Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack prevention method and device

A technology of adjacent nodes and products, which is applied in the field of communication to ensure security and improve user experience.

Active Publication Date: 2020-08-28
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] To this end, the present invention provides a method and device for preventing attacks to solve the problem that attackers maliciously tamper with the routing information of blockchain network nodes through fake nodes, thereby controlling the external communication of blockchain network nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack prevention method and device
  • Attack prevention method and device
  • Attack prevention method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0056] The attack prevention method and device provided by the embodiments of the present invention take into account that attackers can use false nodes to affect the routing selection of real nodes in the blockchain network, and when the number of false nodes in the blockchain network is large enough, a large number of false nodes can "Isolate" the real nodes from the blockchain network, so as to control the external communication of the real nodes, and the attackers can further implement attacks such as routing deception, storage pollution, denial of service, and ID hijacking, and freely in the blockchain network The problem of publishing false resources, ther...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack prevention method and device, and belongs to the technical field of communication. The attack prevention method comprises the following steps: a computing power certification message and / or an identity guarantee message broadcasted by an adjacent node in a blockchain network are received; theroute information recommended by adjacent nodes is received; whether theadjacent nodes are credible or not is judged according to the joining duration of joining the adjacent nodes into the block chain network and the calculation capability proof message and / or accordingto the identity guarantee message; when the adjacent nodes are credible, the routing table of the current node is modified according to the routing information, so that an attacker can be prevented from maliciously tampering the routing information of the blockchain network node through the false node, the external contact of the blockchain network node is prevented from being controlled, the safety of a blockchain network user is guaranteed, and the use experience of the user is improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an attack prevention method and device. Background technique [0002] Any network node can join the blockchain network and become a node of the blockchain network on the basis of following the relevant protocols of the blockchain network. Attackers take advantage of this feature to add fake nodes to the blockchain network, and influence the routing selection of real nodes in the blockchain network through fake nodes, thereby controlling the external communication of real nodes and publishing fake resources in the blockchain network . For example, in a blockchain network, a false node regularly announces its online status to its adjacent real nodes, and is added to its routing table by the adjacent real nodes. The attacker continuously sends routing table update messages to real nodes through fake nodes, making the routing table of real nodes full of fake nodes. When the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/741H04L45/74
CPCH04L63/145H04L63/08H04L63/20H04L45/54
Inventor 田新雪万刚严斌峰
Owner CHINA UNITED NETWORK COMM GRP CO LTD