Survey of security supervision on blockchain from the perspective of technology
【Author】 Wang, Yu; Gou, Gaopeng; Liu, Chang; Cui, Mingxin; Li, Zhen; Xiong, Gang
【Source】JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
【影响因子】4.960
【Abstract】Due to decentralization, immutability, circulation, anonymity, blockchain technology has become a hot topic but also a hotbed of various cyber-crimes. Many perpetrators attack blockchain to steal cryptocurrencies or use anonymous addresses to conduct illicit financial transactions or receive ransoms while hiding their identities. Since blockchain technology has not developed for a long time, the security issues in this area cannot be well resolved through its own mechanisms, which brings great challenges to protect the security of blockchain and users. Although there are some protective measures to prevent attackers from attacking, most of them are proposed after attacks, and it is impossible to find the masterminds behind modern cybercrimes, so it is necessary to continuously monitor suspicious nodes or users. In this paper, we first present a systematic overview of blockchain technology and security issues according to the four-layer structure, and explain the problem of security supervision of blockchain. Subsequently, we divide the key technologies for security supervision of blockchain into three aspects: node discovery technology on the network layer, data analysis technology of transaction records on the transaction layer, and network traffic analysis technology on the application layer. In terms of each aspect, we summarize the studies from various angles according to its characteristics. In the end, we discuss the relationship between blockchain and traditional law. Moreover, we present the challenges of security supervision and possible future research directions in this field.
【Keywords】Blockchain technology; Security supervision; Peer-to-peer (P2P) network; Transaction; User identity; Heuristics; Graph theory
【发表时间】2021 AUG
【收录时间】2022-01-02
【文献类型】
【主题类别】
--
评论