Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blockchain system and computer-implemented method for detecting an attack on a computer system or computer network

A computer system and computer network technology, applied in the field of blockchain systems, can solve problems such as destroying businesses, complex central analysis institutions, and unattractive economics, so as to solve the problems of single point of failure, easy maintenance and scalability , the effect of reducing costs

Pending Publication Date: 2021-10-08
SIEMENS AG
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, in such a central authority there is the problem that the whole ecosystem regards the authority as a central security node, which can lead to a so-called "single point of failure"
This also leads to the fact that a central analysis agency can be complex and costly
[0013] The high cost of the central authority accumulates on the operator's side, which may also destroy the corresponding business as it is not economically attractive
[0014] Furthermore, such systems are often complex in a central facility, since multiple clients must be served simultaneously

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain system and computer-implemented method for detecting an attack on a computer system or computer network
  • Blockchain system and computer-implemented method for detecting an attack on a computer system or computer network
  • Blockchain system and computer-implemented method for detecting an attack on a computer system or computer network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] exist figure 1 The embodiment of the computer-implemented method according to the invention for detecting an attack on a computer system or a computer network shown in has four steps S10 , S20 , S30 , S40 .

[0053] In step S10 , an analysis device for a computer system or computer network is inserted as a smart contract into a blockchain having a plurality of blocks linked to each other. In step S20, parameters are set for the analysis device. At least some of these parameters correspond to the behavior of the computer system or computer network and have log files of the computer system or computer network. In step S30, the analysis means are executed based on the parameters. In step S40, the analysis result is added to the block chain.

[0054] exist figure 2 The embodiment of a blockchain system 100 for identifying attacks on a computer system or computer network according to the invention shown in has a blockchain 50 with a plurality of blocks n-2 linked to eac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a computer-implemented method for detecting an attack on a computer system or computer network, the method comprising the steps of: inserting an analysis means for the computer system or computer network as a smart contract into a blockchain having a plurality of blocks linked to one another; defining parameters for the analysis means; executing the analysis means on the basis of the parameters; and inserting the analysis result into the blockchain. At least a portion of the parameters corresponds to the behavior of the computer system or computer network and comprises a log file of the computer system or computer network.

Description

technical field [0001] The present invention relates to a blockchain system and a computer-implemented method for identifying attacks on a computer system or computer network. Background technique [0002] An Attack Identification System or Intrusion Detection System (IDS) is a system that actively monitors a computer system or computer network to identify possible attacks. [0003] For attack detection in an IDS, the following two techniques are used in principle: [0004] Signature-based (English: "signature-based") attack recognition works with attack patterns ("Angriffssignaturen" (attack signature)) stored in a database in order to monitor active systems. Attacks are identified by enabling the IDS to compare attack signatures from its own database with current system behavior. If the stored signature is consistent with the current system behavior, then the IDS infers the attack from it. [0005] Anomaly-based IDS attempts to detect attacks by identifying changes in s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55H04L29/06
CPCG06F21/552H04L63/1408G06F2221/034H04L63/1425H04L63/1416G06N20/00G06N3/08G06F21/554G06F21/566
Inventor T·瑟尔
Owner SIEMENS AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products