Blockchain Security Situational Awareness Method Based on

被引:0
|
作者
Luo, Zhiyong [1 ]
Song, Weiwei [1 ]
Zhang, Wenbo [1 ]
Wang, Jianming [1 ]
Li, Jie [1 ]
机构
[1] Harbin Univ Sci & Technol, Sch Comp Sci & Technol, Harbin 150080, Peoples R China
关键词
Markov attack graph; Game theory; Blockchain; Eclipse attack; Security situation; GAME;
D O I
10.11999/JEIT220178
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is a difficult problem to perceive comprehensively and accurately the eclipse attack of each node in the blockchain network. For this problem, this paper proposes a blockchain security situational awareness method based on the Markov attack graph and game model. The method combines the characteristics of each node of the blockchain network and the eclipse attack to establish a Markov attack graph model, then quantifies the model to calculate the conversion probability of each attack path, and selects the attack path with higher probability to conduct a multi-stage attack and defense game and calculates the maximum objective function value of both sides. By analyzing these function values, the security situation awareness of the entire blockchain network node is completed, and the purpose of predicting the future security situation and system maintenance is achieved. The experimental comparison shows that the model method not only has a low number of successful intrusions but also has the advantage of ensuring the integrity of the system.Key words: Markov attack graph; Game theory; Blockchain; Eclipse attack; Security situation
引用
收藏
页码:1374 / 1382
页数:9
相关论文
共 12 条
  • [1] Decentralized and Lightweight Approach to Detect Eclipse Attacks on Proof of Work Blockchains
    Alangot, Bithin
    Reijsbergen, Daniel
    Venugopalan, Sarad
    Szalachowski, Pawel
    Yeo, Kiat Seng
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1659 - 1672
  • [2] Equilibrium analysis of bitcoin block withholding attack: A generalized model
    Di, Wu
    Liu Xiang-dong
    Yan Xiang-bin
    Rui, Peng
    Gang, Li
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2019, 185 : 318 - 328
  • [3] A Biform Game Approach to Preventing Block Withholding Attack of Blockchain Based on Semi-CIS Value
    Du, Xiao-Li
    Li, Deng-Feng
    Liang, Kai-Rong
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2019, 12 (02) : 1353 - 1360
  • [4] Blockchain Governance Game
    Kim, Song-Kyoo
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 2019, 136 : 373 - 380
  • [5] Liu, 2017, J COMMUNICATIONS, V38, P122
  • [6] Evolutionary Game for Mining Pool Selection in Blockchain Networks
    Liu, Xiaojun
    Wang, Wenbo
    Niyato, Dusit
    Zhao, Narisa
    Wang, Ping
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (05) : 760 - 763
  • [7] [罗智勇 Luo Zhiyong], 2020, [通信学报, Journal on Communications], V41
  • [8] Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services
    Tan, Qingfeng
    Gao, Yue
    Shi, Jinqiao
    Wang, Xuebin
    Fang, Binxing
    Tian, Zhihong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 1584 - 1593
  • [9] Wang Lei, 2020, Computer Engineering and Applications, V56, P28, DOI 10.3778/j.issn.1002-8331.1907-0344
  • [10] [魏松杰 Wei Songjie], 2022, [软件学报, Journal of Software], V33, P324