Overview of Attack Surfaces in Blockchain

- Authors: S. Zalte1, H. Bhatia2, R. Deshmukh3, N. Gupta4, R. Kamat5
-
View Affiliations Hide Affiliations1 Department of Computer Science, Shivaji University, Kolhapur, India 2 School of Computer Science, Engineering and Applications, D Y Patil International University, Pune, India 3 Department of Computer Science, Shivaji University, Kolhapur, India 4 Manav Rachna International Institute of Research and Studies, Faridabad, Haryana, India 5 Department of Computer Science, Shivaji University, Kolhapur, India
- Source: Blockchain Applications in Cybersecurity Solutions , pp 62-80
- Publication Date: June 2023
- Language: English
In blockchain technology, cybercriminals exploit new attack surfaces for non-legitimate persons who wish a dissemination of fake information, encourage cyber attacks, unethical behavior, etc. Attacks are believed to be attributed to the blockchain cryptographic architecture, the bottom-line architecture, and the substance in which they are applied. The main threat is focused on the progressive defense research activity. It is currently believed that other attacks on the blockchain can be launched without being able to withstand traditional defenses, a few of which may be used to deliver any other attack. By delineating these attacks and examining their countermeasures, it highlights the direction of new research that should be persisted for safer and more competent use of blockchain. In spite of vulnerabilities and attacks, this technology offers key features like hashing, immutability and digital signature, which enrich the blockchain. Researchers also contributed to developing a security shield for blockchain by using an intelligent combination of these features. Basically, these features are required to achieve CIA (Confidentiality, Integrity and Authentication). The contribution of this chapter would be systematically investigating the attack surface of Blockchain technology. The attack surface is the sum of all conceivable security risk exposures. It is also the total of all known and undiscovered threats, possible vulnerabilities, and controls, including all resources. To do this, we set attack vitality on the attack surface to a variety of attacks. nbsp;
-
From This Site
/content/books/9789815080599.chap4dcterms_subject,pub_keyword-contentType:Journal -contentType:Figure -contentType:Table -contentType:SupplementaryData105
