Network security model based on blockchain
1. Data layer
the data layer is the lowest layer in the six hierarchies of the blockchain. We can understand the data layer as a database, but for the blockchain, this database is a tamperable and distributed database, which is what we call "distributed ledger"
in the data layer, that is, the "distributed ledger", the data information on the blockchain is stored, and the blockchain structure, asymmetric encryption technology, hash algorithm and other technical means of the block are encapsulated to ensure the security of the data in the case of the whole network being open. The specific method is:
in the blockchain network, nodes use consensus algorithm to maintain the consistency of data layer (that is, the distributed database), and use asymmetric encryption and hash algorithm in cryptography to ensure the non usurpation and traceability of the distributed database
This constitutes the bottom data structure of blockchain technology. However, it is not enough to have a distributed database. We also need to let the data information in the database be shared and exchanged. Next, we will introce the upper layer of the data layer - the network layer
Second, network layer
the network system of blockchain is essentially a P2P (point-to-point) network. Point to point means that there is no need for an intermediate link or centralized server to control the system. All resources and services in the network are distributed in the hands of each node, and the transmission of information is also a direct communication between the two nodes. However, it should be noted that P2P
(peer-to-peer) was not invented by Nakamoto, and the blockchain only integrates this technology
therefore, the network layer of blockchain is actually a particularly powerful point-to-point network system. In this system, each node can not only proce information, but also receive information, just like sending e-mail. You can write your own e-mail, and you can also receive the e-mail sent to you by others
in the blockchain network, nodes need to jointly maintain the blockchain system. Every time a node creates a new block, it needs to notify other nodes in the form of broadcast. After receiving the information, other nodes verify the block, and then create a new block on the basis of the block. In this way, the whole network can jointly maintain and update the general ledger of the blockchain system
however, what rules should the whole network follow to maintain and update the general ledger of the blockchain system? This involves the so-called "laws and regulations" (rules), which we will introce next: the consensus layer
Third, consensus layer
in the world of blockchain, consensus simply means that the whole network should maintain and update the general ledger of blockchain system according to a unified and agreed rule, which is similar to the rule of updating data. It is one of the core technologies of blockchain and the governance mechanism of blockchain community to let highly dispersed nodes reach consensus efficiently in the decentralized blockchain network
at present, the mainstream consensus mechanism algorithms include: proof of work of bitcoin (POW), proof of rights and interests of Ethereum (POS), proof of rights and interests of EOS (dpos), etc
we now introce the data layer, network layer and consensus layer. These three layers ensure that there are data, networks and rules for updating data on the network. However, there is no free lunch in the world. How can nodes actively participate in the maintenance of the blockchain system? Here is the incentive layer, which we will introce next: incentive layer< 4. Incentive layer
incentive layer is the so-called mining mechanism, which can be understood as incentive mechanism: you can get as much reward as you contribute to the blockchain system. With this incentive mechanism, the whole network nodes can be encouraged to participate in the data recording and maintenance on the blockchain
mining mechanism and consensus mechanism are actually the same truth. Consensus mechanism can be understood as the company's general rules and regulations, while mining mechanism can be understood as the reward rules for what you do well in the general rules and regulations
just like the consensus mechanism POW of bitcoin, it stipulates that more work pays more. Whoever can find the correct hash value first can get a certain amount of bitcoin reward
and Ethereum's POS stipulates that the older the holder is, the more likely he or she will be rewarded
it should be noted that the incentive layer is generally only available for the public chain, because the public chain must rely on the nodes of the whole network to jointly maintain data, so there must be a set of incentive mechanism to encourage the nodes of the whole network to participate in the construction and maintenance of the blockchain system, so as to ensure the security and reliability of the blockchain system
the blockchain is safe and reliable, and it is not intelligent enough, right? The contract layer we will introce next can make the blockchain system more intelligent
v. contract layer
Contract layer mainly includes various scripts, codes, algorithm mechanisms and smart contracts, which is the basis of block chain programming. What we call "smart contract" is at the contract level
if the bitcoin system is not intelligent enough, the "smart contract" proposed by Ethereum can meet many application scenarios. The principle of the contract layer is to embed the code into the blockchain system, in this way to realize the smart contract that can be customized. In this way, on the blockchain system, once the terms of the smart contract are triggered, the system can automatically execute commands< Finally, the application layer. The application layer is very simple. As the name suggests, it is a variety of application scenarios and cases of blockchain. What we now call "blockchain +" is the so-called application layer. At present, the blockchain applications that have been implemented are mainly various blockchain applications built on
eth, EOS and other public chains. There are more applications of gambling and games, and the real practical applications have not yet appeared.
blockchain is a decentralized and distributed electronic classified accounting method based on the model of providing absolute security and trust. Using encryption technology, transactions are recorded chronologically and publicly, and each block has a timestamp and a link to the previous block. Importantly, these digital "blocks" can only be updated through the consensus of all participants, and data interception, modification and deletion are almost impossible.
Blockchain technology can help us improve the security of encryption, authentication and other protection mechanisms, which is absolutely good news for the Internet of things security and DDoS Defense Community
blockchain has the potential to become an important solution for safe communities, as well as for the financial, energy and manufacturing instries. At present, verifying bitcoin transaction is one of its main uses, but this technology can also be extended to smart grid system, content delivery network and other application scenarios
how to apply blockchain to network security
whether it's protecting data integrity or using digital identification technology to prevent Internet of things devices from DDoS attacks, blockchain technology can play a key role, at least now it has shown this ability
Internet of things security and DDoS Defense Community
a blockchain startup claims that its decentralized "billing" system can help users resist DDoS attacks with traffic over 100gbps. Interestingly, the company said that this decentralized system allows users to rent their own extra bandwidth and submit their bandwidth access rights to the distributed nodes of the blockchain. When a website suffers from DDoS attacks, the website can use the leased bandwidth to mitigate DDoS attacks
improve confidentiality and data integrity
although the original design of blockchain did not consider the specific access control, now some blockchain technology implementation has solved the problems of data confidentiality and access control. In this era, any data may be tampered, which is obviously a serious problem, but the complete data encryption maliciously guarantees that the data will not be accessed or tampered by others through man in the middle attack in the transmission process
the whole IOT instry needs data integrity protection. For example, IBM's Watson IOT platform allows users to manage IOT data in a private blockchain network, which has been integrated into their big blue cloud service. In addition, Ericsson's blockchain data integrity service provides comprehensive audit, compatible and reliable data services to allow developers to use predix PAAS platform for technical implementation
one of the best applications is the transformation of our public sector and the creation of citizen centered infrastructure. This will enable the public to have their own identity and every transaction can be verified. We can use smart contracts and signed assertions to formulate elements of public services, such as benefits, etc
Internet of things & amp; Smart devices
now the attention of the whole IT community has begun to shift to the Internet of things & amp; Smart devices are on the rise, and security is absolutely one of the primary considerations. Although the Internet of things can improve our work and proction efficiency, it also means that we need to face more security risks. As a result, many companies seek to apply blockchain to protect IOT and instrial IOT (iiot) devices because blockchain technology can enhance authentication, improve data traceability and mobility, and assist record management
according to Alexey malanov, an anti-virus expert at Kaspersky laboratory, blockchain technology helps to track hacker attacks, adding:
"network intruders usually clear the permission log to hide traces of unauthorized access to devices. But if the logs are distributed in multiple devices (for example, through blockchain Technology), the risk can be reced as much as possible. "
German Klimenko, chairman of the digital economy development fund, said: "at present, the Ministry of defense is vigorously promoting it development and research, which is a good thing for the instry."
NATO and the Pentagon are also studying the "defensive" Application of blockchain. This technology is actively used to protect the system from network attacks. NATO will use blockchains to protect financial information, supply and logistics chains, while the Pentagon is developing a data transmission system to prevent hackers
in general, blockchain technology is not omnipotent, at least not yet. Whether from the perspective of technical integrity or system implementation, the current blockchain technology can not guarantee the security of the device 100%. Note: the above content comes from the Internet
Blockchain technology is not a single innovation technology, but the result of a variety of technology integration and innovation, its essence is a weak center, self-confident underlying architecture technology. Compared with the traditional Internet technology, its technical principle and model architecture is a major innovation. Here, we will analyze the basic technical model of blockchain
asymmetric encryption algorithm is a function that converts the original plaintext file or data into a series of unreadable ciphertext codes by using an encryption key. The encryption process is irreversible. Only holding the corresponding decryption key can the encrypted information be decrypted into readable plaintext. Encryption enables private data to be transmitted through the public network under the condition of low risk, and protects the data from being stolen and read by the third party
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
protocol layer
the so-called protocol layer refers to the lowest level technology. This level is usually a complete blockchain proct, similar to the operating system of our computer. It maintains network nodes and only provides API for calling. Usually, the government will provide a simple client (commonly known as wallet). The function of this client wallet is also very simple. It can only establish address, verify signature, transfer payment, check balance, etc
extension layer
this layer is similar to the computer driver, which is to make blockchain procts more practical
application layer
this layer is similar to all kinds of software programs in computers. It is a proct that ordinary people can really use directly, and it can also be understood as the browser of B / S architecture procts. The application of this level is almost blank at present.
blockchain is a decentralized distributed ledger system. Due to the high network delay in the peer-to-peer network, the transaction order observed by each node can not be completely consistent
therefore, the blockchain system needs to design a mechanism to reach a consensus on the sequence of transactions that occur in a certain period of time. This algorithm to reach consensus on the order of transactions in a time window is called consensus mechanism.