Hybrid Security Framework for Blockchain Platforms

Computer and network security in the most interesting and challenging field in Computer Science. In Cyberspace, no one can guarantee the complete security of any computer system as technology is evolving day by day. Blockchain is an emerging technology and it is still evolving. The probability of a higher security threat rate has been seen in the case of immature technology. However, mature technologies are also not completely secure. One successful attack could cost millions of dollars to the victim organization and damage their public and financial reputation badly. A transaction can be performed anonymously in Blockchain. In many past reported security breaches, attackers are still unknown and untraceable. In this research article, researchers are proposing a more secure and reliable hybrid security framework for Blockchain platforms that can be used as a generalized reference model to counter various security threats in Blockchain platforms.The proposed hybrid security framework can be applied to secure any kind of Blockchain platform. This research could influence future research in the direction of security of Blockchain 1.0, Blockchain 2.0 and beyond.

[1]  Ali Selamat,et al.  Systematic literature review and taxonomy for DDoS attack detection and prediction , 2019, International Journal of Digital Enterprise Technology.

[2]  Yusuf Perwej A Pervasive Review of Blockchain Technology and Its Potential Applications , 2018 .

[3]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .

[4]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[5]  Andrea Bondavalli,et al.  Risk Assessment of Blockchain Technology , 2018, 2018 Eighth Latin-American Symposium on Dependable Computing (LADC).

[6]  Jamal Hayat Mosakheil Security Threats Classification in Blockchains , 2018 .

[7]  Fran Casino,et al.  A systematic literature review of blockchain-based applications: Current status, classification and open issues , 2019, Telematics Informatics.

[8]  M. Sethumadhavan,et al.  Survey of consensus protocols on blockchain applications , 2017, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).

[9]  Mahendra Kumar Shrivas,et al.  The Disruptive Blockchain: Types, Platforms and Applications , 2019, TEXILA INTERNATIONAL JOURNAL OF ACADEMIC RESEARCH.

[10]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[11]  Fahad Saleh,et al.  Blockchain Without Waste: Proof-of-Stake , 2020, The Review of Financial Studies.

[12]  Zachary A. Collier,et al.  Cybersecurity Standards: Managing Risk and Creating Resilience , 2014, Computer.

[13]  M. Shrivas,et al.  The Disruptive Blockchain Security Threats and Threat Categorization , 2020, 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T).

[14]  M. Shrivas A Crictal Review of Cryptocurrency Systems , 2017 .

[15]  Mario Zagar,et al.  Comparative analysis of blockchain consensus algorithms , 2018, 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[16]  Gregory A. Witte,et al.  Framework for Improving Critical Infrastructure Cybersecurity | NIST , 2014 .

[17]  Lin Wang Helsinki Attacks Against Peer-to-peer Networks and Countermeasures , 2006 .

[18]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[19]  Arthur Gervais,et al.  Ethereum Eclipse Attacks , 2016 .

[21]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[22]  Iuon-Chang Lin,et al.  A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..

[23]  Jörg Becker,et al.  Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency , 2012, WEIS.

[24]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[25]  Yang Lu Blockchain: A Survey on Functions, Applications and Open Issues , 2018 .

[26]  Mohammed Samaka,et al.  Security Services Using Blockchains: A State of the Art Survey , 2018, IEEE Communications Surveys & Tutorials.

[27]  Matthew P. Barrett,et al.  Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1 (Arabic translation) , 2018 .

[28]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[29]  Kaiwen Zhang,et al.  Towards Dependable, Scalable, and Pervasive Distributed Ledgers with Blockchains , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).

[30]  谢宗晓,et al.  ISO/IEC 27001:2013概述与改版分析 , 2014 .

[31]  Marko Vukolic,et al.  Blockchain Consensus Protocols in the Wild , 2017, DISC.

[32]  Yuliang Zheng,et al.  Security of the Blockchain against Long Delay Attack , 2018, IACR Cryptol. ePrint Arch..

[33]  E. Sandstrom,et al.  Cyber security , 2005, International Symposium CIGRE/IEEE PES, 2005..

[34]  Thomas Yeboah,et al.  Migration Model for un secure Database driven Software System to Secure System using Cryptography , 2016 .