面向区块链Eclipse攻击的流量检测模型和防御策略

重庆邮电大学硕士学位论文摘要
摘要
随着区块链技术的不断发展,这项技术已经在物联网、医疗保健、能源、供应链、制造业、网络安全等许多领域得到了应用。然而,区块链自身仍然存在许多安全问题,例如用户隐私泄露、智能合约漏洞、面向区块链网络的攻击、针对共识机制的挖矿攻击等。其中,Eclipse攻击是一种会对区块链网络造成严重后果的攻击,它通过侵占区块链节点的路由表和网络连接通道将区块链节点“隔离”于正常网络之外。Eclipse攻击能够改变受害节点所看到的网络交易历史,甚至完全控制整个区块链网络,从而进一步实施更多攻击行为。
当前,区块链安全保护技术的研究主要侧重于数据完整性、用户隐私保护和可扩展性等方面。由于Eclipse攻击具有隐蔽性和并发性,目前仍然缺乏有效的检测手段和防御策略。为了提高区块链面对Eclipse攻击的防御能力,本文提出了面向Eclipse攻击的流量检测模型及其防御策略,主要工作如下:
1. 分析Eclipse攻击流量。深入研究区块链面临的Eclipse攻击,分析该攻击技术的实现原理和可行性。以比特币为具体研究对象,完成面向比特币的Eclipse 攻击实现,并收集Eclipse攻击流量完成流量特征提取。
十七届二中全会
雨水循环系统
2. 提出基于随机森林算法的流量检测模型。根据攻击流量的特征提出基于随机森林的流量检测模型,该模型包括数据收集、特征提取和攻击检测三个部分。利用随机森林算法加载样本数据集来训练模型,该模型作为二值分类器,将输入的流量数据分类识别为Eclipse攻击流量或正常流量。
3.搭建面向Eclipse攻击的防御系统。提出用于报警响应的防御策略,包括可信连接重置和路由表清洗,并结合流量检测模型通过编码工作实现完整的Eclipse 攻击防御系统。该系统能够有效检测Eclipse攻击,并利用路由表清洗策略来清除路由表中恶意节点的信息,从而恢复受害节点的正常网络通信。
防御系统的实验测试结果表明,基于随机森林算法的流量检测模型能够有效检测Eclipse攻击流量,检测准确率高达99.2593%。同时,报警响应策略针对路由表中恶意节点的清除率达到了100%。综上,本文提出的防御系统能够有效检测和终止Eclipse攻击并完成系统的自我修复。
重庆邮电大学硕士学位论文摘要关键词:防御,区块链安全,比特币,Eclipse攻击,流量检测
重庆邮电大学硕士学位论文Abstract
生产调度系统Abstract
With the continuous development of blockchain technology, the technology has been applied for ma
ny fields such as Internet of Things, Healthcare, Energy, Supply Chain, Manufacturing, Network Security and so on. However, there are still many security problems with blockchain, such as the privacy problem of blockchain system, smart contract vulnerability, attacks on blockchain network, mining attacks of needle-consensus mechanism and so on. Among them, Eclipse attack is an attack technique that will cause serious consequences of the blockchain network. It isolates the blockchain node from the normal network by filling the routing table of the blockchain node and occupying the network connection channel. The Eclipse attack can change the network transaction history seen by the affected node, or even take full control of the entire blockchain network, thus further carrying out more attacks.
Currently, research on blockchain security protection technology mainly focuses on data integrity, user privacy protection and scalability. Due to the Eclipse attack's stealth and concurrency, there is still a lack of effective detection methods and defense strategies. In order to improve the defense capability of blockchain against Eclipse attack, this thesis proposes a traffic detection model and defense strategy for Eclipse attack, mainly as follows:
1. Analyze Eclipse attack traffic. Analyze the implementation principle and feasibility of Eclipse attack, take Bitcoin as the specific research object, complete the implementation of Eclipse attack fa
cing Bitcoin, and collect Eclipse attack traffic to complete the extraction of traffic characteristics.
2. A network flow detection model based on a stochastic forest algorithm is proposed. A stochastic forest-based traffic detection model is proposed based on the characteristics of attack traffic, which consists of three parts: data collection, data flow processing and attack detection. The model is trained using a random forest algorithm to load sample dataset that acts as a binary classifier to classify the incoming traffic data as Eclipse attack traffic or normal traffic.
3. Build a defense system against an Eclipse attack. A defense strategy for alarm response is proposed, including the reset of trusted connection and routing table cleaning, and a complete Eclipse attack defense system is implemented through coding
重庆邮电大学硕士学位论文Abstract
combined with the traffic detection model. The system can effectively detect Eclipse attacks and use routing table cleaning strategy to delete the information of the malicious nodes in the routing table so as to restore the normal network communication of the victim nodes.
The experimental test results in the defense scheme show that the Eclipse attack detection model b
ased on random forest algorithm can effectively detect the Eclipse attack traffic, and the detection accuracy is up to 99.2593%. At the same time, the clearance rate of the alarm response strategy against the malicious nodes in the routing table is up to 100%. In summary, the defense scheme proposed to this thesis can effectively detect and abort Eclipse attack and complete the self-repair of the system.点线面之间的位置关系
球磨Keywords: defense, blockchain security, Bitcoin, Eclipse attack, traffic detection
重庆邮电大学硕士学位论文目录
目录
图录 ............................................................................................................................ VIII 表录 ................................................................................................................................ X 注释表 ........................................................................................................................... XI 第1章绪论 . (1)
1.1 研究背景及意义 (1)
1.2 国内外研究现状 (2)
1.2.1 区块链安全威胁研究现状 (2)
1.2.2 区块链的安全保护技术 (3)
1.3 论文的主要研究工作 (5)
1.3.1 研究目标 (5)
1.3.2 主要研究工作及贡献 (5)
1.4 论文组织结构 (6)
第2章区块链系统的安全分析 (7)
2.1 区块链概述 (7)
2.1.1 区块链的概念 (7)
2.1.2 区块链生态架构 (7)
中学生消费情况调查报告2.1.3 区块链体系架构 (8)
2.1.4 区块链关键技术 (9)
2.1.5 区块链应用场景 (11)
2.2 区块链安全威胁 (12)
2.2.1 应用层安全威胁 (12)
2.2.2 数据层安全威胁 (13)
2.2.3 智能合约安全威胁 (13)
2.2.4 共识协议安全威胁 (14)
2.2.5 区块链网络层安全威胁 (15)
2.3 面向区块链的Eclipse攻击 (16)

本文发布于:2024-09-25 12:15:31,感谢您对本站的认可!

本文链接:https://www.17tex.com/xueshu/104279.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:攻击   区块   流量   检测   模型   防御   系统
留言与评论(共有 0 条评论)
   
验证码:
Copyright ©2019-2024 Comsenz Inc.Powered by © 易纺专利技术学习网 豫ICP备2022007602号 豫公网安备41160202000603 站长QQ:729038198 关于我们 投诉建议