2020 IEEE International Conference on Blockchain (Blockchain) 2020
DOI: 10.1109/blockchain50366.2020.00046
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Blockchain Security Threats

Abstract: In many organizations, permissioned blockchain networks are currently transitioning from a proof-of-concept stage to production use. A crucial part of this transition is ensuring awareness of potential threats to network operations. Due to the plethora of software components involved in distributed ledgers, threats may be difficult or impossible to detect without a structured monitoring approach. To this end, we conduct a survey of attacks on permissioned blockchains and develop a set of threat indicators. To … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 42 publications
(29 citation statements)
references
References 16 publications
0
29
0
Order By: Relevance
“…They introduce some respective metrics while using both node logs and Remote Procedure Calls (RPC) to gather data. Threat indicators to detect malicious activities in a blockchain network have recently been introduced by Putz et al [17]. Based on this limited body of work from academia, blockchain metrics and threat indicators need to be made available to security experts for effective monitoring.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…They introduce some respective metrics while using both node logs and Remote Procedure Calls (RPC) to gather data. Threat indicators to detect malicious activities in a blockchain network have recently been introduced by Putz et al [17]. Based on this limited body of work from academia, blockchain metrics and threat indicators need to be made available to security experts for effective monitoring.…”
Section: Related Workmentioning
confidence: 99%
“…The Identify function serves to identify relevant assets and risks. This problem has been already addressed in prior work [17]. Protect involves a variety of protection measures applied to the system: identity management and access control, data security, secure configuration, and backups/log files, among others.…”
Section: Blockchain Security Monitoring Processmentioning
confidence: 99%
See 2 more Smart Citations
“…By comparative screening and looking up related studies, we find that the relationship between detection and blockchain in terms of dependency is a reciprocal relationship; hence, the studies in this field can be divided into two main categories. The first category is the blockchain-based systems or blockchain technology itself, which need to enhance their own detection techniques [24]; thus, the work in these studies is to propose and develop appropriate detection techniques for these blockchain systems [25,26]. The second category is the detection techniques, which still need to overcome some of the challenges facing them, especially in a distributed environment in which integrating blockchain with these detection techniques could result in a promising solution for them and their target domains [27].…”
Section: Blockchain and Detection Relationshipmentioning
confidence: 99%