CN117220964A - Audit-based blockchain quantum resistance management and control method - Google Patents

Audit-based blockchain quantum resistance management and control method Download PDF

Info

Publication number
CN117220964A
CN117220964A CN202311224216.1A CN202311224216A CN117220964A CN 117220964 A CN117220964 A CN 117220964A CN 202311224216 A CN202311224216 A CN 202311224216A CN 117220964 A CN117220964 A CN 117220964A
Authority
CN
China
Prior art keywords
quantum
attack
blockchain
audit
behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311224216.1A
Other languages
Chinese (zh)
Inventor
肖国玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Hanbang Chain Network Technology Co ltd
Original Assignee
Shanghai Hanbang Chain Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Hanbang Chain Network Technology Co ltd filed Critical Shanghai Hanbang Chain Network Technology Co ltd
Priority to CN202311224216.1A priority Critical patent/CN117220964A/en
Publication of CN117220964A publication Critical patent/CN117220964A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application relates to the technical field of blockchain, in particular to an audit-based blockchain quantum resistance management and control method, which comprises the following steps: auditing the quantum attack, analyzing the attack characteristics of the existing quantum attack behaviors, picking the most prominent and easily identified characteristics of different attacks, storing, deducing the existing quantum attack technology, judging the most likely attack means in the future, and recording to form an attack behavior feature library; the behavior and operation of the blockchain node are audited and compared with the attack behavior feature library, and measures are taken to protect when the behavior of a potentially dangerous malicious node or attacker is detected. By introducing an audit mechanism, the safety and the credibility of the blockchain system can be improved, the audit can help to discover potential loopholes and attacks in the blockchain system, prevent and timely block the impending quantum attacks, and timely take measures to deal with the quantum attacks, so that the asset and information safety of the blockchain system and users is protected.

Description

Audit-based blockchain quantum resistance management and control method
Technical Field
The application relates to the technical field of blockchain, in particular to a blockchain quantum resistance management and control method based on audit.
Background
Conventional encryption algorithms are easily broken in the face of quantum computers, and therefore require the use of quantum attack resistant cryptographic algorithms. Cryptographic algorithms are based on mathematical challenges such as Lattice-based encryption algorithms (e.g., lattice-based cryptography), multivariate polynomial-based encryption algorithms (e.g., multivariate polynomial cryptography), and the like. But these algorithms typically require greater computing resources to execute, which may result in reduced performance of the blockchain system. Especially in large scale blockchain networks, handling large numbers of transactions and computations may become more difficult.
Due to the attack capabilities of quantum computers, conventional keys may be compromised. Therefore, the periodic updating of keys is one of the important measures against quantum attacks. By periodically replacing the key, even if the quantum computer breaks a certain key, the whole system is not damaged too much. But this also increases the complexity of key management. In a distributed blockchain network, ensuring that all nodes update keys in time and coordinate the modification of keys can be a challenging task.
In order to achieve the effect of quantum attack resistance, the blockchain system needs to widely adopt an encryption algorithm and a security mechanism for quantum computation attack resistance. If only a few nodes or users use these techniques, the overall security of the system may still be compromised.
Disclosure of Invention
The application aims to introduce an audit mechanism to check loopholes and potential attacks in a system. Auditing and detection are performed by monitoring and detecting signs of quantum computing attacks, and upcoming or already arriving attacks are discovered and handled in time.
In order to achieve the purpose of the application, the following technical scheme is adopted:
an audit-based blockchain quantum management and control method, the management and control method comprising the steps of:
auditing quantum attacks includes: analyzing the attack characteristics of the existing quantum attack behaviors, picking the most prominent and easily identified characteristics in different attacks, storing, deducing the existing quantum attack technology, judging the most likely attack means in the future, and recording to form an attack behavior characteristic library;
the behavior and operation of the blockchain node are audited and compared with the attack behavior feature library, and measures are taken to protect when the behavior of a potentially dangerous malicious node or attacker is detected.
A further improvement is that the auditing of the behavior and operation of the blockchain node includes auditing transactions, generating blocks, participating in a consensus process.
The control method further comprises the following steps: and auditing the network traffic, monitoring and detecting abnormal network activities, and finding potential quantum attack behaviors, and when quantum attack occurs, primarily intercepting or cutting off the network routing layer of the attack.
A further improvement is that the auditing the quantum attack further comprises:
detecting signs of quantum interference through monitoring and analysis of the communication channel;
and judging whether quantum attack exists or not by detecting the existence of quantum entanglement.
A further improvement is that the auditing the quantum attack further comprises: whether a quantum attack exists or not is determined by detecting signs of quantum computing behavior in a conventional computer, including detecting special operations and computing modes of the qubit.
A further improvement is that the auditing the quantum attack further comprises: quantum attack is detected by monitoring abnormal behavior and information leakage in the quantum key distribution process.
A further improvement is that the auditing the quantum attack further comprises: quantum attacker is prevented from impersonating legal users to attack by using quantum identity authentication technology and identity verification of quantum bits.
The control method further comprises the following steps: the identity authentication process of the blockchain node and the user is audited, so that the identities of the blockchain node and the user are ensured to be credible, and malicious nodes or attackers are prevented from impersonating legal identities to attack.
The control method further comprises the following steps: the security policies and measures of the blockchain system are audited, the security and the ability to resist quantum computing attacks of the blockchain system are evaluated, and suggestions for improving and enhancing the security measures are made.
A further improvement is that the control method further comprises: the state of the blockchain system is checked periodically by monitoring and verifying the security of the blockchain system through an audit contract, and a series of security checks and verifications are performed, when the blockchain node is found to have quantum attack traces, the audit contract triggers a corresponding alarm or takes measures to repair the attacked node.
The application has the beneficial effects that:
the application can increase the safety and the credibility of the block chain system by introducing an audit mechanism. The audit can help to discover potential loopholes and attacks in the blockchain system, prevent and timely block the impending quantum attacks, and timely take measures to deal with the quantum attacks, so that the asset and information security of the blockchain system and users is protected.
Drawings
FIG. 1 is a flow chart of an audit-based blockchain quantum management and control method of the present application;
FIG. 2 is a block chain protection process according to the present application;
fig. 3 is a schematic diagram of an audit mechanism of the present application.
Detailed Description
In order that the manner in which the application may be better understood, a more particular description of the application, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Referring to fig. 1-3, an embodiment of the present application proposes an audit-based blockchain quantum-resistant management and control method, which is used for performing multi-aspect and multi-dimensional comprehensive protection on a blockchain system, from attack prevention to attack interruption, and finally performing comprehensive immunity on quantum attack.
The block chain quantum resistance management and control method based on audit comprises internal audit and external audit.
As shown in fig. 2 and 3, external auditing is the most important, comprehensive means of protection. The internal audit is to perform untimely security audit on the inside of the blockchain by combining measures such as log audit and audit contracts, and take measures to repair the node which has been attacked.
Internal audit: the internal audit is performed by nodes internal to the blockchain system. The nodes are responsible for monitoring the running state of the blockchain system, checking the legitimacy and consistency of transactions, and ensuring the security of the various components in the blockchain system. Internal auditing may check security issues in key management, transaction verification, smart contract execution, network security, and the like.
Log audit: the log records all security related events and operations in the blockchain system. The log audit includes information such as critical operations, access control records, exception events, security vulnerabilities, and the like. The logs can be used for monitoring the running state of the system, identifying potential security threats, analyzing the characteristics of attack behaviors and network flow characteristics of quantum attacks, and intercepting or cutting off the network routing layer of the attack in the preliminary when quantum attack abnormality occurs.
Audit contracts: an audit contract is a special intelligent contract that is used to supervise and verify the security of a blockchain system. The audit contract may periodically check the state of the blockchain system and perform a series of security checks and verifications. If any block link points are found to have quantum attack traces, the audit contract can trigger a corresponding alarm or take the necessary action to repair the attacked node.
External audit: external auditing is performed by a separate auditing node. The audit nodes have a powerful quantum attack identification function, and can detect signs of quantum interference through monitoring and analyzing a communication channel; judging whether quantum attack exists or not by detecting the existence of quantum entanglement; judging whether quantum attack exists or not by detecting signs of quantum computing behaviors in a traditional computer, such as special operation and computing modes of quantum bits; detecting quantum attack by monitoring abnormal behavior and information leakage in the quantum key distribution process; the quantum attacker is prevented from impersonating a legal user to attack by using a quantum identity authentication technology and the identity of the quantum bit, and the like, so that the blockchain system can be comprehensively and safely protected.
As shown in fig. 1, the step of protecting the blockchain in the application uses a network means to perform preliminary interception on the quantum attack by verifying the network characteristics, and uses the behavior characteristics of the quantum attack to perform comprehensive interception protection on the blockchain.
The implementation of the present embodiment is explained in detail below:
as shown in fig. 1, an audit-based blockchain quantum control method includes the following steps:
auditing quantum attacks includes: and analyzing the attack characteristics of the existing quantum attack behaviors, picking the most prominent and easily identified characteristics of different attacks as much as possible, storing, deducing the existing quantum attack technology, judging the most likely attack means in the future, and recording to form an attack behavior characteristic library.
The behavior and operation of the blockchain node are audited and compared with the attack behavior feature library, and measures are taken to protect when the behavior of a potentially dangerous malicious node or attacker is detected.
In addition, the management and control method further comprises the steps of evaluating the vulnerability of the target, evaluating the vulnerability of the target when facing quantum attack technology according to different types of targets including the existing encryption algorithm, protocol, blockchain system and the like, analyzing the security and anti-attack capability of the target, determining the most vulnerable part, and focusing on security reinforcement and protection.
Specifically, auditing the behavior and operation of the blockchain node specifically includes auditing transactions, generating blocks, and participating in a consensus process.
The application can improve the safety, and can improve the identification and early warning capability of the potentially dangerous quantum attack by auditing the quantum attack, extracting the quantum attack from the known attack characteristics and storing the quantum attack in the attack behavior feature library. When the behaviors and the operations of the blockchain nodes are audited and compared with the attack behavior feature library, the behaviors of potentially dangerous malicious nodes or attackers can be detected in time, so that measures can be taken in time to protect, and the safety is improved. By establishing an attack behavior feature library and auditing the behaviors of the blockchain nodes in real time, quick response and protection can be realized. Once the behavior of a potential malicious node or attacker is detected, corresponding measures such as blocking the attack behavior, isolating the malicious node and the like can be immediately taken to ensure the normal operation of the blockchain system and the safety of data. And the method can be continuously updated and iterated along with the development of the quantum attack technology, and can be used for continuously perfecting an attack behavior feature library by deducting and recording the existing quantum attack technology, so that the method has better pertinence and adaptability.
It should be appreciated that by auditing node behavior, the behavior of potentially dangerous malicious nodes or attackers can be detected and safeguarded by transaction halting, block deletion, etc., by comparing against the library of attack behavior features. The audit transaction includes validity and integrity of the audit transaction by which abnormal transaction actions, such as double payment, counterfeit transaction, etc., may be detected, the audit transaction may be performed by verifying signatures, checking transaction inputs and outputs, etc.
In one possible implementation manner of the embodiment of the present application, the control method further includes the following steps: and auditing the network traffic, monitoring and detecting abnormal network activities, and finding potential quantum attack behaviors, and when quantum attack occurs, primarily intercepting or cutting off the network routing layer of the attack.
It should be appreciated that potential quantum attack behavior, such as auditing flow fluctuations, access anomalies, etc., may be discovered by auditing network traffic, which may also be performed by monitoring network transmission speeds, detecting anomalous traffic patterns, etc.
In one possible implementation manner of the embodiment of the present application, the auditing the quantum attack further includes:
signs of quantum interference are detected by monitoring and analysis of the communication channel.
And judging whether quantum attack exists or not by detecting the existence of quantum entanglement.
Judging whether quantum attack exists or not by detecting signs of quantum computing behaviors in a traditional computer specifically comprises detecting special operation and computing modes of quantum bits.
Quantum attack is detected by monitoring abnormal behavior and information leakage in the quantum key distribution process.
Quantum attacker is prevented from impersonating legal users to attack by using quantum identity authentication technology and identity verification of quantum bits.
It can be appreciated that the means of detecting signs of quantum interference by monitoring the communication channel can improve attack detection capability, and can effectively identify quantum attack behaviors, which is helpful for discovering potential attack threats in advance and rapidly taking appropriate protective measures.
The detection can be used for enhancing the attack detection capability, preventing quantum attacks of different types, finding potential attack threats, comparing the detection result with an attack behavior feature library and improving the accuracy and reliability.
In one possible implementation manner of the embodiment of the present application, the control method further includes the following steps: the identity authentication process of the blockchain node and the user is audited, so that the identities of the blockchain node and the user are ensured to be credible, and malicious nodes or attackers are prevented from impersonating legal identities to attack.
In particular, audit identity authentication may be performed by means of verifying certificates, checking identity information, and the like.
In one possible implementation manner of the embodiment of the present application, the control method further includes the following steps: the security policies and measures of the blockchain system are audited, the security and the ability to resist quantum computing attacks of the blockchain system are evaluated, and suggestions for improving and enhancing the security measures are made.
In one possible implementation manner of the embodiment of the present application, the control method further includes: the state of the blockchain system is checked periodically by monitoring and verifying the security of the blockchain system through an audit contract, and a series of security checks and verifications are performed, when the blockchain node is found to have quantum attack traces, the audit contract triggers a corresponding alarm or takes measures to repair the attacked node.
The blockchain quantum resistance control method based on audit has the following advantages:
long-term security: with the development of quantum computing technology, conventional encryption algorithms may face a risk of being hacked. The block chain anti-quantum management and control method based on audit can prevent quantum computing attack possibly occurring in the future and protect the long-term security of a block chain system. By monitoring and detecting signs of quantum attacks, signs and behavior of quantum computing attacks are audited, and measures can be taken in time to deal with new threats.
Verifiability and transparency: the audit-based blockchain quantum management and control method can provide verifiability and transparency for operations and behaviors in a blockchain system. By auditing the signs and behavior of quantum computing attacks, the identity and behavior of nodes and users in the blockchain system can be ensured to be trusted. This may enhance the trustworthiness of the overall blockchain system and prevent malicious behavior and attacks.
Protection of privacy and data integrity: the quantum-resisting management and control method based on audit can ensure privacy and data integrity in a block chain system. By monitoring and detecting signs of quantum attack, an attacker can be prevented from stealing, tampering, or destroying data. This may protect the privacy of the user and the integrity of the transaction, enhancing the user's trust in the blockchain system.
In summary, the blockchain quantum resistance control method based on audit has the advantages of high safety, long-term safety, verifiability and transparency, enhanced randomness, protection of privacy and data integrity and the like. These advantages make this approach an important direction of development for future blockchain systems to address the threat of quantum computing attacks.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (10)

1. An audit-based blockchain quantum management and control method is characterized by comprising the following steps of:
auditing quantum attacks includes: analyzing the attack characteristics of the existing quantum attack behaviors, picking the most prominent and easily identified characteristics in different attacks, storing, deducing the existing quantum attack technology, judging the most likely attack means in the future, and recording to form an attack behavior characteristic library;
the behavior and operation of the blockchain node are audited and compared with the attack behavior feature library, and measures are taken to protect when the behavior of a potentially dangerous malicious node or attacker is detected.
2. The audit based blockchain anti-quantum management method of claim 1, wherein the auditing of the behavior and operation of blockchain nodes includes auditing transactions, generating blocks, participating in a consensus process.
3. The audit based blockchain quantum management method of claim 1, further comprising the steps of: and auditing the network traffic, monitoring and detecting abnormal network activities, and finding potential quantum attack behaviors, and when quantum attack occurs, primarily intercepting or cutting off the network routing layer of the attack.
4. The audit based blockchain quantum management method of claim 1, wherein the auditing the quantum attack further comprises:
detecting signs of quantum interference through monitoring and analysis of the communication channel;
and judging whether quantum attack exists or not by detecting the existence of quantum entanglement.
5. The audit based blockchain quantum management method of claim 1, wherein the auditing the quantum attack further comprises: whether a quantum attack exists or not is determined by detecting signs of quantum computing behavior in a conventional computer, including detecting special operations and computing modes of the qubit.
6. The audit based blockchain quantum management method of claim 1, wherein the auditing the quantum attack further comprises: quantum attack is detected by monitoring abnormal behavior and information leakage in the quantum key distribution process.
7. The audit based blockchain quantum management method of claim 1, wherein the auditing the quantum attack further comprises: quantum attacker is prevented from impersonating legal users to attack by using quantum identity authentication technology and identity verification of quantum bits.
8. The audit based blockchain quantum management method of claim 1, further comprising the steps of: the identity authentication process of the blockchain node and the user is audited, so that the identities of the blockchain node and the user are ensured to be credible, and malicious nodes or attackers are prevented from impersonating legal identities to attack.
9. The audit based blockchain quantum management method of claim 1, further comprising the steps of: the security policies and measures of the blockchain system are audited, the security and the ability to resist quantum computing attacks of the blockchain system are evaluated, and suggestions for improving and enhancing the security measures are made.
10. The audit based blockchain quantum management method of claim 1, further comprising: the state of the blockchain system is checked periodically by monitoring and verifying the security of the blockchain system through an audit contract, and a series of security checks and verifications are performed, when the blockchain node is found to have quantum attack traces, the audit contract triggers a corresponding alarm or takes measures to repair the attacked node.
CN202311224216.1A 2023-09-21 2023-09-21 Audit-based blockchain quantum resistance management and control method Pending CN117220964A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311224216.1A CN117220964A (en) 2023-09-21 2023-09-21 Audit-based blockchain quantum resistance management and control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311224216.1A CN117220964A (en) 2023-09-21 2023-09-21 Audit-based blockchain quantum resistance management and control method

Publications (1)

Publication Number Publication Date
CN117220964A true CN117220964A (en) 2023-12-12

Family

ID=89036791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311224216.1A Pending CN117220964A (en) 2023-09-21 2023-09-21 Audit-based blockchain quantum resistance management and control method

Country Status (1)

Country Link
CN (1) CN117220964A (en)

Similar Documents

Publication Publication Date Title
US7530104B1 (en) Threat analysis
US9836611B1 (en) Verifying the integrity of a computing platform
KR101137128B1 (en) Containment of worms
CN113660224A (en) Situation awareness defense method, device and system based on network vulnerability scanning
EP3683712B1 (en) Protecting integrity of log data
CN117640250A (en) Enterprise information security management system
Dawit et al. Suitability of blockchain for collaborative intrusion detection systems
Olabim et al. A differential privacy-based approach for mitigating data theft in ransomware attacks
Kshetri et al. cryptoRAN: A review on cryptojacking and ransomware attacks wrt banking industry-threats, challenges, & problems
KR20110131627A (en) Apparatus for detecting malicious code using structure and characteristic of file, and terminal thereof
CN113422776A (en) Active defense method and system for information network security
EP1378813B1 (en) Security policy enforcement systems
Wang et al. A framework for security quantification of networked machines
CN117220964A (en) Audit-based blockchain quantum resistance management and control method
KR102086375B1 (en) System and method for real time prevention and post recovery for malicious software
Ibor et al. System hardening architecture for safer access to critical business data
Guelzim et al. Formal methods of attack modeling and detection
Brunil et al. Security vulnerabilities and mitigation strategies for application development
McGee et al. How to counter cybercrime intrusions
Mirza et al. Malicious Software Detection, Protection & Recovery Methods: A Survey
Zhang et al. Research on the Application of Network Security Technologies in the Network Security Operations and Maintenance Process
CN116933266B (en) Stain tracking method of cross-chain intelligent contract
Kornecki et al. Availability assessment of embedded systems with security vulnerabilities
CN118138312B (en) Intelligent payment port encryption method and system
Iavich et al. Novel Method of Hardware Security Problems Identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination