Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blockchain-based distributed network attack detection and security measurement system and method

A distributed network, attack detection technology, applied in security devices, transmission systems, digital transmission systems, etc., can solve problems such as inefficiency, single point of error, and reduced revenue

Active Publication Date: 2021-09-14
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) Due to the complexity of network attacks, many researchers only develop detection mechanisms for one or several attacks, so there is no way to detect the main attacks in the network, which is not conducive to ensuring a safe network environment and high-quality services. so as to reduce the reputation of the network operation center (operator) and reduce its revenue
[0007] (2) According to the above problems, there is a lack of a method to detect the main attacks in the network, so there is also a lack of network security measurement model, so that the network security level cannot be evaluated in real time, which is not conducive to the timely response of the network, thereby reducing network security, and cannot guarantee High-quality service will eventually reduce the credibility of the network operation center and reduce its revenue
[0008] (3) Since the provision of security data and attack detection and security measurement need to consume resources, researchers have hardly considered incentives to provide security data sets and attack detection and security measurement, and a single detection node collects security data and performs attack detection and security measurement. It brings some problems: when it is invaded, the network crashes, the load is too high, the detection efficiency is low, and the single point of error
As a result, there is a lack of distributed network attack detection and security measurement in the form of incentives, so that credible and cooperative real-time detection of network attacks and measurement of network security cannot be performed, which ultimately leads to reduced revenue for network operation centers
[0009] (4) Since this patent uses blockchain to realize distributed network attack detection and security measurement, there are many problems in the blockchain technology involved, the main ones are fork, inefficiency and centralization risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based distributed network attack detection and security measurement system and method
  • Blockchain-based distributed network attack detection and security measurement system and method
  • Blockchain-based distributed network attack detection and security measurement system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0075] There is currently no method for detecting major attacks in the network; there is a lack of a model for evaluating network security levels; there is a lack of distributed network attack detection and security metrics with incentives; there are many problems in the current blockchain, the main ones are forks and inefficiencies. and centralization. The present invention proposes blockchain-based distributed network attack detection and security measurement, proposes the integration of different attack detection mechanisms to detect main attacks in the network, designs a network security level evaluation model, and util...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of wireless communication, and discloses a block chain-based distributed network attack detection and security measurement system and method; register at the network operation center and obtain a certificate; the network operation center announces the measurement task, and the data provider Provide security data, and the detection node collects security data items; the detection node performs network attack detection and security measurement; the detection node creates blocks, and finally reaches a consensus. The invention allows the network operation center to announce the measurement task, and the data provider provides the security data; the detection node verifies the collected security data, and performs fusion attack detection to obtain the detection result; the detection node generates the block, and finally reaches a consensus among the detection nodes . The present invention can encourage data providers to provide security data, encourage detection nodes to perform fusion attack detection, and perform network security measurement; overcome the infeasibility of a single detection node, and overcome the fork, inefficiency and centralization of the block chain .

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and in particular relates to a blockchain-based distributed network attack detection and security measurement system and method. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: emerging networks are subject to different attacks due to their characteristics and vulnerabilities, such as heterogeneous networks, including the Internet, wireless sensor networks, and LTE mobile cellular networks. In order to ensure a secure network environment and provide high-quality services, the network operation center should perform network security detection and make corresponding responses. In order to measure the level of network security, it is necessary to integrate different attack detection mechanisms to detect major attacks. Obviously, it is unrealistic for a single network node to collect security data and perform integrated...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/121H04L9/32H04W12/122
CPCH04W12/12H04L63/1416H04L9/3247H04L9/3263
Inventor 刘高闫峥
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products