Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A blockchain malicious node discovery and isolation method and device

A malicious node and blockchain technology, applied in the blockchain field, can solve problems such as exhaustion of resources, occupation, failure to provide services normally, and achieve the effect of improving reliability and fault tolerance

Active Publication Date: 2021-03-26
FOSHAN UNIVERSITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The target of a DDoS attack is a single blockchain network node, occupying or even exhausting its resources (such as CPU, bandwidth, etc.), making it unable to provide services normally
At present, there is no related similar technology to prevent this kind of problem from happening

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain malicious node discovery and isolation method and device
  • A blockchain malicious node discovery and isolation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The concept, specific structure and technical effects of the present disclosure will be clearly and completely described below in conjunction with the embodiments and drawings, so as to fully understand the purpose, scheme and effect of the present disclosure. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0036] Such as figure 1 Shown is a flow chart of a blockchain malicious node discovery and isolation method according to the present disclosure, combined below figure 1 A method for discovering and isolating malicious blockchain nodes according to an embodiment of the present disclosure will be described.

[0037] This disclosure proposes a method for discovering and isolating malicious nodes in blockchain, which specifically includes the following steps:

[0038] Step 1, read the proof-of-work data of each blockchain node in the blockchain network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for finding and isolating malicious nodes of blockchain. Workload calculation is performed on the node of a block in a blockchain network. If a fact thatthe workload exceeds the threshold of the block is found, the node of the block is marked as the malicious node, and a malicious node isolating program is performed, thereby greatly improving reliability of the whole blockchain. On the condition that service of the blockchain node is not affected, the malicious blockchain nodes are isolated, thereby improving fault tolerance of the blockchain system. The method and the device can ensure normal operation of the blockchain system on the condition that the malicious nodes appear in certain blocks in the blockchain system.

Description

technical field [0001] The present disclosure relates to the technical field of blockchain, in particular to a method and device for discovering and isolating malicious nodes in blockchain. Background technique [0002] The blockchain network is an open and unrestricted network. Each blockchain node has a very limited understanding of the entire network. Each blockchain node only needs to maintain the information of its neighbor nodes and update it in real time. Can guarantee the normal operation of the entire network. Because of this, the security problem of the blockchain network is also particularly prominent: malicious nodes can freely join or leave the blockchain network by disguising themselves, and can use the limitations of blockchain nodes to launch attacks or destroy the integrity of the network sex. [0003] At present, related research on Sybil attacks, Eclipse Attacks, DDoS (Distributed Denial of Service, Distributed Denial of Service) attacks on blockchain ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0643H04L63/02H04L63/1425H04L63/1458
Inventor 朱珍谢建勤霍颖瑜
Owner FOSHAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products