当前位置: X-MOL 学术J. Inf. Secur. Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Survey of security supervision on blockchain from the perspective of technology
Journal of Information Security and Applications ( IF 3.8 ) Pub Date : 2021-05-25 , DOI: 10.1016/j.jisa.2021.102859
Yu Wang , Gaopeng Gou , Chang Liu , Mingxin Cui , Zhen Li , Gang Xiong

Due to decentralization, immutability, circulation, anonymity, blockchain technology has become a hot topic but also a hotbed of various cyber-crimes. Many perpetrators attack blockchain to steal cryptocurrencies or use anonymous addresses to conduct illicit financial transactions or receive ransoms while hiding their identities. Since blockchain technology has not developed for a long time, the security issues in this area cannot be well resolved through its own mechanisms, which brings great challenges to protect the security of blockchain and users. Although there are some protective measures to prevent attackers from attacking, most of them are proposed after attacks, and it is impossible to find the masterminds behind modern cyber-crimes, so it is necessary to continuously monitor suspicious nodes or users. In this paper, we first present a systematic overview of blockchain technology and security issues according to the four-layer structure, and explain the problem of security supervision of blockchain. Subsequently, we divide the key technologies for security supervision of blockchain into three aspects: node discovery technology on the network layer, data analysis technology of transaction records on the transaction layer, and network traffic analysis technology on the application layer. In terms of each aspect, we summarize the studies from various angles according to its characteristics. In the end, we discuss the relationship between blockchain and traditional law. Moreover, we present the challenges of security supervision and possible future research directions in this field.



中文翻译:

技术视角下的区块链安全监管调查

由于去中心化,不变性,流通性,匿名性,区块链技术已成为热门话题,同时也是各种网络犯罪的温床。许多作案者攻击区块链以窃取加密货币或使用匿名地址进行非法金融交易或接收赎金,同时隐藏其身份。由于区块链技术尚未发展很长时间,因此无法通过自身机制很好地解决该领域的安全问题,这给保护区块链和用户的安全带来了巨大挑战。尽管有一些保护措施可以防止攻击者进行攻击,但是大多数措施是在攻击后提出的,并且不可能找到现代网络犯罪背后的策划者,因此有必要不断监视可疑节点或用户。在本文中,我们首先根据四层结构对区块链技术和安全问题进行系统的概述,并解释区块链的安全监管问题。随后,我们将区块链安全监管的关键技术分为三个方面:网络层的节点发现技术,交易层的交易记录数据分析技术和应用层的网络流量分析技术。在各个方面,我们根据其特点从各个角度对研究进行了总结。最后,我们讨论了区块链与传统法律之间的关系。此外,我们提出了安全监管的挑战以及该领域可能的未来研究方向。

更新日期:2021-05-25
down
wechat
bug