Advanced Search
Volume 45 Issue 4
Apr.  2023
Turn off MathJax
Article Contents
LUO Zhiyong, SONG Weiwei, ZHANG Wenbo, WANG Jianming, LI Jie. Blockchain Security Situational Awareness Method Based on Markov Attack Graph and Game Model[J]. Journal of Electronics & Information Technology, 2023, 45(4): 1374-1382. doi: 10.11999/JEIT220178
Citation: LUO Zhiyong, SONG Weiwei, ZHANG Wenbo, WANG Jianming, LI Jie. Blockchain Security Situational Awareness Method Based on Markov Attack Graph and Game Model[J]. Journal of Electronics & Information Technology, 2023, 45(4): 1374-1382. doi: 10.11999/JEIT220178

Blockchain Security Situational Awareness Method Based on Markov Attack Graph and Game Model

doi: 10.11999/JEIT220178
Funds:  The Natural Science Foundation of Heilongjiang Province (LH2021F030)
  • Received Date: 2022-02-25
  • Rev Recd Date: 2022-05-30
  • Available Online: 2022-06-17
  • Publish Date: 2023-04-10
  • It is a difficult problem to perceive comprehensively and accurately the eclipse attack of each node in the blockchain network. For this problem, this paper proposes a blockchain security situational awareness method based on the Markov attack graph and game model. The method combines the characteristics of each node of the blockchain network and the eclipse attack to establish a Markov attack graph model, then quantifies the model to calculate the conversion probability of each attack path, and selects the attack path with higher probability to conduct a multi-stage attack and defense game and calculates the maximum objective function value of both sides. By analyzing these function values, the security situation awareness of the entire blockchain network node is completed, and the purpose of predicting the future security situation and system maintenance is achieved. The experimental comparison shows that the model method not only has a low number of successful intrusions but also has the advantage of ensuring the integrity of the system.
  • loading
  • [1]
    魏松杰, 吕伟龙, 李莎莎. 区块链公链应用的典型安全问题综述[J]. 软件学报, 2022, 33(1): 324–355. doi: 10.13328/j.cnki.jos.006280

    WEI Songjie, LV Weilong, and LI Shasha. Overview on typical security problems in public blockchain applications[J]. Journal of Software, 2022, 33(1): 324–355. doi: 10.13328/j.cnki.jos.006280
    [2]
    WU Di, LIU Xiangdong, YAN Xiangbin, et al. Equilibrium analysis of bitcoin block withholding attack: A generalized model[J]. Reliability Engineering & System Safety, 2019, 185(10): 318–328. doi: 10.1016/j.ress.2018.12.026
    [3]
    胡浩, 叶润国, 张红旗, 等. 基于攻击预测的网络安全态势量化方法[J]. 通信学报, 2017, 38(10): 122–134. doi: 10.11959/j.issn.1000-436x.2017204

    HU Hao, YE Runguo, ZHANG Hongqi, et al. Quantitative method for network security situation based on attack prediction[J]. Journal on Communications, 2017, 38(10): 122–134. doi: 10.11959/j.issn.1000-436x.2017204
    [4]
    LIU Xiaojun, WANG Wenbo, NIYATO D, et al. Evolutionary game for mining pool selection in blockchain networks[J]. IEEE Wireless Communications Letters, 2018, 7(5): 760–763. doi: 10.1109/LWC.2018.2820009
    [5]
    叶聪聪, 李国强, 蔡鸿明, 等. 区块链的安全检测模型[J]. 软件学报, 2018, 29(5): 1348–1359. doi: 10.13328/j.cnki.jos.005500

    YE Congcong, LI Guoqiang, CAI Hongming, et al. Security detection model of blockchain[J]. Journal of Software, 2018, 29(5): 1348–1359. doi: 10.13328/j.cnki.jos.005500
    [6]
    KIM S K. Blockchain governance game[J]. Computers & Industrial Engineering, 2019, 136: 373–380. doi: 10.1016/j.cie.2019.07.004
    [7]
    ZHAO Ning, WU Hao, and CHEN Yali. Coalition game-based computation resource allocation for wireless blockchain networks[J]. IEEE Internet of Things Journal, 2019, 6(5): 8507–8518. doi: 10.1109/JIOT.2019.2919781
    [8]
    DU Xiaoli, LI Dengfeng, and LIANG Kairong. A biform game approach to preventing block withholding attack of blockchain based on semi-CIS value[J]. International Journal of Computational Intelligence Systems, 2019, 12(2): 1353–1360. doi: 10.2991/ijcis.d.191030.001
    [9]
    王雷, 任南, 李保珍. 区块链51%双花攻击的进化博弈及防控策略研究[J]. 计算机工程与应用, 2020, 56(3): 28–34. doi: 10.3778/j.issn.1002-8331.1907-0344

    WANG Lei, REN Nan, and LI Baozhen. Research on evolutionary game and prevention and control strategy of blockchain 51% double spend attack[J]. Computer Engineering and Applications, 2020, 56(3): 28–34. doi: 10.3778/j.issn.1002-8331.1907-0344
    [10]
    ALANGOT B, REIJSBERGEN D, VENUGOPALAN S, et al. Decentralized and lightweight approach to detect eclipse attacks on proof of work blockchains[J]. IEEE Transactions on Network and Service Management, 2021, 18(2): 1659–1672. doi: 10.1109/TNSM.2021.3069502
    [11]
    TAN Qingfeng, GAO Yue, SHI Jinqiao, et al. Toward a comprehensive insight into the eclipse attacks of tor hidden services[J]. IEEE Internet of Things Journal, 2019, 6(2): 1584–1593. doi: 10.1109/JIOT.2018.2846624
    [12]
    罗智勇, 杨旭, 刘嘉辉, 等. 基于贝叶斯攻击图的网络入侵意图分析模型[J]. 通信学报, 2020, 41(9): 160–169. doi: 10.11959/j.issn.1000-436x.2020172

    LUO Zhiyong, YANG Xu, LIU Jiahui, et al. Network intrusion intention analysis model based on Bayesian attack graph[J]. Journal on Communications, 2020, 41(9): 160–169. doi: 10.11959/j.issn.1000-436x.2020172
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(9)  / Tables(3)

    Article Metrics

    Article views (948) PDF downloads(158) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return