Block chain Technology is spread all over the world in various sectors. Blockchain Technology is transparent in various areas such as supply chain management, international payment, interbanking, and so on. Recently rapid increase is reported in incidents of scrutiny and security breaches compromising users’ privacy call which leads into question about blockchain technology security. These days due to excessive usage of e and m i.e; internet and mobile third-parties collect and control massive amounts of personal data and transaction.
This paper provides a review regarding the intersection of dangers ,malicious attack ,Cyber crime and risks relying on blockchains. This paper we describe, explore and analyze the security issues and highlight several attacks that might be occurred in the proposed system. Is blockchain technology capable to fight against the malicious online activity i.e. blockchain technology is safe or not?
Blockchain is transparent and decentralized distributed database technology which is used in various sectors like supply chain management, international payment, Internet banking.
A blockchain is a is a discrete database records or public guideline of all the transactions or digital events that have been implemented among all the participating parties .Blockchain extent approval ideal deals with brokers by way of the Internet itself. The blockchain contains a valuable records of every single transaction which made by user. Blockchain technology is best described as one that enables records to be shared by all network nodes, updated by miners, monitored by everyone, and owned and controlled by no one.Blockchain called as the backbone of the whole crypto-currency system. The Blockchain is typically accessed by a peer-to-peer network, observing to a protocol for validating original chunks. Once recorded, the data in any given chunk cannot be altered retroactively without the modification of all blocks and knowledge of the network majority. Bitcoins are a crypto-currency and digital payment system. Bitcoins exist only in the cloud, like Paypal, Citrus or Paytm. Even though they are virtual, rather than physical, they are used like cash when transferred between people through the internet.Blockchain technology and the bitcoin have today become a similar platform where societies have been carrying out their normal transactions.
All online transactions rely on trusting someone to verify the truth it can be a certification authority telling us certain digital certificate is trustworthy,a bank telling us that a financial remittance has been deliveredreliably to a creditor ,an email services provider verifying that our email has been delivered ,or a social network such as posting of life events on social network like Facebook.The real fact is that we live our life precariously in the digital world by relying on a central trusted entity for the security and privacy of our digital assets.These third party sources can be hacked and hateful attack.Although blockchain technology prevents several types of hateful attacks and reduces many risks, it does not remove all types of attacks . This paper has review the blockchain technology for identifying online fraud, identifies certain fraud and malicious activities that the blockchain technology can effectively prevent, and makes recommendations for strategically fighting various attacks to which blockchain technology may be weak. Further research is necessary to recover the technology and related anti-attack measures for digital identity theft, money laundering, and hacking.
Block chain Network
The block chain is the source of where the data is stored and all old transactions are secure transactions by storing them in a Merkle Tree   that prevents an operation can be carried out for duplicate or without the corresponding funds or double spent. – Mining  .The mining process is unique and is the basis for the creation of the block chain and the generation of new currency. No mining there is no way to guarantee blocks consistency. Also, this method provides satisfaction to BitCoin generating new currency. BlockChain, makes it very attractivetechnology to solve the current Financial as well as non-financial business problems.A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Now a days cyber-attacks have become even more complicated and advanced. The evolution of crypto currency and Blockchain technology has been so prompt, that even those who haven’t listen and knowledge about crypto-currency or blockchain. . Fig 1: HowBlockchain Technology Works Features of Block chain technology: SHA256 Hash Function: Hash function is useful for a one-way’ cryptographic function, the output is not encryption’ i.e it cannot be decrypted back to the original text. Public Key Cryptography: This technique helpful for the user to create a set of keys referred as Public key and Private Key. In this technique, Public key is shared with others whereas the Private Key is kept as a secret by the user. Distributed Ledger & Peer to Peer Network: All the blocks of data is spread among all users by Blockchain technology , i.e., the ledger has no main location where it is stored. Every user are on the network having their own a copy of the ledger.
Proof of Work: The online message has a unique identity .It gives us proof of ownership of document, online successfulpayment message. It gives the proof that the transaction is genuine.
Types of Blockchain:Blockchain technology can be implemented public, private and semi-private sector .Private blockchain offers fast transaction and peer to peer network communication that give facility who has access to the data at any time. Two types of developers are responsible for block chain technology Core Blockchain Developers and Blockchain Software Developers.Core Blockchain Developer: Developer developed the design, architecture, and security of a blockchain systemof whole entire network
Blockchain Software Developer: Blockchain Software Developers have different roles. To build applications for Smart Smart Contracts, front-end designs. Blockchain technology can be implemented in public, private and semi private sector. Private blockchain offers fast transaction and peer to peer network communication that give facility who has access to the data at any time. Two types of developers are responsible for block chain technology Core Blockchain Developers and Blockchain Software Developers.
They provide transactions are absolute .Public block chain can hide the actions of user transaction.An designer liable for evolving and optimizing blockchain protocols, crafting the architecture of blockchain systems, developing smart contracts and web apps using blockchain technology are commonly called blockchain developer,but somewhere between the two private and semiprivate sector block chain developers chose public and private blockchain. That time Government which are not responsible for implementations of blockchain ,limiting the users who may participate in the blockchain and bitcointechnology. Blockchain technology includes features necessary for creating trust inan information system namely many unknown stakeholders, fraud and a missingcommon framework, lack of transparency, and different IT capabilities.Therefore, it is essential to consider carefully, in which cases the use of blockchain makes sense. Personal data, and sensitive data in general, should not be trusted in the hands of third-parties, where they are susceptible to attacks and misuse.I
Risks for Blockchain Technology
In addition to that blockchain technology is best described as onethat enables records to be shared by all network nodes, updated by miners, block chain technology may offer ,an understanding of the attendant risks and dangers is necessary.Blockchain technology enables decentralized, trustless, encrypted transactions and events to be recorded and stored publicly, optimists believe it can prevent online fraud and attacks . To assess these capabilities of blockchain technology, first check existingtechniques for battling malicious attacks in cyberspace.
- 1)Double Spending: Double-spending happened when someone make s more than one payment by using blockchain and bitcoin technology in peer to peer network . During this payment time many nodes receive unconfirmed transactions. The most worrisome is the possibly ,one mining entity grab all control of the blockchain and double spend previously transactions. In peer to peer network records new transactions while double spending which itself may suffer from corruptive, fraudulent, malicious, or illegal activitiesoriginated from inside, the trustless feature of blockchain reduces the risks and possiblelosses attendant to third-parties.
- 2)Record hacking: The process of verifying successful transaction is performed by agent is called miner who use their mathematical equations. This mathematical design code use in blockchain technology and bitcoin . The difficulty of mathematical equations is spread which is used in blockchain technology, considering this only limited power is give to miners .otherwise miners to crack down on the industry.
- 3)51% Attack: Government has some incentatives to manipulate transactions ,the government can introduce delays in the validation step ,allowing government backed mining entities to provide time starps or to manipulate the majority consensus rule when 51% malicious attack. Government only allows limited assess only private and semiprivate blockchain transparency.
- 4) Identity Theft: Although blockchains preserve anonymity and privacy, the security of assets dependson safeguarding the private key, a form of digital identity. If one’s privatekey is acquired or stolen, no third party can recover it. Consequently, all the assetsthis person owns in the blockchain will vanish, and it will be nearly impossible to identify the thief .
- 5) Illegal activities:Blockchain technology can become a place for misconduct. Bitcoin used as Cryptocurrency that uses inblockchain technology for transfer money from one account to another.
- 6)System hacking: It is difficult to find out to hack and alter records stored in a blockchain, but not the programmingcodes and systems that implement its technology.MaliciousAttack Definition Defensive & Preventive MeasuresDoubleSpending An individual makes more than one payment using onebody of funds.
The complexity of the miningprocess.RecordHacking Records in the ledger are modified or fraudulentTransactions are inserted into the ledger. Distributed consensus51%Attack A single miner node with more computational resources(51%) than the rest of the network nodes dominates theverification and approval of transactions. Detection techniques; wide adoption of the blockchain technologyIdentityTheft The private key of an individual is stolen. Identify and reputation blockchainsIllegalActivities Parties transact illegal goods or commit money laundering. Detection techniques; laws and regulationsSystemHacking The programming codes and systems that implement ablockchain are compromised. Robust systems and advanced intrusion detection methods. Table 1: Malicious attacks to blockchain and defensive measures
Personal data, and sensitive data in general, should not be trusted in the hands of third-parties,data, since it is computationally tamper-proof.Although blockchain technology prevents fraudulent behaviors, it cannot detect fraud by itself. For this existing system monitored and detected by supervised machine learning and data mining algorithm which is based on patterns. Todetect outliers by using deep-learning neural networks, support vector machines, and Bayesian belief networks for fighting various malicious attacks to which blockchain may be become at risk. Government understand mechanisms and impacts of blockchain technology and improve government laws, polices and regulations to govern the use of blockchain technology.
 Sandi Rahmadika1, Diena Rauda Ramdania2, Maisevli Harika3 Security Analysis on the Decentralized Energy Trading System Using Blockchain Technology JOIN (Jurnal Online Informatika) Volume 3 No. 1 June 2018 : 44-47 DOI: 10.15575/join.v3i1.207 Yinxin Yan, Bin Duan, Member, IEEE, Ying Zhong, Xiangshuai Qu Blockchain technology in the Internet Plus: The collaborative development of power electronic devices IEEE 2017 WEIZHI MENG 1, (Member, IEEE), ELMAR WOLFGANG TISCHHAUSER1, QINGJU WANG1,YU WANG 2, AND JINGUANG HAN3, (Member, IEEE) When Intrusion Detection Meets Blockchain Technology: A Review SPECIAL SECTION ON RESEARCH CHALLENGES AND OPPORTUNITIES IN SECURITYAND PRIVACY OF BLOCKCHAIN TECHNOLOGIES Christopher G. Harris, Risk and danger on relying on Blockchain Technology in Underdeveloped countries @ IEEE  Thomas F Heston A BLOCKCHAIN SOLUTION TO GUN CONTROL INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH Volume-7 | Issue-3 | March-2018 | ISSN No 2277 – 8179 | IF : 4.758 | IC Value : 93.98 BlockChain Technology Beyond Bitcoin Sutardja Center for Entrepreneurship & Technology Technical Report Tom Redshaw Bitcoin beyond ambivalence: Popular rationalization and Feenberg’s technical politics Thesis Eleven 2017, Vol. 138(1) 46″64 Є The Author(s) 2017 Jennifer J. Xu Are blockchains immune to all malicious attacks? Xu Financial Innovation (2016) 2:25 DOI 10.1186/s40854-016-0046-5 Emmanuelle Anceaume, Romaric Ludinard, Bruno Sericola Relying on Consensus does not Make Bitcoin Safer 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2016, Toulouse, France Roman Beck1, Christian Becker2, Juho Lindman3, and Matti Rossi4 Opportunities and Risks of Blockchain TechnologiesReport from Dagstuhl Seminar 17132 Albert Molina Pascal Coin: Crypto currency without need of historical operations Pascal Coin White Paper v1.0 ” July/2016 S Cheng1, B Zeng1 and Y Z Huang1 Corrigendum: Research on application model of blockchain technology in distributed electricity market NEFES 2017 IOP Publishing IOP Conf. Series: Earth and Environmental Science 93 (2017) 012065 doi:10.1088/1755-1315/93/1/012065 Filippo Valsorda Exploiting ECDSA Failures in the Bitcoin Blockchain Guy Zyskind, Oz Nathan, Alex ‘Sandy’ Pentland Decentralizing Privacy: Using Blockchain to Protect Personal Data 2015 IEEE CS Security and Privacy Workshops Tomer Golomb, Yisroel Mirsky and Yuval Elovic CIoTA: Collaborative IoT Anomaly Detection via Blockchain
Cite this essay
When Malicious Attacks Meets Blockchain Technology: An Insight. (2019, Aug 20). Retrieved from https://studymoose.com/when-malicious-attacks-meets-blockchain-technology-an-insight-essay