RETRACTED: Information security model of block chain based on intrusion sensing in the IoT environment (Retracted article. See DEC, 2022)

被引:64
作者
Li, Daming [1 ,2 ,3 ]
Cai, Zhiming [4 ]
Deng, Lianbing [5 ,6 ]
Yao, Xiang [6 ]
Wang, Harry Haoxiang [7 ,8 ]
机构
[1] Zhuhai Da Hengqin Sci & Technol Dev Co Ltd, Postdoctoral Res Ctr, Hengqin, Peoples R China
[2] City Univ Macau, Taipa, Macau, Peoples R China
[3] Int Postdoctoral Sci & Technol Res Inst Co Ltd, Wuhan, Hubei, Peoples R China
[4] City Univ Macao, Macau Big Data Res Ctr Urban Governance, Taipa, Macau, Peoples R China
[5] Huazhong Univ Sci & Technol, Wuhan, Hubei, Peoples R China
[6] Zhuhai De Hengqin Sci & Technol Dev Co Ltd, Hengqin, Peoples R China
[7] Cornell Univ, Ithaca, NY 14850 USA
[8] GoPercept Lab, New York, NY 11201 USA
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2019年 / 22卷 / Suppl 1期
关键词
Internet of things; Intrusion detection; Block chain; Information security; Model building; Technical analysis; INTERNET;
D O I
10.1007/s10586-018-2516-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Block chain is a decentralized core architecture, which is widely used in emerging digital encryption currencies. It has attracted much attention and has been researched with the gradual acceptance of bitcoin. Block chaining technology has the characteristics of centralization, block data, no tampering and trust, so it is sought after by enterprises, especially financial institutions. This paper expounds the core technology principle of block chain technology, discusses the application of block chain technology, the existing regulatory problems and security problems, so as to provide some help for the related research of block chain technology. Intrusion detection is an important way to protect the security of information systems. It has become the focus of security research in recent years. This paper introduces the history and current situation of intrusion detection system, expounds the classification of intrusion detection system and the framework of general intrusion detection, and discusses all kinds of intrusion detection technology in detail. Intrusion detection technology is a kind of security technology to protect network resources from hacker attack. IDS is a useful supplement to the firewall, which can help the network system to quickly detect attacks and improve the integrity of the information security infrastructure. In this paper, intrusion detection technology is applied to block chain information security model, and the results show that proposed model has higher detection efficiency and fault tolerance.
引用
收藏
页码:451 / 468
页数:18
相关论文
共 34 条
[1]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[2]  
Anderson James P., 1980, Tech. Rep
[3]  
[Anonymous], 2005, ITU INT REP 2005 INT
[4]  
[Anonymous], ARCHAEOBOTANY, DOI DOI 10.1007/S00334-017-0661-8
[5]   From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions [J].
Anwar S. ;
Zain J.M. ;
Zolkipli M.F. ;
Inayat Z. ;
Khan S. ;
Anthony B. ;
Chang V. .
Algorithms, 2017, 10 (02)
[6]   Modification of supervised OPF-based intrusion detection systems using unsupervised learning and social network concept [J].
Bostani, Hamid ;
Sheikhan, Mansour .
PATTERN RECOGNITION, 2017, 62 :56-72
[7]  
Cai Z, 2017, CLUST COMPUT
[8]  
Chen Q, 2017, MULTIMED TOOLS APPL
[9]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[10]  
Desai Anuja S., 2016, 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT), P291, DOI 10.1109/ICAECCT.2016.7942601