首页> 外文会议>International Conference on Smart Blockchain >How to Detect and Contain Suspicious Transactions in Distributed Ledgers
【24h】

How to Detect and Contain Suspicious Transactions in Distributed Ledgers

机译:如何检测并包含分布式LEDERS中的可疑事务

获取原文

摘要

Distributed Ledger Technology (DLT) like Blockchain Technology (BCT) enables the development of trust-free P2P networks, consisting of nodes that process and propagate transactions in form of messages. Trust into other nodes and/or messages is replaced by trust into the protocols that are governing the network; most notably the message signature and consensus protocols. Depending on the chosen consensus protocols, resilience towards malicious/ faulty nodes and messages ranges between 1/3 and 1/2 - 1 of all nodes. However, an often overlooked aspect within the resilience/security aspects of DLT networks is that they tend to interact with other components that are often less resilient e.g. clients/wallets. This, in turn, allows attackers to issue forged transactions that are formally correct. This paper focuses on detecting and containing such transaction using metadata and event propagation.
机译:分布式分类帐技术(DLT),如区块链技术(BCT),可以开发无信任的P2P网络,包括处理和传播消息的形式的节点。信任其他节点和/或消息被信任替换为管理网络的协议;最值得注意的是消息签名和共识协议。根据所选择的共识协议,对恶意/故障节点的弹性和消息范围在于所有节点的1/3和1/2-1之间。然而,在DLT网络的弹性/安全方面内的经常被忽视的方面在于它们倾向于与通常更少弹性的其他组件相互作用。客户/钱包。反过来,这允许攻击者发出正式正确的伪造事务。本文侧重于使用元数据和事件传播的检测和包含此类事务。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号