BLOCKCHAIN APPROACH TO CYBER SECURITY VULNERABILITIES ATTACKS AND POTENTIAL COUNTERMEASURES

被引:3
|
作者
Sambana, Bosubabu [1 ]
Ramesh, Yegireddi [2 ]
Rao, Molli Srinivasa [1 ]
Rao, T. Chalapathi [2 ]
Patnaik, N. P. M. [1 ]
机构
[1] Jawaharlal Nehru Technol Univ Kakinada, Dept Comp Sci & Engn, Viswanadha Inst Technol & Management, Visakhapatnam, Andhra Pradesh, India
[2] Jawaharlal Nehru Technol Univ Kakinada, Aditya Inst Technol & Management, Dept Comp Sci & Engn, Tekkali, Andhra Pradesh, India
关键词
Blockchain; vulnerabilities; Cloud Computing; Cyber security; Ledger; Smart Contracts; Cryptocurrency; Attacks;
D O I
10.33832/ijsia.2020.14.1.01
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain Technology has pulled in apparent consideration because of its enormous determination of potential applications. It at first showed up as cryptographic money, alluded to as Bitcoin, in any case, it has since been utilized in a few unique organizations and non-business applications, rather than most existing frameworks that are upheld concentrated structures, this new innovation uses peer-to-peer arranges and circulated system that join blockchain registers to store exchanges. Its structure is expected as an advanced log record and hangs on as a progression of coupled groups, alluded to as squares, each individual square is locked cryptographically with the past square. When a square has been another, it can't be modified. A few security authorities conjecture that the intrinsic cryptographically nature of the blockchain framework is agreeable to oppose consistent hacking and security dangers. In any case, past examinations on the assurance and protection of blockchain Technology have indicated that few applications have succumbed to flourishing digital assaults. Because of the expanding interest for digital money and its present security challenges, past investigations haven't fixated on blockchain technology cybersecurity vulnerabilities broadly. Here, our examination stretches out upon the past investigations on vulnerabilities and explores the classifications of potential assaults. Our investigation at that point gives extra course to highlight potential attacks against blockchain innovation defenselessness to cybersecurity.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [1] Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
    Yaacoub, Jean-Paul A.
    Noura, Hassan N.
    Salman, Ola
    Chehab, Ali
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (01) : 115 - 158
  • [2] Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
    Jean-Paul A. Yaacoub
    Hassan N. Noura
    Ola Salman
    Ali Chehab
    [J]. International Journal of Information Security, 2022, 21 : 115 - 158
  • [3] A CANVASS ON CYBER SECURITY ATTACKS AND COUNTERMEASURES
    Gupta, Shubhi
    Vashisht, Swati
    Singh, Divya
    [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 31 - 35
  • [4] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [5] Security Algorithm for Intelligent Transport System in Cyber-Physical Systems Perceptive: Attacks, Vulnerabilities, and Countermeasures
    Pavithra R.
    Kaliappan V.
    Rajendar S.
    [J]. SN Computer Science, 4 (5)
  • [6] BLOCKCHAIN TECHNOLOGIES FOR SECURITY AGAINST CYBER ATTACKS
    Antonyan, Elena A.
    Rybakova, Olga S.
    [J]. BULLETIN OF THE NATIONAL ACADEMY OF SCIENCES OF THE REPUBLIC OF KAZAKHSTAN, 2020, (04): : 21 - 26
  • [7] Security of Cyber Physical Systems: Vulnerabilities, Attacks and Countermeasure
    Alrefaei, Faisal
    Alzahrani, Abdullah
    Song, Houbing
    Zohdy, Mohamed
    [J]. 2020 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS 2020), 2020, : 551 - 556
  • [8] Assessing and Proposing Countermeasures for Cyber-Security Attacks
    Al-Zahrani, Ali
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 885 - 895
  • [9] Cyber-Attacks - Trends, Patterns and Security Countermeasures
    Bendovschi, Andreea
    [J]. 7TH INTERNATIONAL CONFERENCE ON FINANCIAL CRIMINOLOGY 2015, 7TH ICFC 2015, 2015, 28 : 24 - 31
  • [10] A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
    Aslan, Omer
    Aktug, Semih Serkant
    Ozkan-Okay, Merve
    Yilmaz, Abdullah Asim
    Akin, Erdal
    [J]. ELECTRONICS, 2023, 12 (06)