Block chain security control method and device based on SDN, and block chain network

A technology of security control and blockchain, applied in the field of blockchain, can solve problems such as application security protection is not considered

Inactive Publication Date: 2020-03-06
SHENZHEN POWER SUPPLY BUREAU
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, for malicious attacks on nodes in the blockchain, it is necessary to design methods to detect malicious traffic and take measures to achieve secure voting and accounting in the blockchain. Rate limiting at the time of infection, security using maximum entropy anomaly detection and outlier detectors, etc., do not take into account the security of applications that install flow entries

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain security control method and device based on SDN, and block chain network
  • Block chain security control method and device based on SDN, and block chain network
  • Block chain security control method and device based on SDN, and block chain network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention.

[0054] In order to facilitate understanding of the present invention, several technical terms involved are described below:

[0055] DoS attack: The main goal of a DoS attack is to make the target service unavailable to other users. A successful DoS attack renders one or more nodes unable to transmit or receive any information, including transactions or blocks. For private chains and consortium chains, although this attack does not directly threaten the data information on the blockchain, the attacked nodes can no longer transmit transactions and blocks on the chain, and computing power is wasted.

[0056] Access Control: Access to private or consortium chains is li...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a blockchain security control method and device based on a software defined network, and a blockchain. According to the invention, the security threat in the SDN environment canbe controlled according to the black and white list, and the node of the block chain is protected from DoS attack and unauthorized access by using the SDN, so that the security of the node in the block chain is ensured.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to an SDN-based block chain security control method, device and block chain network. Background technique [0002] Blockchain as a public ledger enables many applications to benefit from the advantages of blockchain in various application scenarios. However, the public download feature of the blockchain makes it difficult to protect the privacy and security of the application. First, the entire blockchain can be downloaded at any time, making the data available to the public. Second, anyone can deploy a node, join the blockchain network and participate in the process of consensus establishment. Private and consortium chains have stricter requirements for entities participating in the blockchain, which is why the number of nodes that store and scale these blockchains is relatively small. However, by targeting specific nodes, an attacker can influence the way consensus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/819H04L47/21
CPCH04L63/1458H04L63/1416H04L63/101H04L47/215
Inventor 高强郑泽鳞周雨涛曾凌烽徐琼黄哲
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products