Distributed network attack detection and security measurement system and method based on block chain

A distributed network and attack detection technology, applied in security devices, transmission systems, digital transmission systems, etc., can solve the problems of researchers not considering incentives to provide security data sets, single-point errors, and inability to evaluate network security levels in real time.

Active Publication Date: 2019-08-13
XIDIAN UNIV
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) Due to the complexity of network attacks, many researchers only develop detection mechanisms for one or several attacks, so there is no way to detect the main attacks in the network, which is not conducive to ensuring a safe network environment and high-quality services. so as to reduce the reputation of the network operation center (operator) and reduce its revenue
[0007] (2) According to the above problems, there is a lack of a method to detect the main attacks in the network, so there is also a lack of network security measurement model, so that the network security level cannot be evaluated in real time, which is not conducive to the timely response of the network, thereby reducing network security, and cannot guarantee High-quality service will eventually reduce the credibility of the network operation center and reduce its revenue
[0008] (3) Since the provision of security data and attack detection and security measurement need to c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed network attack detection and security measurement system and method based on block chain
  • Distributed network attack detection and security measurement system and method based on block chain
  • Distributed network attack detection and security measurement system and method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0075] There is currently no method for detecting major attacks in the network; there is a lack of a model for evaluating network security levels; there is a lack of distributed network attack detection and security metrics with incentives; there are many problems in the current blockchain, the main ones are forks and inefficiencies. and centralization. The present invention proposes blockchain-based distributed network attack detection and security measurement, proposes the integration of different attack detection mechanisms to detect main attacks in the network, designs a network security level evaluation model, and util...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of wireless communication, and discloses a distributed network attack detection and security measurement system and method based on a block chain. Registering is performed at a network operation center and a certificate is obtained; a network operation center publishes a measurement task, a data provider provides security data, and a detection node collects security data items; the detection node performs network attack detection and security measurement; and a detection node manufactures a block, and finally consensus is performed. A network operation center is allowed to publish a measurement task, and a data provider provides security data; the detection node verifies the collected security data and carries out fused attack detection to obtain a detection result; and the detection nodes generate blocks, and finally consensus is achieved among the detection nodes. According to the invention, a data provider can be stimulated to provide security data, and detection nodes are stimulated to carry out fused attack detection and network security measurement; infeasibility of a single detection node is overcome, and bifurcation, low efficiency and centralization of the block chain are overcome.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and in particular relates to a blockchain-based distributed network attack detection and security measurement system and method. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: emerging networks are subject to different attacks due to their characteristics and vulnerabilities, such as heterogeneous networks, including the Internet, wireless sensor networks, and LTE mobile cellular networks. In order to ensure a secure network environment and provide high-quality services, the network operation center should perform network security detection and make corresponding responses. In order to measure the level of network security, it is necessary to integrate different attack detection mechanisms to detect major attacks. Obviously, it is unrealistic for a single network node to collect security data and perform integrated...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/12H04L9/32H04W12/122
CPCH04W12/12H04L63/1416H04L9/3247H04L9/3263
Inventor 刘高闫峥
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products