TECHNIQUES AND RESEARCH DIRECTION OF 5IRECHAIN SECURITY AND PRIVACY

Authors: Vilma Mattila, Pratik Gauri, Prateek Dwivedi, Dhanraj Dadhich & Md Ahbab

ABSTRACT

With the growing interest in blockchain in both academic research and industry, the security and privacy of blockchains have attracted huge interest, even though only a small part of the blockchain platforms can achieve the set of abovementioned security goals in practice. Leveraging from the state-of-the-art security paradigms, we propose 5irechain protective covering which has the ability to continuously identify, map, scan, assess, and grade the risk portfolio of all the assets, vendors, and acquisitions of a company giving a hackers perspective to the company. The dashboard gives visibility of not just only the web2 infrastructure in place, but also covers the web3 space and allows 5ire to monitor all of its nodes and their activities including historical data, tracking large wallets, monitoring bot activity, detecting transaction stats and volume along with the ability to block possible large scale attacks.

Keywords: 5irechain; Data Security; Blockchain Solutions; web3

REFERENCES

  • Benet, Juan. “IPFS-content addressed, versioned, P2P file system (DRAFT 3).” arXiv preprint arXiv: 1407.3561, 2014.
  • Berkowsky, Jake A., and Thaier Hayajneh. “Security issues with certificate authorities.” In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 449-455. IEEE, 2017.
  • Chung, Christina Yip, Michael Gertz, and Karl Levitt. “Demids: A misuse detection system for database systems.” In Working Conference on Integrity and Internal Control in Information Systems, pp. 159-178. Springer, Boston, MA, 1999.
  • Datta, Sreemana, Ayan Kumar Das, Abhijeet Kumar, and Ditipriya Sinha. “Authentication and privacy preservation in IoT based forest fire detection by using blockchain–a review.” In International Conference on Internet of Things and Connected Technologies, pp. 133-143. Springer, Cham, 2019.
  • Dib, Omar, Clément Huyart, and Khalifa Toumi. “A novel data exploitation framework based on blockchain.” Pervasive and Mobile Computing, 2020.
  • F. Barrera, C. Vargas, M. Tebaldi and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system”, Opt. Commun., vol. 283, no. 20, pp. 3917-3921, Oct. 2010.
  • Khan, Minhaj Ahmad, and Khaled Salah. “IoT security: Review, blockchain solutions, and open challenges.” Future generation computer systems 82, 395-411. 2018.
  • Lee, Wenke, and Dong Xiang. “Information-theoretic measures for anomaly detection.” In Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp. 130-143. IEEE, 2000.
  • Lin Chen, Lei Xu, Nolan Shah, Zhimin Gao, Yang Lu, and Weidong Shi. On security analysis of proof-of-elapsedtime (PoET). In Stabilization, Safety, and Security of Distributed Systems. 282–297, 2017.
  • Peng, L.: DAIS: A real-time data attack isolation system for commercial database applications. In: 17th Annual Computer Security Applications Conference (ACSAC 2001), pp. 219–229. IEEE Press, New Orleans, 2001.
  • Peter Bogetoft et al., Secure multiparty computation goes live. In FC, 325–343, 2009.
  • Saad, Muhammad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, and Aziz Mohaisen. “Exploring the attack surface of blockchain: A systematic overview.” arXiv preprint arXiv. 2019.
  • Saleh, Fahad. “Blockchain without waste: Proof-of-stake.” The Review of financial studies 34, 1156-1190, no. 3, 2021.