期刊文献+

面向POW共识的日蚀攻击动态防御机制 被引量:1

Defense Mechanism to Solve Eclipse Attack of POW Consensus
下载PDF
导出
摘要 日蚀攻击是区块链系统中一种恶意攻击手段,攻击者通过垄断受害节点网络,达到欺骗、控制目的。从实际区块链应用中得知,目前为止还没有防御日蚀攻击的好方法,因此为了解决该问题,设计了一种针对POW共识区块链系统的日蚀攻击动态防御模型,其基于节点间互相评价机制。具体来说,通过综合客户端之间互相评价的结果,基于kademlia算法和设计的等级值评估机制,为每个节点评估、存储一个等级,节点根据等级值和等级限定值之间的关系选择正常对等节点作为邻居,以避免恶意节点。经过实验证明,该方法可以有效抵御日蚀攻击。该方法改进了先前提出的一系列防御策略,无需对区块链系统协议、网络等进行更改,能够较高概率地成功抵御日蚀攻击,并且模型产生的开销也很小,非常适合实际部署。 The eclipse attack is a malicious attack method in the blockchain system.Attackers achieve the purpose of deception and control by monopolizing the network of victim nodes.It is known from actual blockchain applications that there is no good way to defend against eclipse attacks.Therefore,in order to solve this problem,a dynamic defense model for solving eclipse attacks based on the POW consensus blockchain system is designed,which is based on mutual evaluation mechanism between nodes.Specifically,based on kademlia algorithm,it evaluates and stores a level for every node on the result of mutual evaluation between clients to design a level evaluation mechanism.The nodes select normal peer nodes as their neighbors and avoid malicious nodes according to the relation between level value and level limitation value.Experiments have proved that this method can effectively resist eclipse attacks.This method improves a series of defense strategies previously proposed.It does not need to change the protocol and network of the blockchain system.It can successfully resist eclipse attacks with a high probability,and the overhead generated by the model is also very small,which is very suitable for actual deployment.
作者 卫孜钻 王鑫 于丹 马垚 陈永乐 WEI Zizuan;WANG Xin;YU Dan;MAYao;CHEN Yongle(College of Information and Computer,Taiyuan University of Technology,Jinzhong,Shanxi 030600,China)
出处 《计算机工程与应用》 CSCD 北大核心 2023年第8期280-287,共8页 Computer Engineering and Applications
基金 山西省基础研究计划(20210302123131,20210302124395)。
关键词 日蚀攻击 POW共识机制 动态防御 等级值 区块链协议 eclipse attack POW consensus dynamic defense level value blockchain protocol
  • 相关文献

参考文献1

二级参考文献11

  • 1..BRITE[EB/OL]..http://www.cs.bu.edu/brite/,,2007-05-10.. 被引量:2
  • 2K.ahney L. Cheaters bow to peer pressure. 2001. http://www.wired.com/news/technology/0, 1282,41838,00.html 被引量:1
  • 3Liang J, Kumar R, Xi Y, Ross KW. Pollution in file sharing systems. In: Makki K, Knightly E, eds. Proc. of the IEEE Infocom 2005, INFOCOM. New York: IEEE Press, 2005.1174-1185. 被引量:1
  • 4Page L, Brin S, Motwani R, Winograd T. The PageRank citation ranking: Bringing order to the Web. Technical Report, SIDL-WP-1999-0120, Stanford University, 1999. 被引量:1
  • 5Lian Q, Peng Y, Yang M, Zhang Z, Dai YF, Li XM. Robust incentives via multi-level tit-for-tat. In: Proc. of the 5th Int'l Workshop on Peer-to-Peer Systems (IPTPS). Santa Barbara, 2006. http://iptps06.cs.ucsb.edu/ 被引量:1
  • 6Kamvar SD, Schlosser MT, Garcia-Molina H. The EigenTrust algorithm for reputation management in P2P networks. In: Bakonyi P, Hencsey G, eds. Proc. of the 12th Int'l Conf. on World Wide Web. Budapest: ACM Press, 2003. 640-651. 被引量:1
  • 7Guha R, Kumar R, Raghavan. P, Tomkins A. Propagation of trust and distrust. In: Feldman SI, Uretsky M, Najork M, Wills CE, eds. Proc. of the 13th Int'l Conf. on World Wide Web. New York: ACM Press, 2004.403-412. 被引量:1
  • 8Song S, Hwang K, Zhou R. Kwok YK. Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing, 2005, 9(6):24-34. 被引量:1
  • 9Aberer K, Despotovic Z. Managing trust in a peer-to-peer information system. In: Paques H, Liu L, Grossman D, eds. Proc. of the 10th Int'l Conf. on Information and Knowledge Management (CIKM 2001). Atlanta: ACM Press, 2001.310-317. 被引量:1
  • 10Swamynathan G, Zhao BY, Almeroth KC. Exploring the feasibility of proactive reputations. In: Proc. of the 5th Int'l Workshop on Peer-to-Peer Systems (IPTPS). Santa Barbara, 2006. http://iptps06.cs.ucsb.edu/ 被引量:1

共引文献32

同被引文献28

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部