Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for detecting Ethereum digital currency stealing attacks

A digital currency, Ethereum technology, applied in transmission systems, electrical components, etc., can solve the problems of inability to detect Ethereum digital currency attacks, low support for Ethereum digital currency theft attacks, etc., to achieve good applicability and scalability. Effect

Active Publication Date: 2020-01-03
XIDIAN UNIV
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing honeypot system and detection methods have little support for Ethereum digital currency theft attacks, and cannot attract attackers who steal Ethereum digital currency to send substantive attack requests to the honeypot system. Fang digital currency attack detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for detecting Ethereum digital currency stealing attacks
  • System and method for detecting Ethereum digital currency stealing attacks
  • System and method for detecting Ethereum digital currency stealing attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The present invention provides a system and method for detecting Ethereum digital currency stealing attacks, in order to enable those skilled in the art to better understand and realize the technical solutions described in the present invention, and to make the above-mentioned purpose and characteristics of the present invention and advantages are clearer, the technical solutions described in the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0076] figure 1 It is an overall flow chart of the method for detecting Ethereum digital currency theft attacks of the present invention. refer to figure 1 As shown, the method of the present invention includes the following steps: deploying an Ethereum honeypot to capture malicious requests from attackers; saving malicious requests from attackers to a database; analyzing attack data to generate detection results.

[0077] Step 1. Deploy the Ethereum honeypot to induce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and method for detecting Ethereum digital currency stealing attacks. The method comprises the steps: deploying an Ethereum honeypot, inducing a network attacker to quickly find a honeypot host, transmitting a detection request, and capturing a malicious request from the attacker; storing the malicious request from the attacker in a database; and analyzing the attack data, associating the malicious request, detecting an attack behavior, identifying an attack method used by an attacker, tracking the attacker, and generating a detection result. According to the method, the malicious request sent by the attacker is attracted and captured, and the attack technique used by the attacker is further recognized, and weak points of an existing system are effectively found, so that the Ethereum system is better protected.

Description

technical field [0001] The invention belongs to the technical field of computer network security, and relates to the detection of malicious attacks, in particular to a system and method for detecting ethereum digital currency theft attacks, which can be used to protect the safety of the ethereum digital currency. Background technique [0002] In recent years, digital encryption technology has received widespread attention worldwide. Ethereum is currently the second largest blockchain platform by market value. Users can use this platform to issue encrypted digital currencies, including Ethereum (Ether) and tokens (Token) created using smart contract technology. The Ethereum network consists of nodes running Ethereum client software, mainly including Go-Ethereum (Geth for short) and Parity. These client software all support the remote control of the API function modules of the system through the remote procedure call (HTTP JSON-RPC) module based on the HTTP protocol. When th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1491
Inventor 侯鑫睿程镇周亚金李金库
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products