Skip to main content

Blockchain, TTP Attacks and Harmonious Relationship with AI

  • Chapter
  • First Online:
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity

Abstract

Blockchain and decentralised distributed ledger technologies are being viewed as a mechanism to provide further protection and enhance the security of data by using its properties of immutability, auditability and encryption whilst providing transparency amongst parties who may not know each other; so, operating in a trustless environment. It’s true that blockchain has its roots in cryptocurrency applications and is still evolving for that purpose in the financial sector, but many other organisations across different industries are beginning to see the non-crypto use cases where this mechanism to record data that cannot be changed or reversed or apply as smart contracts (as a way to time-stamp transactions between parties) is becoming extremely relevant and purposeful. A variety of industry sectors, besides Finance, has undertaken the use of these distributed technologies and beneficial attributes of blockchain from the healthcare and pharmaceutical, real estate, retail and supply chain, legal and publishing. Organisations have flexible options to run blockchain as permissionless (anyone can join), permissioned (where those need to be invited) or hybrid (a consortium type) and whether data should be held on-chain or off-chain. With industry entering its fourth industrial revolution (Industry 4.0) the addition of blockchain as a complimentary technology has its place and there are some industries very suited to the significant impact it may bring. Also, the advances of Internet of Things, Machine Learning and Artificial Intelligence has meant more pressures on potential impacts to data and the ripple effects that cyber-attacks may cause. This has also become complicated, as cyber-attacks have become much more sophisticated over recent years with the different configuration types and various industry sectors have suffered from a range of these different attack vectors, resulting in some devastating outcomes. These have manifested in the shape of ransomware, malware, manipulation methods, phishing and spear-phishing. Whilst data breaches are a serious incident, in most organisations, there is a growing concern regarding attacks that are designed to have a more destructive effect such as the Ukraine cyber-attack in 2015 that resulted in a shutdown of the power grid or the WannaCry ransomware attack in 2017 that caused widespread chaos with healthcare institutions unable to carry out any tasks since access to data/systems was unavailable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Corea F (2017) The convergence of AI and Blockchain: what’s the deal? Medium. Available at: https://medium.com/@Francesco_AI/the-convergence-of-ai-and-blockchain-whats-the-deal-60c618e3accc. Accessed 10 Aug 2019

  2. Dong Z, Lou F, Liang G (2018) Blockchain: a secure, decentralized, trusted cyber infrastructure solution for future energy systems. Mod Power Syst Clean Energy 6(5):958–967. Available at: Doi: https://doi.org/10.1007/s40565-018-0418-0. Accessed 10 Aug 2019

    Article  Google Scholar 

  3. Engelhardt M (2017) Hitching healthcare to the chain: an introduction to Blockchain technology in the healthcare sector. Technol Innov Manag Rev 7(10):22–34. Available at: https://doi.org/10.22215/timreview/1111. Accessed 10 Aug 2019

    Article  Google Scholar 

  4. Huchins M (2017) Britain knew the risks, says ex-military chief. The Times, 16 May, pp 14–15. Available at: https://www.thetimes.co.uk/article/britain-knew-the-risks-says-ex-military-chief-hz2lpfvfl. Accessed 14 Aug 2019

  5. IBM Global Business Services (2016) Blockchain: the chain of trust and its potential to transform healthcare. [Online]. Available at: https://www.healthit.gov/sites/default/files/8-31-blockchain-ibm_ideation-challenge_aug8.pdf. Accessed 10 Aug 2019

  6. Mansfield-Devine S (2016) Ransomware: taking businesses hostage. Netw Secur 2016(10):8–17. [Online]. Available at: https://doi.org/10.1016/S1353-4858(16)30096-4. Accessed 1 Aug 2019

    Article  Google Scholar 

  7. Marr B (2018) The wonderful ways artificial intelligence is transforming genomics and gene editing. Forbes. [Online]. Available at: https://www.forbes.com/sites/bernardmarr/2018/11/16/the-amazing-ways-artificial-intelligence-is-transforming-genomics-and-gene-editing/#70e819a642c1. Accessed 10 Aug 2019

  8. Mattei TA (2017) Privacy, confidentiality, and security of health care information: lessons from the recent WannaCry cyberattack. World Neurosurg 104:972–974. Available at: https://doi.org/10.1016/j.wneu.2017.06.104. Accessed 10 Aug 2019

    Article  Google Scholar 

  9. McAfee (2017) McAfee labs threat report. [Online]. Available at: https://www.mcafee.com/uk/resources/reports/rp-quarterly-threats-sept-2017.pdf. Accessed 1 Aug 2019

  10. Mettler M (2016) Blockchain technology in healthcare: the revolution starts here 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom). Available at: DOI: https://doi.org/10.1109/HealthCom.2016.7749510. Accessed 18 Aug 2019

  11. Palmer D (2017) ZDnet. Available at: http://www.zdnet.com/article/this-malvertising-campaign-infected-pcs-with-ransomware-without-users-even-clicking-a-link/. Accessed 6 Aug 2019

  12. Parent M, Cusack B (2016) Cybersecurity in 2016: people, technology, and processes. Bus Horiz 59(6):567–569. [Online]. Available at: https://doi.org/10.1016/j.bushor.2016.08.005. (http://www.sciencedirect.com/science/article/pii/S0007681316300829). Accessed 6 Aug 2019

    Article  Google Scholar 

  13. RiskIQ Research (2017) Business Wire. [Online]. Available at: http://www.businesswire.com/news/home/20170131005420/en/Malvertising-Rises-132-2016-2015-RiskIQ-Research. Accessed 6 Aug 2019

  14. Satoshi N (2008) Bitcoin: a peer-to-peer electronic cash system 2008 [Online]. Available at: https://bitcoin.org/bitcoin.pdf. Accessed 18 Aug 2019

  15. Sharma U (2017) Blockchain in healthcare: patient benefits and more [Online]. Available at: https://www.ibm.com/blogs/blockchain/2017/10/blockchain-in-healthcare-patient-benefits-and-more/. Accessed 18 Aug 2019

  16. Steer, S. Defending against spear-phishing, Comput Fraud Secur, 2017, 8, 2017, 18–20. [Online]. Available at: https://doi.org/10.1016/S1361-3723(17)30074-X. (http://www.sciencedirect.com/science/article/pii/S136137231730074X). Accessed 18 Aug 2019

  17. Swan M (2015) Blockchain: blueprint for a new economy. O’Reily Media Inc, Sebastopol

    Google Scholar 

  18. World Bank (2015) World development indicators: Health expenditure per capita (current US$). The World Bank [Online]. Available at: https://data.worldbank.org/indicator/SH.XPD.PCAP. Accessed 18 Aug 2019

  19. Yaqoob I et al (2017) The rise of ransomware and emerging security challenges in the Internet of Things. Comput Netw 129(2):444–458. Available at: https://doi.org/10.1016/j.comnet.2017.09.003. Accessed 6 Aug 2019

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefan Kendzierskyj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kendzierskyj, S., Jahankhani, H. (2020). Blockchain, TTP Attacks and Harmonious Relationship with AI. In: Jahankhani, H., Kendzierskyj, S., Chelvachandran, N., Ibarra, J. (eds) Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-35746-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-35746-7_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-35745-0

  • Online ISBN: 978-3-030-35746-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics