Estimation of the success probability of a malicious attacker on blockchain-based edge network

被引:18
作者
Halgamuge, Malka N. [1 ]
机构
[1] RMIT Univ, Dept Informat Syst & Business Analyt, Melbourne, Vic 3000, Australia
关键词
Internet of Things (IoT); Smart objects; Data privacy; Cyberattacks; Malicious attack; Blockchain; INTERNET;
D O I
10.1016/j.comnet.2022.109402
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modeling highly accurate cyber-attacks on blockchain-based edge networks may be almost impossible in real-world circumstances due to unanticipated adversary (malicious) behavior. In this study, we propose a novel, distributed blockchain-based security architecture that today's industrial edge-enabled IoT systems may use to strengthen their defences against cyberattacks. We develop a probabilistic model to estimate the success probability of a malicious attacker on blockchain-based edge network by considering (i) hardware -level attack, (ii) network-level attack (IoT, Edge), (iii) software-level attack, wallet, smart contract, and (iv) blockchain network-level attack. We analyze the proposed attack model for sixteen different cyberattacks: False Data Injection, Sybil, DDoS, Identity Spoofing, Side-Channel, Botnet, Backdoor Trojan, Targeted Code Injection, Social Engineering, Phishing, Sinkhole, Man-in-the-middle, SQL Injection, Consensus, Eclipse, and Block Mining. Our model considers scenarios where private keys are stolen, lost, or forgotten by certain nodes. To determine the probability that a malicious attacker will be successful, we develop a simulation environment (a blockchain-based edge network with 200 total nodes, which generates 47,540 samples). We then estimate the success probability of a malicious attacker based on the blockchain resiliency (fault-tolerance) provided by the consensus algorithm, attack types, attack location, and the network size for various scenarios. Our results demonstrate that blockchain-based edge networks are more vulnerable to malicious attacks based on: (i) cyber-attack types (90.96% for Botnet and Backdoor Trojan attacks higher than for other attacks, such as DDoS, SQL Injection and Sybil); (ii) attack location (90.18% for software-level attacks higher than hardware, network, and blockchain network-level attacks); and (iii) consensus algorithm (68.85% for Byzantine fault tolerance, BFT, higher than the Proof-of-Work, PoW). The IoT network vulnerability factor, or exposure factor, of cyberattacks, depends on the strategic importance of the application to the attacker. Our results should be validated in real-world experiments with a large number of nodes.
引用
收藏
页数:19
相关论文
共 32 条
[1]  
Alchieri EAP, 2008, LECT NOTES COMPUT SC, V5401, P22, DOI 10.1007/978-3-540-92221-6_4
[2]  
[Anonymous], 2021, TENS BILLIONS WORTH
[3]  
[Anonymous], 2021, 2021 UNIT 42 RANSOMW
[4]  
Attiya Chagit, 1984, P 3 ANN ACM S PRINC
[5]  
Bordel B, 2019, INTELL AUTOM SOFT CO, V25, P155
[6]   THE RACE TO SAVE THE INTERNET FROM QUANTUM HACKERS [J].
Castelvecchi, Davide .
NATURE, 2022, 602 (7896) :198-201
[7]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[8]   Blockchain-Based Privacy Enforcement in the IoT Domain [J].
Daidone, Federico ;
Carminati, Barbara ;
Ferrari, Elena .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) :3887-3898
[9]  
Danzi P., 2019, IEEE BLOCKCHAIN TECH
[10]   Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT [J].
Fotohi, Reza ;
Aliee, Fereidoon Shams .
COMPUTER NETWORKS, 2021, 197