Abstract
Block chain is a decentralized core architecture, which is widely used in emerging digital encryption currencies. It has attracted much attention and has been researched with the gradual acceptance of bitcoin. Block chaining technology has the characteristics of centralization, block data, no tampering and trust, so it is sought after by enterprises, especially financial institutions. This paper expounds the core technology principle of block chain technology, discusses the application of block chain technology, the existing regulatory problems and security problems, so as to provide some help for the related research of block chain technology. Intrusion detection is an important way to protect the security of information systems. It has become the focus of security research in recent years. This paper introduces the history and current situation of intrusion detection system, expounds the classification of intrusion detection system and the framework of general intrusion detection, and discusses all kinds of intrusion detection technology in detail. Intrusion detection technology is a kind of security technology to protect network resources from hacker attack. IDS is a useful supplement to the firewall, which can help the network system to quickly detect attacks and improve the integrity of the information security infrastructure. In this paper, intrusion detection technology is applied to block chain information security model, and the results show that proposed model has higher detection efficiency and fault tolerance.
Similar content being viewed by others
Change history
05 December 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s10586-022-03895-7
References
Zheng, X., Ge, B.: The evolution trend of information management of supply chain in China under the information environment. Inf. Sci. 10, 128–133 (2016)
Nakamoto S. Bitcoin: a peer-to-peer electronic cash system[EB/OL]. o
Ping, Z., Yu, D., Bin, L.: Chinese Block Chain Technology and Application Development White Paper. Ministry of Industry and Information Technology, Beijing (2016)
Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media Inc, Sebastopol (2015)
Zhao, H., Li, X.F., Zhan, L.K., et al.: Data integrity protection method for icroorganism sampling robots based on blockchain technology. J. Huazhong Univ. Sci. Technol. 43(Z1), 216–219 (2015)
Swan, M.: Block chain thinking: the brain as a decentralized auto nomous corporation. IEEE Technol. Soc. Mag. 34(4), 41–52 (2015)
Godsiff, P.: Bitcoin: bubble or blockchain. In: The 9th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications (KESAMSTA), vol. 38, pp. 191–203 (2015)
Wilson, D., Ateniese, G.: From pretty good to great: enhancing PGP using Bitcoin and the blockchain. In: The 9th International Conference on Network and System Security, New York, pp. 358–379 (2015)
Kypriotaki, K.N., Zamani, E.D., Giaglis, G.M.: From Bitcoin to decentralized autonomous corporations: extending the application scope of decentralized peer-to-peer networks and block chains. In: The 17th International Conference on Enterprise Information Systems (ICEIS2015), pp. 280–290 (2015)
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
President’s Council of Advisors on Science and Technology. Leadership Under Challenge. Information Technology R&D in a Competitive World, An Assessment of the Federal Networking and Information Technology Program[EB/OL] (2017). https://www.ostpgov/pdf/nitrd_review.pdf
International Telecommunication Union. ITU Internet Reports 2005: The Internet of Things (2005)
Petrovic, D., Shah, R.C., Ramchandran, K.: Data funneling: routing with aggregation and compression for wireless sensor networks. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (SNPA’03). Seattle, USA, pp. 140–168 (2003)
Yuan, Y., Kam, M.: Distributed decision fusion with a random access channel for sensor network applications. IEEE Trans. Instrum. Meas. 53(4), 1239–1320 (2004)
Tan, H., Korpeoglu, I.: Power efficient data gathering and aggregation in wireless sensor networks. ACM SIGMOD Record 32(4), 50–89 (2003)
Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania (1980)
Denning, D.E.: An intrusion -detection model. IEEE Trans. Softw. Eng. 13(2), 220–235 (1987)
Aurobindo, S.: An introduction to intrusion detection. ACM Crossorads 2(4), 3–7 (1996). http://www.acm.org/crossroads/xrds2-4/intrus.html
Chen, Q., Zhang, G., Yang, X., et al.: Single image shadow detection and removal based on feature fusion and multiple dictionary learning. Multimed. Tools Appl. (2017). https://doi.org/10.1007/s11042-017-5299-0
Desai, A.S., Gaikwad, D.P.: Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA. In: 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT), pp. 291–294 (2016)
Aburomman, A.A., Reaz, M.B.I.: A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl. Soft Comput. 38, 360–372 (2016)
Zhang, Y., Wang, H., Xie, Y.: An intelligent hybrid model for power flow optimization in the cloud-IOT electrical distribution network. Clust. Comput. (2017). https://doi.org/10.1007/s10586-017-1270-0
Anwar, S., Mohamad Zain, J., Zolkipli, M.F., Inayat, Z., Khan, S., Anthony, B., Chang, V.: From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms 10(2), 39 (2017)
Haider, W., Hu, J., Slay, J., Turnbull, B.P., Xie, Y.: Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. J. Netw. Comput. Appl. 87, 185–192 (2017)
Sedjelmaci, H., Senouci, S.M., Ansari, N.: Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: a Bayesian game-theoretic methodology. IEEE Trans. Intell. Transp. Syst. 18(5), 1143–1153 (2017)
Cai, Z., Deng, L., Li, D., et al.: A FCM cluster: cloud networking model for intelligent transportation in the city of Macau. Clust. Comput. (2017). https://doi.org/10.1007/s10586-017-1216-6
Bostani, H., Sheikhan, M.: Modification of supervised OPF-based intrusion detection systems using unsupervised learning and social network concept. Pattern Recogn. 62, 56–72 (2017)
Zhang, S., Wang, H., Huang, W.: Two-stage plant species recognition by local mean clustering and weighted sparse representation classification. Clust. Comput. 20, 1517 (2017). https://doi.org/10.1007/s10586-017-0859-7
Wang, H., Wang, J.: An effective image representation method using kernel classification. In: IEEE 26th International Conference on Tools with Artificial Intelligence (ICTAI), pp. 853–858 (2014)
Nair, R., Nayak, C., Watkins, L., Fairbanks, K.D., Memon, K., Wang, P., Robinson, W.H.: The resource usage viewpoint of industrial control system security: an inference-based intrusion detection system. In: Cybersecurity for Industry 4.0, pp. 195–223. Springer, New York (2017)
Dhillon, H.S., Huang, H., Viswanathan, H.: Wide-area wireless communication challenges for the Internet of Things. IEEE Commun. Mag. 55(2), 168–174 (2017)
Pramudianto, F., Eisenhauer, M., Kamienski, C.A., Sadok, D. and Souto, E.J.: Connecting the internet of things rapidly through a model driven approach. In: IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 135–140 (2016)
Deng, L., Li, D., Yao, X., Cox, D., Wang, H.: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Clust. Comput. 1–16 (2018)
Li, D., Deng, L., Gupta, B.B., Wang, H., Choi, C.: A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf. Sci. (2018)
Acknowledgements
This research is financially supported by the Project of Macau Foundation (No. M1617): The First-phase Construction of Big-Data on Smart Macao.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Li, D., Cai, Z., Deng, L. et al. RETRACTED ARTICLE: Information security model of block chain based on intrusion sensing in the IoT environment. Cluster Comput 22 (Suppl 1), 451–468 (2019). https://doi.org/10.1007/s10586-018-2516-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2516-1