Research on Block Chain Network Intrusion Detection System
Title | Research on Block Chain Network Intrusion Detection System |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Zhan, Xin, Yuan, Huabing, Wang, Xiaodong |
Conference Name | 2019 International Conference on Computer Network, Electronic and Automation (ICCNEA) |
Date Published | Sept. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-3977-7 |
Keywords | Block Chain, block chain network intrusion detection system, block chain network intrusion privacy, block chain network intrusion security, blockchain, Communication system security, composability, computer network security, detection system, Intrusion detection, Intrusion Detection Systems, intrusion tolerance, Metrics, Monitoring, network intrusion, network intrusion detection, pubcrawl, resilience, Resiliency, system security, Wireless communication, WLAN |
Abstract | With the development of computer technology and the popularization of network, network brings great convenience to colleagues and risks to people from all walks of life all over the world. The data in the network world is growing explosively. Various kinds of intrusions are emerging in an endless stream. The means of network intrusion are becoming more and more complex. The intrusions occur at any time and the security threats become more and more serious. Defense alone cannot meet the needs of system security. It is also necessary to monitor the behavior of users in the network at any time and detect new intrusions that may occur at any time. This will not only make people's normal network needs cannot be guaranteed, but also face great network risks. So that people not only rely on defensive means to protect network security, this paper explores block chain network intrusion detection system. Firstly, the characteristics of block chain are briefly introduced, and the challenges of block chain network intrusion security and privacy are proposed. Secondly, the intrusion detection system of WLAN is designed experimentally. Finally, the conclusion analysis of block chain network intrusion detection system is discussed. |
URL | https://ieeexplore.ieee.org/document/8912102 |
DOI | 10.1109/ICCNEA.2019.00045 |
Citation Key | zhan_research_2019 |
- intrusion tolerance
- WLAN
- Wireless communication
- system security
- Resiliency
- resilience
- pubcrawl
- network intrusion detection
- network intrusion
- Monitoring
- Metrics
- Block Chain
- Intrusion Detection Systems
- Intrusion Detection
- detection system
- computer network security
- composability
- Communication system security
- blockchain
- block chain network intrusion security
- block chain network intrusion privacy
- block chain network intrusion detection system