Skip to main content

Proof of Stake for Blockchain Based Distributed Intrusion Detecting System

  • Conference paper
  • First Online:
Mathematical Modeling and Simulation of Systems (MODS'2020) (MODS 2020)

Abstract

One of the most important component of each corporate network is an intrusion detecting system. But it is a problem to find a mechanism for setting a trust between the nodes in a big distributed system. A blockchain can be used as such kind of mechanism, but most of working blockchains use cases related to cryptocurrencies. So there is no suitable consensus protocol for a permissionless blockchain, which can be used as a part of IDS. In this paper we propose a few modifications to proof of stake consensus protocol to adopt it for using with a blockchain based IDS. Also an agent based model was built to simulate a staking process for our modified consensus protocol. Modeling result will help us to evaluate performance of a blockchain based IDS in a normal state and in some critical situations and to find the most suitable consensus protocol parameters depending on a network size.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gener. Comput. Syst. 96, 481–489 (2019). http://www.sciencedirect.com/science/article/pii/S0167739X18327237

  2. Wu, Y.S., Foo, B., Mei, Y., Bagchi, S.: Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS. In: Proceedings of 19th Annual Computer Security Applications Conference, pp. 234–244, December 2003

    Google Scholar 

  3. Li, Z., Chen, Y., Beach, A.: Towards scalable and robust distributed intrusion alert fusion with good load balancing. In: Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, LSAD 2006, Pisa, Italy, pp. 115–122. ACM, New York (2006). https://doi.org/10.1145/1162666.1162669

  4. Wüst, K., Gervais, A.: Do you need a blockchain? In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 45–54, June 2018

    Google Scholar 

  5. Alexopoulos, N., Vasilomanolakis, E., Ivanko, N.R., Muhlhauser, M.: Towards blockchain-based collaborative intrusion detection systems. In: D’Agostino, G., Scala, A. (eds.) Critical Information Infrastructures Security, Lecture Notes in Computer Science, pp. 107–118. Springer International Publishing, Cham (2018)

    Google Scholar 

  6. Bitcoin Developer Reference - Bitcoin. https://bitcoin.org/en/developer-reference#remote-procedure-calls-rpcs

  7. O’Dwyer, K.J., Malone, D.: Bitcoin mining and its energy footprint (2014)

    Google Scholar 

  8. Xiao, Y., Zhang, N., Lou, W., Hou, Y.T.: A survey of distributed consensus protocols for blockchain networks. IEEE Commun. Surv. Tutor. 22(2), 1432–1465 (2020)

    Article  Google Scholar 

  9. Xiao, Y., Zhang, N., Lou, W., Hou, Y.T.: A Survey of distributed consensus protocols for blockchain networks. IEEE Commun. Surv. Tutor. 1 (2020). arXiv: 1904.04098

  10. King, S., Nadal, S.: PPCoin: peer-to-peer crypto-currency with proof-of-stake. Self-Published Paper, 19 August 2012

    Google Scholar 

  11. Nxt Community: Nxt whitepaper revision 4 (2014). https://www.dropbox.com/s/cbuwrorf672c0yy/NxtWhitepaperv122rev4.pdf

  12. Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the Twenty-First Annual ACM Symposium on Theory of computing, STOC 1989, Seattle, Washington, USA, pp. 73–85. Association for Computing Machinery, February 1989. https://doi.org/10.1145/73007.73014

  13. Kwon, J.: TenderMint: consensus without mining. Draft v. 0.6, Fall 1(11) (2014)

    Google Scholar 

  14. Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp. 51–68 (2017)

    Google Scholar 

  15. Larimer, D.: DPOS—pipelined byzantine fault tolerance, May 2018. https://medium.com/eosio/dpos-bft-pipelined-byzantine-fault-tolerance-8a0634a270ba,libraryCatalog:medium.com

  16. Cosmos SDK documentation cosmos SDK. https://docs.cosmos.network/master/cosmos-hub/validators/overview.html

  17. Martinez, J.: Understanding proof of stake: the nothing at stake theory (2018)

    Google Scholar 

  18. Mizrahi, I.B.C.L.A., Rosenfeld, M.: Proof of activity: extending bitcoin’s proof of work via proof of stake (2014)

    Google Scholar 

  19. Buterin, V.: Long-range attacks: the serious problem with adaptive proof of work (2018). Accessed 26 Dec 2014

    Google Scholar 

  20. Li, W., Andreina, S., Bohli, J.M., Karame, G.: Securing proof-of-stake blockchain protocols. In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomartí, J. (eds.) Data Privacy Management, Cryptocurrencies and Blockchain Technology. Lecture Notes in Computer Science, pp. 297–315. Springer International Publishing, Cham (2017)

    Google Scholar 

Download references

Acknowledgement

This study is funded by the NATO SPS Project CyRADARS (Cyber Rapid Analysis for Defense Awareness of Real-time Situation), Project SPS G5286.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ivan Burmaka .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Burmaka, I., Stoianov, N., Lytvynov, V., Dorosh, M., Lytvyn, S. (2021). Proof of Stake for Blockchain Based Distributed Intrusion Detecting System. In: Shkarlet, S., Morozov, A., Palagin, A. (eds) Mathematical Modeling and Simulation of Systems (MODS'2020). MODS 2020. Advances in Intelligent Systems and Computing, vol 1265. Springer, Cham. https://doi.org/10.1007/978-3-030-58124-4_23

Download citation

Publish with us

Policies and ethics