CN111510418A - Block chain link point structure safety guarantee method, guarantee system and storage medium - Google Patents
Block chain link point structure safety guarantee method, guarantee system and storage medium Download PDFInfo
- Publication number
- CN111510418A CN111510418A CN201910099492.7A CN201910099492A CN111510418A CN 111510418 A CN111510418 A CN 111510418A CN 201910099492 A CN201910099492 A CN 201910099492A CN 111510418 A CN111510418 A CN 111510418A
- Authority
- CN
- China
- Prior art keywords
- block
- link point
- block chain
- attack
- point structure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 230000007123 defense Effects 0.000 claims abstract description 14
- 230000005540 biological transmission Effects 0.000 claims abstract description 13
- 230000010354 integration Effects 0.000 claims abstract description 13
- 238000012795 verification Methods 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 4
- 238000012790 confirmation Methods 0.000 claims description 3
- 230000009545 invasion Effects 0.000 claims description 3
- 230000001360 synchronised effect Effects 0.000 claims description 3
- 238000013461 design Methods 0.000 description 9
- 230000008901 benefit Effects 0.000 description 6
- 238000011161 development Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 3
- 230000010485 coping Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000001737 promoting effect Effects 0.000 description 2
- 230000000903 blocking effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a block chain link point structure safety guarantee method, a guarantee system and a storage medium. The main working flow of the invention is as follows: under normal conditions, the super satellite node receives a legal block; when the attack is received, the attack time is recorded, the data transmission channel is closed, the network attack and defense are started, the data transmission channel is opened, the data integration is carried out, and the compensation is carried out.
Description
Technical Field
The invention relates to a block chain link point structure safety guarantee method, a guarantee system and a storage medium, and belongs to the technical field of block chains.
Background
The development of the current block chain is mainly based on two backgrounds, namely the wide prospect of the current block chain; secondly, the block chain is newly developed in the storage field.
The block chain technology is also called as distributed account book technology, is an internet database technology, and is characterized in that centralization and public transparency are achieved, so that everyone can participate in database recording, disk space on each machine is used through a network, and the dispersed storage resources form a virtual storage device, and data are dispersedly stored in each corner of the network.
With the continuous development and increasing prosperity of the blockchain technology, many hackers focus on the blockchain, and make illegal attacks by using some bugs of the blockchain, thereby causing economic losses.
The existing block chain node structure design is generally parallel nodes, and each node accessed into a block chain network is equal; or some designs have super nodes with larger and more complete authority, but some disputes exist, and an effective anti-attack is not made essentially, namely the super nodes and common nodes are basically consistent in the anti-attack aspect.
The situations are ubiquitous phenomena, and at present, no more reasonable and effective solution strategy exists, and no unified node structure design exists. Therefore, reasonable and healthy development of the block chain is influenced to a certain degree, safety accidents occur frequently, and the block chain is influenced by different degrees.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, an object of the present invention is to provide a method, a system and a storage medium for securing a blockchain link point structure, which are used to solve the problem that in the prior art, many hackers around the world focus on a blockchain, and the blockchain security is greatly threatened for blockchain property based on blockchain design, and meanwhile, some existing designs of the blockchain are still imperfect, and some vulnerabilities exist.
The invention provides a block chain link point structure safety guarantee method which comprises the following steps:
under normal conditions, the super satellite node receives a legal block;
when the attack is received, the attack time is recorded;
closing the data transmission channel;
starting network attack and defense;
opening a data transmission channel;
integrating data;
compensation is performed.
The super satellite node receives the legal blocks synchronized with each node on the ground, and the complete, legal and real storage of data on a block chain is realized.
The side recording the attack time is the side of the block chain network.
The specific network attack and defense method comprises the following steps: and starting network attack and defense, completing intrusion defense, and determining a time point A by combining the previously recorded attacked time and actual conditions.
The specific method for integrating the data comprises the following steps: and opening a data transmission channel between the super satellite node and the super satellite node, starting downlink data integration by the super satellite node, acknowledging and retaining the block before the time point A, and denying and discarding the block after the time point A.
The specific method for compensating comprises the following steps: after the data integration is completed, the whole operation of the block chain is recovered to be normal, actual verification is carried out on a legal user suffering from loss, and compensation is carried out after the verification.
A safety guarantee system for a block link point structure comprises:
a recording module: recording the attacked time;
a switch module: opening or closing a data transmission channel between the super satellite node and the super satellite node;
an attack and defense module: defending against invasion;
a confirmation module: determining a time point A by combining the previously recorded attacked time and the actual situation;
the data integration module: the downlink data integration is performed, the block before the time point A is admitted to be reserved, and the block after the time point A is denied to be discarded.
A storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of a block link point architecture security system as described above.
An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of a block link point structure security and security system as described above when executing the program.
As described above, the method, system and storage medium for guaranteeing the safety of the block link point structure of the present invention have the following advantages:
the invention combines the characteristics of the block chain, builds a new block chain link point structure design and a corresponding attack coping design, protects the benefit of a legal user to the maximum extent and the overall fundamental benefit of the block chain, and simultaneously restrains an illegal attacker, so that the attack can return without work, thereby further promoting the legal and healthy development of the block chain technology.
Drawings
Fig. 1 is a schematic diagram illustrating a method, a system and a storage medium for securing the safety of a block link point structure according to the present invention.
Fig. 2 is a schematic diagram illustrating the operation principle of the block link point structure, the security system and the storage medium according to the present invention.
Fig. 3 is a schematic structural diagram of a block link point structure security assurance method, an assurance system, and a storage medium system according to the present invention.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
Referring to fig. 1, the present invention provides a block chain storage method, a storage system and a storage medium based on file chain partitioning.
As shown in fig. 1, an application method of a block chain storage method, a storage system and a storage medium based on file chain blocking according to the present invention is:
under normal scenes, namely under most conditions, the super satellite node receives a legal block synchronized with each node on the ground, and the data on a block chain is completely, legally and really stored;
when an attack occurs, under an attack scene, the block chain network side records the attacked time;
closing a data transmission channel between the super satellite node and the super satellite node;
starting network attack and defense to complete intrusion defense;
determining a time point A by combining the previously recorded attacked time and the actual situation;
opening a data transmission channel between the super satellite node and the super satellite node, starting downlink data integration by the super satellite node, acknowledging and retaining a block before a time point A, and denying and discarding a block after the time point A;
after the data integration is completed, the whole operation of the block chain is recovered to be normal, actual verification is carried out on a legal user suffering from loss, and compensation is carried out after the verification.
Referring to fig. 2, the present invention provides a method, a system and a storage medium for securing the safety of a block link point structure.
As shown in fig. 2, a block link point structure safety guarantee system includes:
a recording module: recording the attacked time;
a switch module: opening or closing a data transmission channel between the super satellite node and the super satellite node;
an attack and defense module: defending against invasion;
a confirmation module: determining a time point A by combining the previously recorded attacked time and the actual situation;
the data integration module: the downlink data integration is performed, the block before the time point A is admitted to be reserved, and the block after the time point A is denied to be discarded.
Referring to fig. 3, the present invention provides a method, a system and a storage medium system for securing the safety of a block link point structure.
As shown in fig. 3, the present invention mainly includes a block chain node and a super satellite node.
In conclusion, the invention combines the characteristics of the block chain, builds a new block chain link point structure design and a corresponding attack coping design, protects the benefit of a legal user to the maximum extent and the overall fundamental benefit of the block chain, and simultaneously restrains an illegal attacker, so that the attack can return without work, thereby further promoting the legal and healthy development of the block chain technology. Therefore, the invention effectively overcomes various defects in the prior art and has high industrial utilization value.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.
Claims (9)
1. A safety guarantee method, a guarantee system and a storage medium for a block chain link point structure are characterized in that the safety guarantee method for the block chain link point structure comprises the following steps:
under normal conditions, the super satellite node receives a legal block;
when the attack is received, the attack time is recorded;
closing the data transmission channel;
starting network attack and defense;
opening a data transmission channel;
integrating data;
compensation is performed.
2. The method for ensuring the safety of a block link point structure according to claim 1, wherein: the super satellite node receives the legal blocks synchronized with each node on the ground, and the complete, legal and real storage of data on a block chain is realized.
3. The method for ensuring the safety of a block link point structure according to claim 1, wherein: the side recording the attack time is the side of the block chain network.
4. A method as claimed in claim 3, wherein the method comprises: the specific network attack and defense method comprises the following steps: and starting network attack and defense, completing intrusion defense, and determining a time point A by combining the previously recorded attacked time and actual conditions.
5. The method for ensuring the safety of a block link point structure according to claim 4, wherein the method comprises the following steps: the specific method for integrating the data comprises the following steps: and opening a data transmission channel between the super satellite node and the super satellite node, starting downlink data integration by the super satellite node, acknowledging and retaining the block before the time point A, and denying and discarding the block after the time point A.
6. The method for ensuring the safety of a block link point structure according to claim 4, wherein the method comprises the following steps: the specific method for compensating comprises the following steps: after the data integration is completed, the whole operation of the block chain is recovered to be normal, actual verification is carried out on a legal user suffering from loss, and compensation is carried out after the verification.
7. A safety guarantee method, a guarantee system and a storage medium for a block link point structure are characterized in that the safety guarantee system for the block link point structure comprises the following steps:
a recording module: recording the attacked time;
a switch module: opening or closing a data transmission channel between the super satellite node and the super satellite node;
an attack and defense module: defending against invasion;
a confirmation module: determining a time point A by combining the previously recorded attacked time and the actual situation;
the data integration module: the downlink data integration is performed, the block before the time point A is admitted to be reserved, and the block after the time point A is denied to be discarded.
8. A storage medium on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of claims 1-6.
9. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein: the processor, when executing the program, implements the steps of the method of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910099492.7A CN111510418A (en) | 2019-01-31 | 2019-01-31 | Block chain link point structure safety guarantee method, guarantee system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910099492.7A CN111510418A (en) | 2019-01-31 | 2019-01-31 | Block chain link point structure safety guarantee method, guarantee system and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111510418A true CN111510418A (en) | 2020-08-07 |
Family
ID=71873966
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910099492.7A Pending CN111510418A (en) | 2019-01-31 | 2019-01-31 | Block chain link point structure safety guarantee method, guarantee system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111510418A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112419820A (en) * | 2020-11-04 | 2021-02-26 | 武汉大学 | Block chain attack and defense virtual simulation experiment teaching system and method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103457931A (en) * | 2013-08-15 | 2013-12-18 | 华中科技大学 | Active defense method for network trick and counter attack |
CN106254394A (en) * | 2016-09-29 | 2016-12-21 | 北京神州绿盟信息安全科技股份有限公司 | A kind of recording method and device of attack traffic |
CN107634949A (en) * | 2017-09-21 | 2018-01-26 | 明阳智慧能源集团股份公司 | Electric power networks framework Prevention-Security module and its physical node, network defense method |
CN109194750A (en) * | 2018-09-10 | 2019-01-11 | 杭州链汇通区块链科技有限公司 | Anti-attack method, the device of block catenary system and block chain super node |
CN109257749A (en) * | 2018-09-05 | 2019-01-22 | 中国人民解放军陆军工程大学 | Dynamic topology-oriented wireless sensor network self-adaptive layered intrusion detection method |
-
2019
- 2019-01-31 CN CN201910099492.7A patent/CN111510418A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103457931A (en) * | 2013-08-15 | 2013-12-18 | 华中科技大学 | Active defense method for network trick and counter attack |
CN106254394A (en) * | 2016-09-29 | 2016-12-21 | 北京神州绿盟信息安全科技股份有限公司 | A kind of recording method and device of attack traffic |
CN107634949A (en) * | 2017-09-21 | 2018-01-26 | 明阳智慧能源集团股份公司 | Electric power networks framework Prevention-Security module and its physical node, network defense method |
CN109257749A (en) * | 2018-09-05 | 2019-01-22 | 中国人民解放军陆军工程大学 | Dynamic topology-oriented wireless sensor network self-adaptive layered intrusion detection method |
CN109194750A (en) * | 2018-09-10 | 2019-01-11 | 杭州链汇通区块链科技有限公司 | Anti-attack method, the device of block catenary system and block chain super node |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112419820A (en) * | 2020-11-04 | 2021-02-26 | 武汉大学 | Block chain attack and defense virtual simulation experiment teaching system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112073411B (en) | Network security deduction method, device, equipment and storage medium | |
CN109525397B (en) | Block chain and method for SDN network flow rule security guarantee | |
Li | Network security evaluation and optimal active defense based on attack and defense game model | |
Abdalzaher et al. | An effective Stackelberg game for high-assurance of data trustworthiness in WSNs | |
CN108494729A (en) | A kind of zero trust model realization system | |
CN109347847A (en) | A kind of smart city security assurance information system | |
Delettre et al. | Cloud computing, security and data concealment | |
Vance et al. | Cybersecurity in the blockchain era: a survey on examining critical infrastructure protection with blockchain-based technology | |
Abdalzaher et al. | Using Stackelberg game to enhance node protection in WSNs | |
CN107846418A (en) | Fire wall Initiative Defence System and means of defence | |
Korman et al. | Analyzing the effectiveness of attack countermeasures in a SCADA system | |
Chen et al. | A hybrid attack model for cyber-physical security assessment in electricity grid | |
CN111510418A (en) | Block chain link point structure safety guarantee method, guarantee system and storage medium | |
Nichols et al. | Introducing priority into hybrid attack graphs | |
Xu et al. | Attack identification for software-defined networking based on attack trees and extension innovation methods | |
Codreanu | Using and exporting digital authoritarianism: Challenging both cyberspace and democracies | |
Mudgal et al. | Spark-Based Network Security Honeypot System: Detailed Performance Analysis | |
Mojahedi et al. | Modeling the propagation of topology-aware P2P worms considering temporal parameters | |
Sun | Research on security issues and protection strategy of computer network | |
CN113285952A (en) | Network vulnerability blocking method and device, storage medium and processor | |
Silva et al. | Towards a taxonomy for security threats on the web ecosystem | |
Frederick et al. | BID: Blockchaining for IoT devices | |
Sangle et al. | Data security system in cloud by using fog computing and data mining | |
Wu et al. | Vulnerability Risk and Stochastic Game based Security Situation Awareness for Electric Internet of Things | |
CN115361221B (en) | Website fingerprint identification defense system and method based on data poisoning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200807 |