Nuggets tagged network - [remove filter]

Feb. 24, 2016 (1 year, 5 months ago)

Byzcoin - Bitcoin protocol improvements for low latency transactions

Bitcoin is a decentralized cryptocurrency providing an open, self-regulating alternative to classical currencies. Bitcoin uses a peer-to-peer network where users submit transactions without intermediaries. Bitcoin miners collect transactions, solve computational puzzles (proof-of-work) to reach consensus, and add the transactions to a distributed public ledger known as the blockchain. The original Bitcoin paper argues that transaction processing is secure and irreversible as long as the largest colluding group of miners represents less than 50% of total computing capacity and at least about one hour has elapsed. Critically this transaction latency limits Bitcoin's suitability for real-time transactions, furthermore recent work has exposed vulnerabilities to transaction reversibility, double-spending, and strategic mining attacks. This paper introduces ByzCoin, a novel protocol that leverages scalable collective signing to commit Bitcoin transactions irreversibly within seconds.

Oct. 13, 2015 (1 year, 10 months ago)

Diversity Reduces the Impact of Malware

The internet in general is typically diverse, from the perspective of malware attacks, due to distinct configurations, firewall rules, antimalware signature sets, intrusion detection, and router policies etc. However many networks still have limited internal diversity, making them vulnerable to malware spreading. Diversity can provide a malware-halting technique and this paper models the spreading of infectious malware over networked computing devices using a model comprising a simple graph with N nodes of L types. A good measure of a model's diversity is the number of node types L. Nodes of the same type share an exploitable vulnerability, whereas nodes of different types have no common exploitable vulnerability. An epidemiological model represents the spreading phase of multi-malware outbreaks. The analysis of this phase establishes a lower bound on the diversity L needed by various halting techniques proposed for spreading networks with three different topologies: i)Sparse and homogeneous, ii) Sparse and inhomogeneous, iii) Dense and homogeneous.

July 9, 2014 (3 years, 1 month ago)

Multiattribute SCADA-Specific Intrusion Detection System for Power Networks

This paper is behind a paywall. The abstract claims a novel approach to SCADA IDS based on multi-attributes but does not say what those attributes are. It also claims a ‘comprehensive solution to mitigate varied cyberattack threats’. Information is limited in the abstract but there is little indication that major progress can be found in the full paper.