Network Attack Chain Security Model Construction Based On Attack Framework

Main Article Content

Jian Hu, Hailin Wang, Hanruo Li

Abstract

All facets of society's governance, economics, and culture have been impacted by networking. Network attacks have become more common as a result of the digital revolution, which has also facilitated major changes in worldwide communication and accelerated the development of human society. An unauthorized attempt to access a network with the goal of committing theft or other forms of damage is what we call a network attack. This article focuses on building a chain security model utilising the block chain concept in order to address the issue of inaccurate assessments of forged malicious behavioural methods for identification. It uses the NIK-256 hashing algorithm to identify valid users utilising time-dependent verification. Passwords and recorded times are maintained in a combined chain database, which combines blockchain technology and the Trusted Platform Module (TPM), improving data security and privacy. After that, we schedule users using the Whale optimisation algorithm (WOA), which decreases difficulty, and then a smart contract is developed that grants authorised users access control based on their level of trust and permission. The proposed approach, known as Hyb_chain_TPM, implements countermeasures in accordance with the attack risk level and stores the attack graph in a combined chain database for future attack forecasting. Utilising diverse attack datasets, extensive tests are run to validate this system. Additionally, the outcomes of privacy protection and AI processes are assessed independently and contrasted using a variety of current techniques.

Article Details

Section
Articles
Author Biography

Jian Hu, Hailin Wang, Hanruo Li

1Jian Hu

1Hailin Wang

1Hanruo Li

1 Digital Security Center of Information Center of Yunnan Power Grid Co., LTD, Kunming, Yunnan, 650011, China

*Corresponding author e-mail: hjiang2023@126.com

Copyright © JES 2023 on-line : journal.esrgroups.org

References

Cyber Terror Response (2016). Center,“Coping with smishing”, 2013, http://www.netan.go.kr/. The National Police Agency. 2. Kang, J. Y., Yoon, J., & Kim, Y. (2013). Phishing/pharming examples and countermeasure analysis. The Korean Institute of Information Scientists and Engineers, 12(2), 171–180.

S. Nakamoto. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. [Online]. Available: https://bitcoin.org/bitcoin.pdf

D. Wilson and G. Ateniese, “From pretty good to great: Enhancing PGP using bitcoin and the blockchain,” in Network and System Security. Cham, Switzerland: Springer Int., 2015, pp. 368–375.

X. Huang, C. Xu, P. Wang, and H. Liu, “LNSC: A security model for electric vehicle and charging pile management based on blockchain ecosystem,” IEEE Access, vol. 6, pp. 13565–13574, 2018

J. Wang et al., “A blockchain based privacy-preserving incentive mechanism in crowdsensing applications,” IEEE Access, vol. 6, pp. 17545–17556, 2018.

F. Tian, “An agri-food supply chain traceability system for China based on RFID & blockchain technology,” in Proc. IEEE 13th Int. Conf. Service Syst. Service Manag. (ICSSSM), Jun. 2016, pp. 1–6.

Z. Li et al., “Consortium blockchain for secure energy trading in industrial Internet of Things,” IEEE Trans. Ind. Informat., vol. 14, no. 8, pp. 3690–3700, Aug. 2018.

T. Ahram, A. Sargolzaei, S. Sargolzaei, J. Daniels, and B. Amaba, “Blockchain technology innovations,” in Proc. IEEE Technol. Eng. Manag. Conf. (TEMSCON), Jun. 2017, pp. 137–141.

J. Gao et al., “GridMonitoring: Secured sovereign blockchain based monitoring on smart grid,” IEEE Access, vol. 6, pp. 9917–9925, 2018.

G. Liang, S. R. Weller, F. Luo, J. Zhao, and Z. Y. Dong, “Distributed blockchain-based data protection framework for modern power systems against cyber attacks,” IEEE Trans. Smart Grid, to be published. [Online]. Available: https://ieeexplore.ieee.org/document/8326530

N. Z. Aitzhan and D. Svetinovic, “Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams,” IEEE Trans. Depend. Secure Comput., vol. 15, no. 5, pp. 840–852, Oct. 2018

T. M. Fernández-Caramés and P. Fraga-Lamas, “A review on the use of blockchain for the Internet of Things,” IEEE Access, vol. 6, pp. 32979–33001, 2018.

Crypto-Currency Market Capitalizations. Accessed: Jun. 15, 2018. [Online]. Available: https://coinmarketcap.comhttps:// coinmarketcap.com

Blockchain Technology Report to the US Federal Advisory Committee on Insurance. Accessed: Jun. 15, 2018. [Online]. Available: https://www.treasury.gov/initiatives/fio/Documents/McKinsey_FACI_B lockchain_in_Insurance.pdf

L. Bahack. (Dec. 2013). Theoretical BitCoin Attacks With Less Than Half of the Computational Power. [Online]. Available: https://arxiv.org/pdf/1312.7013.pdf

M. Ali, J. Nelson, R. Shea, and M. J. Freedman, “Blockstack: A global naming and storage system secured by blockchains,” in Proc. Annu. Tech. Conf. (USENIX ATC), Jun. 2016, pp. 181–194

Sun, J.; Yan, J.; Zhang, K.Z.K. Blockchain-based sharing services: What blockchain technology can contribute to smart cities. Financ. Innov. 2016, 2, 6.

New generalization of reverse Minkowski’s inequality for fractional integral. (2021). Advances in the Theory of Nonlinear Analysis and Its Application, 5(1), 72-81. https://atnaea.org/index.php/journal/article/view/183

Samaniego, M.; Deters, R. Blockchain as a Service for IoT. In Proceedings of the 9th IEEE International Conference on Internet of Things, Chengdu, China, 15–18 December 2016; pp. 433–436.

Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190.

Dhabliya, P. D. . (2020). Multispectral Image Analysis Using Feature Extraction with Classification for Agricultural Crop Cultivation Based On 4G Wireless IOT Networks. Research Journal of Computer Systems and Engineering, 1(1), 01–05. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/10

Kouicem, D.E.; Bouabdallah, A.; Lakhlef, H. Internet of things security: A top-down survey. Comput. Netw. 2018, 141, 199–221.

Meshram, A. A. ., & Abhimanyu Dutonde, A. G. . (2022). A Review of Skin Melanoma Detection Based on Machine Learning. International Journal of New Practices in Management and Engineering, 11(01), 15–23. https://doi.org/10.17762/ijnpme.v11i01.145

Jesus, E.F.; Chicarino, V.R.; de Albuquerque, C.V.; Rocha, A.A.D.A. A survey of how to use blockchain to secure internet of things and the stalker attack. Secur. Commun. Netw. 2018, 2018, 1–27.

Yazdinejad, A., Dehghantanha, A., Parizi, R. M., Srivastava, G., & Karimipour, H. (2023). Secure intelligent fuzzy blockchain framework: Effective threat detection in iot networks. Computers in Industry, 144, 103801.

Rahman, A., Islam, M. J., Band, S. S., Muhammad, G., Hasan, K., & Tiwari, P. (2023). Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT. Digital Communications and Networks, 9(2), 411-421.

Abou El Houda, Z., Hafid, A. S., & Khoukhi, L. (2023). Mitfed: A privacy preserving collaborative network attack mitigation framework based on federated learning using sdn and blockchain. IEEE Transactions on Network Science and Engineering.

Kumar, R., Kumar, P., Tripathi, R., Gupta, G. P., Garg, S., & Hassan, M. M. (2022). A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. Journal of Parallel and Distributed Computing, 164, 55-68.