13

Abstract: The eclipse attack against the blockchain has the characteristics of concurrency and concealment,and often relies on multi-node to collaboratively complete the attack of monopolizing victim’s network connections.Correspon-dingly,the computer immune system has the characteristics of distribution,self-learning and strong adaptive ability.To detect whether the blockchain suffers from eclipse attacks,this paper proposed a new immunity based model to detect eclipse attacks on blockchain.At the same time,this paper established the architecture of the detection model,and pre-sented the formal definitions of each element and the execution processes of each module in this model.The simulated experiments were carried out according to the proposed detection model.The experimental results show higher accuracy and efficiency of this model.

Key words: Computer immune system,Blockchain,P2P network,Eclipse attacks

[1] NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[R].2008.
[2] TSAI W T,YU L,WANG R,et al.Blockchain Application Development Techniques[J].Journal of Software,2017,28(6):1474-1487.(in Chinese) 蔡维德,郁莲,王荣,等.基于区块链的应用系统开发方法研究[J].软件学报,2017,28(6):1474-1487.
[3] HE P,YU G,ZHANG Y F,et al.Survey on Blockchain Technology and Its Application Prospect[J].Computer Science,2017,44(4):1-7.(in Chinese) 何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7.
[4] BASTIAAN M.Preventing the 51%-attack:a stochastic analysis of two phase proof of work in bitcoin.
[5] MALHOTRA Y.Bitcoin Protocol:Model of Cryptographic ProofBased Global Crypto-Currency & Electronic Payments System.
[6] KARAME G O,ANDROULAKI E,CAPKUN S.Double-spen-ding fast payments in bitcoin[C]∥Proceedings of the 2012 ACM Conference on Computer and Communications Security.ACM,2012:906-917.
[7] JOHNSON B,LASZKA A,GROSSKLAGS J,et al.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools[C]∥International Conference on Financial Cryptography and Data Security.Springer,2014:72-86.
[8] HEILMAN E,KENDLER A,ZOHAR A,et al.Eclipse Attacks on Bitcoin’s Peer-to-Peer Network[C]∥USENIX Security Symposium.2015:129-144.
[9] HARMER P K,WILLIAMS P D,GUNSCH G H,et al.An artificial immune system architecture for computer security applications[J].IEEE Transactions on Evolutionary Computation,2002,6(3):252-280.

No related articles found!
Full text



No Suggested Reading articles found!