Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    “Half of the Node Records Are Forged?”: The Problem of Node Records Forgery in Ethereum Network

    Yang Liu1,2,*, Zhiyuan Lin1, Yuxi Zhang1, Lin Jiang1,*, Xuan Wang1,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1713-1729, 2024, DOI:10.32604/cmes.2023.030468 - 17 November 2023

    Abstract Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smart contracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connection mechanism, whereas an efficient data-sharing protocol constitutes as the bedrock of Blockchain network security. In this paper, we propose NodeHunter, an Ethereum network detector implemented through the application of simulation technology, which is capable of aggregating all node records within the network and the interconnectedness between them. Utilizing this connection information, NodeHunter can procure more comprehensive insights for network status analysis compared to preceding detection methodologies. More >

  • Open Access

    ARTICLE

    Multi-Domain Malicious Behavior Knowledge Base Framework for Multi-Type DDoS Behavior Detection

    Ouyang Liu, Kun Li*, Ziwei Yin, Deyun Gao, Huachun Zhou

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2955-2977, 2023, DOI:10.32604/iasc.2023.039995 - 11 September 2023

    Abstract Due to the many types of distributed denial-of-service attacks (DDoS) attacks and the large amount of data generated, it becomes a challenge to manage and apply the malicious behavior knowledge generated by DDoS attacks. We propose a malicious behavior knowledge base framework for DDoS attacks, which completes the construction and application of a multi-domain malicious behavior knowledge base. First, we collected malicious behavior traffic generated by five mainstream DDoS attacks. At the same time, we completed the knowledge collection mechanism through data pre-processing and dataset design. Then, we designed a malicious behavior category graph and… More >

Displaying 1-10 on page 1 of 2. Per Page