BLOCKCHAIN APPROACH TO CYBER SECURITY VULNERABILITIES ATTACKS AND POTENTIAL COUNTERMEASURES

被引:3
|
作者
Sambana, Bosubabu [1 ]
Ramesh, Yegireddi [2 ]
Rao, Molli Srinivasa [1 ]
Rao, T. Chalapathi [2 ]
Patnaik, N. P. M. [1 ]
机构
[1] Jawaharlal Nehru Technol Univ Kakinada, Dept Comp Sci & Engn, Viswanadha Inst Technol & Management, Visakhapatnam, Andhra Pradesh, India
[2] Jawaharlal Nehru Technol Univ Kakinada, Aditya Inst Technol & Management, Dept Comp Sci & Engn, Tekkali, Andhra Pradesh, India
关键词
Blockchain; vulnerabilities; Cloud Computing; Cyber security; Ledger; Smart Contracts; Cryptocurrency; Attacks;
D O I
10.33832/ijsia.2020.14.1.01
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain Technology has pulled in apparent consideration because of its enormous determination of potential applications. It at first showed up as cryptographic money, alluded to as Bitcoin, in any case, it has since been utilized in a few unique organizations and non-business applications, rather than most existing frameworks that are upheld concentrated structures, this new innovation uses peer-to-peer arranges and circulated system that join blockchain registers to store exchanges. Its structure is expected as an advanced log record and hangs on as a progression of coupled groups, alluded to as squares, each individual square is locked cryptographically with the past square. When a square has been another, it can't be modified. A few security authorities conjecture that the intrinsic cryptographically nature of the blockchain framework is agreeable to oppose consistent hacking and security dangers. In any case, past examinations on the assurance and protection of blockchain Technology have indicated that few applications have succumbed to flourishing digital assaults. Because of the expanding interest for digital money and its present security challenges, past investigations haven't fixated on blockchain technology cybersecurity vulnerabilities broadly. Here, our examination stretches out upon the past investigations on vulnerabilities and explores the classifications of potential assaults. Our investigation at that point gives extra course to highlight potential attacks against blockchain innovation defenselessness to cybersecurity.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [41] Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A Survey
    Sinha, Preeti
    Jha, V. K.
    Rai, Amit Kumar
    Bhushan, Bharat
    [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSPC'17), 2017, : 288 - 293
  • [42] A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
    Elahi, Golnaz
    Yu, Eric
    Zannone, Nicola
    [J]. REQUIREMENTS ENGINEERING, 2010, 15 (01) : 41 - 62
  • [43] A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
    Golnaz Elahi
    Eric Yu
    Nicola Zannone
    [J]. Requirements Engineering, 2010, 15 : 41 - 62
  • [44] Contagion in cyber security attacks
    Baldwin, Adrian
    Gheyas, Iffat
    Ioannidis, Christos
    Pym, David
    Williams, Julian
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2017, 68 (07) : 780 - 791
  • [45] On Blockchain Security and Relevant Attacks
    Moubarak, Joanna
    Filiol, Eric
    Chamoun, Maroun
    [J]. 2018 IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM), 2018, : 7 - 12
  • [46] Security in Edge Blockchains:Attacks and Countermeasures
    CAO Yinfeng
    CAO Jiannong
    WANG Yuqin
    WANG Kaile
    LIU Xun
    [J]. ZTE Communications, 2022, 20 (04) : 3 - 14
  • [47] Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities
    Zhou, Buxiang
    Sun, Binjie
    Zang, Tianlei
    Cai, Yating
    Wu, Jiale
    Luo, Huan
    [J]. ENTROPY, 2023, 25 (01)
  • [48] Managing Cyber Security Vulnerabilities in Large Networks
    Chang, Edward S.
    Jain, Aridaman K.
    Slade, David M.
    Tsao, S. Lee
    [J]. Bell Labs Technical Journal, 4 (3-4): : 252 - 272
  • [49] Managing cyber security vulnerabilities in large networks
    Chang, ES
    Jain, AK
    Slade, DM
    Tsao, SL
    [J]. BELL LABS TECHNICAL JOURNAL, 1999, 4 (04) : 252 - 272
  • [50] Current and potential cyber attacks on medical journals; guidelines for improving security
    Dadkhah, Mehdi
    Seno, Seyed Amin Hosseini
    Borchardt, Glenn
    [J]. EUROPEAN JOURNAL OF INTERNAL MEDICINE, 2017, 38 : 25 - 29