Next Article in Journal
Improving Recommendation Accuracy Using Social Network of Owners in Social Internet of Vehicles
Next Article in Special Issue
Digital Cloud Environment: Present Challenges and Future Forecast
Previous Article in Journal
Semantic Search Enhanced with Rating Scores
Previous Article in Special Issue
Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec
Open AccessArticle

Blockchain Behavioral Traffic Model as a Tool to Influence Service IT Security

1
Infocommunication Systems Department, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, 193232 Saint Petersburg, Russia
2
Center Macro-regional Branch or PJSC Rostelecom, 123298 Moscow, Russia
*
Author to whom correspondence should be addressed.
Future Internet 2020, 12(4), 68; https://doi.org/10.3390/fi12040068
Received: 25 March 2020 / Revised: 13 April 2020 / Accepted: 14 April 2020 / Published: 15 April 2020
The present article describes the behavioral model of blockchain services; their reliability is confirmed on the basis of experimental data. The authors identify the main technical characteristics and features associated with data transmission through the network. The authors determine the network scheme, working with blockchain transactions and the dependence of network characteristics on application parameters. They analyze the application of this model for the detection of the blockchain service and the possibility of the existing security mechanisms of this technology being evaded. Furthermore, the article offers recommendations for hiding the blockchain traffic profile to significantly complicate its identification in the data network. View Full-Text
Keywords: blockchain; distributed registry; security; data protection; network; decentralized systems blockchain; distributed registry; security; data protection; network; decentralized systems
Show Figures

Figure 1

MDPI and ACS Style

Elagin, V.; Spirkina, A.; Levakov, A.; Belozertsev, I. Blockchain Behavioral Traffic Model as a Tool to Influence Service IT Security. Future Internet 2020, 12, 68.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop