基于区块链的网络安全体系结构与关键技术研究进展 认领
Research Progress of Network Security Architecture and Key Technologies Based on Blockchain
在线阅读 下载PDF收藏分享导出
摘要随着互联网技术的不断演进与用户数量的“爆炸式”增长,网络作为一项基础设施渗透于人们生存、生活的各个方面,其安全问题也逐渐成为人们日益关注的重点.然而,随着网络规模的扩大以及攻击者恶意行为的多样化、复杂化,传统网络安全体系架构及其关键技术已经暴露出单点信任、部署困难等诸多问题,而具备去中心化、不可篡改等特性的区块链技术为网络安全所面临的挑战提供了新的解决思路.本文从网络层安全、应用层安全以及PKI安全三方面对近几年基于区块链的网络安全体系结构与关键技术研究进行梳理,并将区块链的作用归类为真实存储、真实计算、真实激励三种情形.针对区块链的具体应用领域,本文首先介绍了该领域的安全现状,然后对区块链的具体应用研究进行了介绍,并分析了区块链技术在该领域所存在的优势.本文最后结合现有的解决思路对未来区块链应用中所需要注意的隐私问题、可扩展性问题、安全问题以及区块链结构演进的方向进行了分析,并对未来基于区块链的网络安全体系结构与关键技术研究进行了展望.
With the continuous evolution of Internet technology and the explosively increasing number of users,the Internet has become an integral part of people’s daily life.Therefore,network security has become the focus of attention.Researchers have been doing much research on network security.However,with the expansion of network scale and the diversification of attackers’misbehaviors,some drawbacks have been exposed to traditional network security architecture and its key technologies.Firstly,most of today’s network security infrastructures,such as PKI and RPKI,are realized as a centralized architecture.Therefore,the cybersecurity measures built on the trust in these centralized infrastructures expose a single-point of trust problem.The incidents of DigiNotar hacked to issue the malicious certificate for more than 500 websites and Symantec’s misinformation of more than 30000 certificate extension vouchers all indicate that once incidents occur in these trust centers,it will be a severe impact on the entire Internet.Secondly,since early network architecture designation did not seriously consider security,the deployment of many later proposed security mechanisms will modify existing network protocols and affect network efficiency.Therefore,there are difficulties in the actual deployment of these security mechanisms.Besides,with the advent of the IoT era,the network’s complexity will continue to expand,and network security construction should be participated by many organizations and even the whole people.However,there is a lack of a reliable incentive mechanism to coordinate the cooperation between different organizations and mobilize users’enthusiasm to participate in the network security construction.Nowadays,there is no good solution for these disadvantages,but emerging technology blockchain provides new solutions.Blockchain is a trustworthy distributed database that integrates P2P technology,cryptography,consensus mechanism,and distributed storage technology.Because of blockchain’s characteristics such
作者徐恪 凌思通 李琦 吴波 沈蒙 张智超 姚苏 刘昕 李琳
XU Ke;LING Si-Tong;LI Qi;WU Bo;SHEN Meng;ZHANG Zhi-Chao;YAO Su;LIU Xin;LI Lin(Department of Computer Science and Technology,Tsinghua University,Beijing 100084;Beijing National Research Center for Information Science and Technology,Beijing 100084;Institute for Network Science and Cyberspace,Tsinghua University,Beijing 100084;Peng Cheng Laboratory,Shenzhen,Guangdong 518000;2012 Labs,Huawei Technology Co.Ltd.,Beijing 100085;School of Computer Science,Beijing Institute of Technology,Beijing 100081;Migu Culture Technology Co.,Ltd,Beijing 100088)
机构地区清华大学计算机科学与技术系 北京信息科学与技术国家研究中心 清华大学网络科学与网络空间研究院 鹏城实验室 华为技术有限公司2012实验室 北京理工大学计算机学院 咪咕文化科技有限公司
出处《计算机学报》 EI 北大核心 2021年第1期55-83,共29页
Chinese Journal of Computers
基金国家重点研发计划课题(2018YFB0803405) 国家杰出青年科学基金(61825204) 国家自然科学基金(61932016,61802222) 北京高校卓越青年科学家计划项目(BJJWZYJH101201910003011) 国家研究中心项目(BNR2019RC01011) 鹏城实验室大湾区未来网络试验与应用环境项目(LZC0019) 华为技术有限公司委托项目(IIF2019015003)资助
关键词区块链 网络安全体系结构 网络层安全 应用层安全 PKI安全
blockchain network security architecture network-layer security application-layer security PKI security
分类号TP393 [自动化与计算机技术—计算机应用技术]
相关文献
1崔中杰.针对区块链的网络层攻击与防御技术综述[J].信息安全研究,2020,6(11):982-989.
2张宇涵,薛质,施勇,吴毅良.基于LSTM和TF-IDF的反弹Shell检测方法[J].通信技术,2020,53(12):3046-3050.
3张梦旭.美司法部“中国行动”来势汹汹[J].中国故事:纪实,2020(10):16-18.
4滕海波,薛井俊,张明希,侯煜,高兴.调水控制密码应用研究[J].水利信息化,2020(6):21-26.
5唐汉卫.在线教学存在的伦理问题与应对策略[J].现代教育技术,2020,30(12):41-47.
6胡鹏扬,杨院.我国博士生招生规模及结构的演进历程、逻辑与展望[J].山东高等教育,2020,8(5):39-46.
7马天一.APP违法违规收集使用个人信息的刑事责任边界[J].网络空间安全,2020,11(12):1-6.
8赵双阁,史雅楠.遮蔽与解蔽:社交时代自拍传播叙事中的形象建构[J].西南政法大学学报,2020,22(5):68-80.
9张明旺,肖延辉,田华伟,郝昕泽,李丽华.图像中的设备指纹提取技术研究综述[J].激光与光电子学进展,2020,57(22):31-40.
文章评论