检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Yang Liu Zhiyuan Lin Yuxi Zhang Lin Jiang Xuan Wang
机构地区:[1]School of Computer Science and Technology,Harbin Institute of Technology(Shenzhen),Shenzhen,518055,China [2]Peng Cheng Laboratory,Shenzhen,518055,China [3]Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies,Shenzhen,518055,China
出 处:《Computer Modeling in Engineering & Sciences》2024年第2期1713-1729,共17页工程与科学中的计算机建模(英文)
基 金:the National Key Research and Development Program of China(No.2020YFB1005805);Peng Cheng Laboratory Project(Grant No.PCL2021A02);Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies(2022B1212010005);Shenzhen Basic Research(General Project)(No.JCYJ20190806142601687);Shenzhen Stable Supporting Program(General Project)(No.GXWD20201230155427003-20200821160539001).
摘 要:Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smartcontracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connectionmechanism, whereas an efficient data-sharing protocol constitutes as the bedrock of Blockchain network security.In this paper, we propose NodeHunter, an Ethereum network detector implemented through the application ofsimulation technology, which is capable of aggregating all node records within the network and the interconnectednessbetween them. Utilizing this connection information, NodeHunter can procure more comprehensive insightsfor network status analysis compared to preceding detection methodologies. Throughout a three-month period ofunbroken surveillance of the Ethereum network, we obtained an excess of two million node records along with overone hundred million node acquaintances. Analysis of the gathered data revealed that an alarming 49% or more ofthese node records were maliciously forged.
关 键 词:Blockchain ethereum peer-to-peer networks node discovery protocol malicious behavior
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.171