Blockchain Applications in Cybersecurity Solutions

Author(s): S. Zalte*, H. Bhatia, R. Deshmukh, N. Gupta and R. Kamat

DOI: 10.2174/9789815080599123010007

Overview of Attack Surfaces in Blockchain

Pp: 62-80 (19)

Buy Chapters

* (Excluding Mailing and Handling)

  • * (Excluding Mailing and Handling)

Abstract

SHS investigation development is considered from the geographical and historical viewpoint. 3 stages are described. Within Stage 1 the work was carried out in the Department of the Institute of Chemical Physics in Chernogolovka where the scientific discovery had been made. At Stage 2 the interest to SHS arose in different cities and towns of the former USSR. Within Stage 3 SHS entered the international scene. Now SHS processes and products are being studied in more than 50 countries.

Abstract

In blockchain technology, cybercriminals exploit new attack surfaces for non-legitimate persons who wish a dissemination of fake information, encourage cyber attacks, unethical behavior, etc. Attacks are believed to be attributed to the blockchain cryptographic architecture, the bottom-line architecture, and the substance in which they are applied. The main threat is focused on the progressive defense research activity. It is currently believed that other attacks on the blockchain can be launched without being able to withstand traditional defenses, a few of which may be used to deliver any other attack. By delineating these attacks and examining their countermeasures, it highlights the direction of new research that should be persisted for safer and more competent use of blockchain. In spite of vulnerabilities and attacks, this technology offers key features like hashing, immutability and digital signature, which enrich the blockchain. Researchers also contributed to developing a security shield for blockchain by using an intelligent combination of these features. Basically, these features are required to achieve CIA (Confidentiality, Integrity and Authentication). The contribution of this chapter would be systematically investigating the attack surface of Blockchain technology. The attack surface is the sum of all conceivable security risk exposures. It is also the total of all known and undiscovered threats, possible vulnerabilities, and controls, including all resources. To do this, we set attack vitality on the attack surface to a variety of attacks. 

We recommend

Favorable 70-S: Investigation Branching Arrow

Authors:Bentham Science Books