Blockchain Applications in Cybersecurity Solutions

Overview of Attack Surfaces in Blockchain

Author(s): S. Zalte*, H. Bhatia, R. Deshmukh, N. Gupta and R. Kamat

Pp: 62-80 (19)

DOI: 10.2174/9789815080599123010007

* (Excluding Mailing and Handling)

Abstract

In blockchain technology, cybercriminals exploit new attack surfaces for non-legitimate persons who wish a dissemination of fake information, encourage cyber attacks, unethical behavior, etc. Attacks are believed to be attributed to the blockchain cryptographic architecture, the bottom-line architecture, and the substance in which they are applied. The main threat is focused on the progressive defense research activity. It is currently believed that other attacks on the blockchain can be launched without being able to withstand traditional defenses, a few of which may be used to deliver any other attack. By delineating these attacks and examining their countermeasures, it highlights the direction of new research that should be persisted for safer and more competent use of blockchain. In spite of vulnerabilities and attacks, this technology offers key features like hashing, immutability and digital signature, which enrich the blockchain. Researchers also contributed to developing a security shield for blockchain by using an intelligent combination of these features. Basically, these features are required to achieve CIA (Confidentiality, Integrity and Authentication). The contribution of this chapter would be systematically investigating the attack surface of Blockchain technology. The attack surface is the sum of all conceivable security risk exposures. It is also the total of all known and undiscovered threats, possible vulnerabilities, and controls, including all resources. To do this, we set attack vitality on the attack surface to a variety of attacks. 


Keywords: Attack surface, Block chain, CIA, Defense research activity, Vulnerabilities.

Related Books
© 2024 Bentham Science Publishers | Privacy Policy