ログイン
Language:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 学会・会議発表論文
  2. 学会・会議発表論文

Blockchain-based Architecture for Interdomain Cybersecurity Research

http://hdl.handle.net/10228/00008248
http://hdl.handle.net/10228/00008248
97639aa1-597e-482c-bb0c-6196ca2dc25e
名前 / ファイル ライセンス アクション
RECN_2020-19.pdf RECN_2020-19.pdf (148.0 kB)
アイテムタイプ 会議発表論文 = Conference Paper(1)
公開日 2021-05-13
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_5794
資源タイプ conference paper
タイトル
タイトル Blockchain-based Architecture for Interdomain Cybersecurity Research
言語 en
言語
言語 eng
著者 Ajayi, Oluwaseyi

× Ajayi, Oluwaseyi

WEKO 30431

en Ajayi, Oluwaseyi

Search repository
Saadawi, Tarek

× Saadawi, Tarek

WEKO 30432

en Saadawi, Tarek

Search repository
光来, 健一

× 光来, 健一

WEKO 20772
e-Rad_Researcher 60372463
Scopus著者ID 12143198700
ORCiD 0000-0002-5455-4418
九工大研究者情報 303

en Kourai, Kenichi

ja 光来, 健一

ja-Kana コウライ, ケンイチ

Search repository
鶴, 正人

× 鶴, 正人

WEKO 5853
e-Rad 40231443
Scopus著者ID 7005093872
ORCiD 0000-0001-7340-6798

ja 鶴, 正人


en Tsuru, Masato

ja-Kana ツル, マサト

Search repository
抄録
内容記述タイプ Abstract
内容記述 We designed and developed a novel application that applies blockchain technology in cybersecurity. This architecture allows different companies to come together to promptly exchange cyberattack information in a secure way to detect coordinated or distributed attacks. In addition to this, the architecture allows the public node to connect to the blockchain network and retrieve the stored attack information in real-time. The processes involved in exchanging the attack information are: (i) extraction of the attack information, (ii) preparing and submitting it as transactions to a blockchain network, (iii) verification of the submitted information, (iv) validation and chaining the transaction to blockchain and (v) distribution to other blockchain nodes. The novelty in the proposed work is that the architecture facilitates scalable and secured attack features exchange and ensures the integrity and consistency of the shared features. Furthermore, it detects and prevents malicious activities on the stored data from both outsider and insider threats, it presents the features in a standard format which encourages heterogeneous IDS nodes participation, and finally, it is robust to public IDS nodes joining and leaving the blockchain network.
備考
内容記述タイプ Other
内容記述 US-Japan binational research community Workshop on Programmable Networking, November 16-18, 2020 (US dates), online
書誌情報
発行日 2020-11
出版タイプ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
査読の有無
値 yes
連携ID
値 8827
戻る
0
views
See details
Views

Versions

Ver.1 2023-05-15 13:21:43.320021
Show All versions

Share

Share
tweet

Cite as

Other

print

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX
  • ZIP

コミュニティ

確認

確認

確認


Powered by WEKO3


Powered by WEKO3