Based on the application of the block chain and how to resist DDoS attacks


nnnIt is difficult to embed complex security performance in nature, and its number is fast and can easily become the target of DDos attack. In this case, the complete distribution of block chain technology makes this Technology can really come in handy. The author Stephen Holmes, Vice President of Financial Technology Labs at VirtusaPolaris, is responsible for examining the application of core technologies in addressing the challenges faced by current digital banks, including block chain technology and smart contracts.n
nnTranslation: Clovern
nSometimes the facts are more unexpected than the novel! The recent distributed denial of service (DDoS) attacks on the final fantasy XIV game platform are quite bizarre, but it has revealed some of the signs of developments. If we continue to use the traditional network security technology, then we have to continue to evolve for the DDoS play “mole” game.n
nIn the era of our lives, DDoS attacks will only increase over time, and in this process will develop increasingly mature. This is no longer just a simple attack on the script. Considering that more and more insecure networking devices are connected to each other, DDoS attacks are highly likely to sneak into and easily control an organization, which is actually possible.n
nJust last year, KrebsOnSecurity.com suffered the largest DDoS attack in history, which was disguised as a traffic similar to a generic routing encapsulation (GRE) packet, which was used to establish a direct connection between network nodes Point-to-point connection of communication protocols. GRE allows two peer-to-peer network nodes to share data that they can not share over the public network.n
nBrian Krebs is an important authority in the field of cybersecurity, but his site has suffered an unprecedentedly complex DDoS attack. According to Krebs, the attack seemed to have been initiated by a very large botnet consisting of an invaded device. This large DDoS attack seems to be derived from a method called DNS reflection attack. In this case, the intrusion will be able to use the network of unmanaged DNS services to create a huge flood of traffic.n
nThe block chain is a true distributed system, built-in node communication anti-lost protection measures. So far, the largest block chain is Bitcoin. While Bitcoin is a truly open network, but its protocol has successfully prevented several attempts to attack the network.n
nAnd the key to be aware of the block is available in the chain of computing power makes the network attack is very difficult to be successful. Many of the different community nodes are attacked before they can sweep the entire system.n
nWhen a DDoS attack is encountered, even if several nodes are offline, the block chain also has protection measures to ensure that the transaction can continue. Of course, not all block-chain networks are the same, and the robustness of a particular network depends to a large extent on the diversity of the network and the number of nodes and their hash rates.n
nThe etherpit currently has 34,051 nodes; the Bitcoin has 7,524. However, both the hash rate is very different. The Hetong Square has a Hach Rate of approximately 55 TH / s (Tera [Hundreds] Hash per second), and the Hell rate for Bitcoin is 5,660,000 TH / s. However, the Hash Rate of the Ether Square is rapidly climbing and follows a pattern that is similar to the growth of the bit rate.n
nThe public sector and the ethernet network rely on miners to use their hardware and software to perform a large number of work equivalent to violent cracking to “crack / guess” the correct SHA256 (an encryption algorithm) to solve the block. Each attempt to resolve the block requires the miner to calculate the hash value of the block. The miners called these attempts for the hash, and the speed at which they could proceed was called their haste rate. When calculating the correct hash, the miner gets the reward and any transaction costs included in the block.n
nThe block is then appended to the end of the existing block chain, verifying all transactions in the block and each previous block. This kind of verification can consolidate all the transactions, so that these transactions are almost impossible to reverse.n
nDirect attack miners are almost impossible. They work under a peer-to-peer network, and this point-to-point network is a direct attack against any peer-to-peer agreement. As we all know, point-to-point network is difficult to interrupt or even damage.n
nAttack trading is also almost impossible, because these transactions are stored in each person’s block chain copy, and in the mining process to be encrypted verification.n
nIf you want to break the public part of the currency or the ether square network, you need to its way, but also the body of the people. If you wish, you will be able to compete with the poison and the use of mining and bitmember agreements. If you have 51% of the mining capacity (hash rate), then it is possible, but it is quite expensive. And if you are not a good participant, other good participants will soon recover 51% of the power, re-control the network. The advantage here is that it can be an asymmetric attack on bad participants. Increase attack costs and response speed.n
nYou can say over the years, Bitcoin has become the ultimate black honeypot. Nevertheless, the core network of Bitcoin has remained safe. The problem is mainly about the security of the wallet, the secure storage of the keys, and the scalability of the bitcover website transactions.n
nBlock chain nodes can run consensus algorithms – if several nodes are offline (even if they are forced to be offline due to DDoS attacks), then the other nodes continue to work. The protocol is restored when the node is restored and resynchronized to ensure consistency and integrity. And it is possible to achieve a unique set of coding algorithms in the block chain.n
nAs the Internet of Things equipment is essentially built at a lower price, it is impossible to embed complex security features. That’s why these devices will still be DDoS clients that future botnets will choose. Gartner’s research shows that the number of operators’ networking equipment is expected to rise rapidly from the current 8.7 billion to 29 billion, and the convenience of launching a large-scale DDoS attack will continue to expand, unless the real distribution, or the existing system can not solve this problem. And that’s where the block chains really come in handy.n
nFrom the point of view of the Internet of Things botnet, it is almost meaningless to run an extremely low haze rate in the ether-tower or bit-coal mining on Internet of Things devices. Mining requires high performance computing equipment. We now do not see the huge botnets digging Bitcoin on the PC because they have no CPU capacity. While the Internet of things equipment, CPU capacity less.n
nIf you want to learn about the long-term view of the future block chain, be sure to read Charles Stross’s science novel Neptune’s Brood, which will provide you with a view of the Galaxy to see how the block chain can promote money Transfer and trade, and explores potential fraud problems (spoilers: even if there is no change in the future!)n

Leave a Reply

Your email address will not be published. Required fields are marked *