首页> 外文会议> >How to Detect and Contain Suspicious Transactions in Distributed Ledgers
【24h】

How to Detect and Contain Suspicious Transactions in Distributed Ledgers

机译:如何检测和遏制分布式分类帐中的可疑交易

获取原文
获取原文并翻译 | 示例

摘要

Distributed Ledger Technology (DLT) like Blockchain Technology (BCT) enables the development of trust-free P2P networks, consisting of nodes that process and propagate transactions in form of messages. Trust into other nodes and/or messages is replaced by trust into the protocols that are governing the network; most notably the message signature and consensus protocols. Depending on the chosen consensus protocols, resilience towards malicious/ faulty nodes and messages ranges between 1/3 and 1/2 - 1 of all nodes. However, an often overlooked aspect within the resilience/security aspects of DLT networks is that they tend to interact with other components that are often less resilient e.g. clients/wallets. This, in turn, allows attackers to issue forged transactions that are formally correct. This paper focuses on detecting and containing such transaction using metadata and event propagation.
机译:像区块链技术(BCT)这样的分布式账本技术(DLT)可以实现无信任的P2P网络的开发,该网络由以消息形式处理和传播交易的节点组成。对其他节点和/或消息的信任由对管理网络的协议的信任替换;最值得注意的是消息签名和共识协议。根据选择的共识协议,对恶意/故障节点和消息的恢复能力介于所有节点的1/3和1/2-1之间。但是,在DLT网络的弹性/安全性方面经常被忽视的一个方面是,它们倾向于与其他弹性较小的组件进行交互,例如,客户/钱包。反过来,这又使攻击者可以发布形式正确的伪造交易。本文着重于使用元数据和事件传播来检测和包含此类事务。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号