Estimation of the success probability of a malicious attacker on blockchain-based edge network

被引:18
作者
Halgamuge, Malka N. [1 ]
机构
[1] RMIT Univ, Dept Informat Syst & Business Analyt, Melbourne, Vic 3000, Australia
关键词
Internet of Things (IoT); Smart objects; Data privacy; Cyberattacks; Malicious attack; Blockchain; INTERNET;
D O I
10.1016/j.comnet.2022.109402
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modeling highly accurate cyber-attacks on blockchain-based edge networks may be almost impossible in real-world circumstances due to unanticipated adversary (malicious) behavior. In this study, we propose a novel, distributed blockchain-based security architecture that today's industrial edge-enabled IoT systems may use to strengthen their defences against cyberattacks. We develop a probabilistic model to estimate the success probability of a malicious attacker on blockchain-based edge network by considering (i) hardware -level attack, (ii) network-level attack (IoT, Edge), (iii) software-level attack, wallet, smart contract, and (iv) blockchain network-level attack. We analyze the proposed attack model for sixteen different cyberattacks: False Data Injection, Sybil, DDoS, Identity Spoofing, Side-Channel, Botnet, Backdoor Trojan, Targeted Code Injection, Social Engineering, Phishing, Sinkhole, Man-in-the-middle, SQL Injection, Consensus, Eclipse, and Block Mining. Our model considers scenarios where private keys are stolen, lost, or forgotten by certain nodes. To determine the probability that a malicious attacker will be successful, we develop a simulation environment (a blockchain-based edge network with 200 total nodes, which generates 47,540 samples). We then estimate the success probability of a malicious attacker based on the blockchain resiliency (fault-tolerance) provided by the consensus algorithm, attack types, attack location, and the network size for various scenarios. Our results demonstrate that blockchain-based edge networks are more vulnerable to malicious attacks based on: (i) cyber-attack types (90.96% for Botnet and Backdoor Trojan attacks higher than for other attacks, such as DDoS, SQL Injection and Sybil); (ii) attack location (90.18% for software-level attacks higher than hardware, network, and blockchain network-level attacks); and (iii) consensus algorithm (68.85% for Byzantine fault tolerance, BFT, higher than the Proof-of-Work, PoW). The IoT network vulnerability factor, or exposure factor, of cyberattacks, depends on the strategic importance of the application to the attacker. Our results should be validated in real-world experiments with a large number of nodes.
引用
收藏
页数:19
相关论文
共 32 条
[11]  
Halgamuge M.N., 2021, IEEE 16 C IND EL APP, P510
[12]   Fair rewarding mechanism in music industry using smart contracts on public-permissionless blockchain [J].
Halgamuge, Malka N. ;
Guruge, Dilmi .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (02) :1523-1544
[13]   Optimization framework for Best Approver Selection Method (BASM) and Best Tip Selection Method (BTSM) for IOTA tangle network: Blockchain-enabled next generation Industrial IoT [J].
Halgamuge, Malka N. .
COMPUTER NETWORKS, 2021, 199
[14]  
Hyperledger, 2018, INTR HYP
[15]   Robust Ensemble Machine Learning Model for Filtering Phishing URLs: Expandable Random Gradient Stacked Voting Classifier (ERG-SVC) [J].
Indrasiri, Pubudu L. ;
Halgamuge, Malka N. ;
Mohammad, Azeem .
IEEE ACCESS, 2021, 9 :150142-150161
[16]   The rise of ransomware: Forensic analysis for windows based ransomware attacks [J].
Kara, Ilker ;
Aydos, Murat .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 190
[17]   Zyzzyva: Speculative Byzantine Fault Tolerance [J].
Kotla, Ramakrishna ;
Clement, Allen ;
Wong, Edmund ;
Alvisi, Lorenzo ;
Dahlin, Mike .
COMMUNICATIONS OF THE ACM, 2008, 51 (11) :86-95
[18]   THE BYZANTINE GENERALS PROBLEM [J].
LAMPORT, L ;
SHOSTAK, R ;
PEASE, M .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1982, 4 (03) :382-401
[19]   Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks [J].
Liang, Gaoqi ;
Weller, Steven R. ;
Luo, Fengji ;
Zhao, Junhua ;
Dong, Zhao Yang .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (03) :3162-3173
[20]  
Jalalzai MM, 2019, Arxiv, DOI arXiv:1903.04134