Supercharge Your Innovation With Domain-Expert AI Agents!

Attack detection method and device and electronic device

An attack detection and attacked technology, applied in electrical components, payment circuits, instruments, etc., can solve the problem of not being able to detect attacks and asset losses in a timely manner

Active Publication Date: 2019-05-14
KINGSOFT
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, since the currency price of the virtual currency will change at any time with the change of the number of blocks and the change of the transaction volume, the forged blockchain will cause asset losses to those involved in the virtual currency transaction
[0005] However, the inventor found that for the 51% attack, the existing technology usually only infers the attack based on the asset loss after the attack occurs and causes asset loss, and cannot detect whether it is attacked in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method and device and electronic device
  • Attack detection method and device and electronic device
  • Attack detection method and device and electronic device

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0154] Example 1. Use the monitoring node to calculate the blockchain network. Within the preset first time interval of 50 minutes, the continuous block generation rate is 2 / 5, that is, the continuous block generation rate is 40%. The network has not suffered a 51% attack. Next, determine whether the blockchain network is vulnerable to 51% attacks. Since the continuous block generation rate is less than 50%, the blockchain network is not susceptible to 51% attacks and no alarm will be issued.

example 2

[0155] Example 2. Using the monitoring node to calculate the blockchain network, within the preset first time interval of 50 minutes, the continuous block generation rate is 3 / 5, that is, the continuous block generation rate is 60%; determine that the blockchain network The network has not suffered a 51% attack. Next, determine whether the blockchain network is vulnerable to 51% attacks. Among them, the block chain network's block generation time interval is 10 minutes, and the preset first time interval is 5 times the block generation time interval. Obtain the current currency price of the virtual currency circulating in the blockchain network, the total computing power of the idle mining machines in the blockchain network and the current mining difficulty of the blockchain network, which are used to calculate the attack of the blockchain network probability.

[0156] Since the first time interval is 50 minutes, it means that after every 50 minutes, the continuous block gen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an attack detection method, which comprises the steps of determining a first node according to identification information when the identification information of each node of a new block is generated within a preset first time interval; calculating the obtained continuous blocking rate of the first node in a preset first time interval; and detecting whetherthe block chain network is attacked or not according to the continuous block rate and a preset first judgment condition. Aiming at the problems that in the prior art, when an attack occurs and asset loss is caused, the attack can only be deduced according to the asset loss, and whether the attack is caused cannot be detected in time. According to the method provided by the embodiment of the invention, whether the block chain network is attacked or not can be detected in time, so that when the block chain network is detected to be attacked, countermeasures can be taken in time, and asset loss is reduced. According to the method provided by the embodiment of the invention, whether the block chain network is easily attacked or not can be detected before the attack occurs; Therefore, the attack can be avoided before the attack.

Description

technical field [0001] The invention relates to the technical field of block chain attack detection, in particular to an attack detection method, device, electronic equipment and storage medium. Background technique [0002] Each node in the blockchain network uses the same algorithm for mining. This algorithm is called a consensus algorithm, and the commonly used consensus algorithm is the POW (Proof-of-Work) algorithm. Among them, mining refers to: generating a new block, and the POW algorithm refers to: within the preset time interval of block generation, if any node in the blockchain network wants to generate a new block and write it into the blockchain, It is necessary to solve the pre-set proof-of-work problem of the blockchain network, and the node that solves the problem the fastest will broadcast its calculation results to the entire network. After receiving the calculation result, other nodes in the blockchain network use the same algorithm to verify the calculati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06Q20/06G06Q40/04H04L29/06
Inventor 赵宇杨文玉杜浩蔡雅兰
Owner KINGSOFT
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More