Abstract
One of the most important component of each corporate network is an intrusion detecting system. But it is a problem to find a mechanism for setting a trust between the nodes in a big distributed system. A blockchain can be used as such kind of mechanism, but most of working blockchains use cases related to cryptocurrencies. So there is no suitable consensus protocol for a permissionless blockchain, which can be used as a part of IDS. In this paper we propose a few modifications to proof of stake consensus protocol to adopt it for using with a blockchain based IDS. Also an agent based model was built to simulate a staking process for our modified consensus protocol. Modeling result will help us to evaluate performance of a blockchain based IDS in a normal state and in some critical situations and to find the most suitable consensus protocol parameters depending on a network size.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gener. Comput. Syst. 96, 481–489 (2019). http://www.sciencedirect.com/science/article/pii/S0167739X18327237
Wu, Y.S., Foo, B., Mei, Y., Bagchi, S.: Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS. In: Proceedings of 19th Annual Computer Security Applications Conference, pp. 234–244, December 2003
Li, Z., Chen, Y., Beach, A.: Towards scalable and robust distributed intrusion alert fusion with good load balancing. In: Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, LSAD 2006, Pisa, Italy, pp. 115–122. ACM, New York (2006). https://doi.org/10.1145/1162666.1162669
Wüst, K., Gervais, A.: Do you need a blockchain? In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 45–54, June 2018
Alexopoulos, N., Vasilomanolakis, E., Ivanko, N.R., Muhlhauser, M.: Towards blockchain-based collaborative intrusion detection systems. In: D’Agostino, G., Scala, A. (eds.) Critical Information Infrastructures Security, Lecture Notes in Computer Science, pp. 107–118. Springer International Publishing, Cham (2018)
Bitcoin Developer Reference - Bitcoin. https://bitcoin.org/en/developer-reference#remote-procedure-calls-rpcs
O’Dwyer, K.J., Malone, D.: Bitcoin mining and its energy footprint (2014)
Xiao, Y., Zhang, N., Lou, W., Hou, Y.T.: A survey of distributed consensus protocols for blockchain networks. IEEE Commun. Surv. Tutor. 22(2), 1432–1465 (2020)
Xiao, Y., Zhang, N., Lou, W., Hou, Y.T.: A Survey of distributed consensus protocols for blockchain networks. IEEE Commun. Surv. Tutor. 1 (2020). arXiv: 1904.04098
King, S., Nadal, S.: PPCoin: peer-to-peer crypto-currency with proof-of-stake. Self-Published Paper, 19 August 2012
Nxt Community: Nxt whitepaper revision 4 (2014). https://www.dropbox.com/s/cbuwrorf672c0yy/NxtWhitepaperv122rev4.pdf
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the Twenty-First Annual ACM Symposium on Theory of computing, STOC 1989, Seattle, Washington, USA, pp. 73–85. Association for Computing Machinery, February 1989. https://doi.org/10.1145/73007.73014
Kwon, J.: TenderMint: consensus without mining. Draft v. 0.6, Fall 1(11) (2014)
Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp. 51–68 (2017)
Larimer, D.: DPOS—pipelined byzantine fault tolerance, May 2018. https://medium.com/eosio/dpos-bft-pipelined-byzantine-fault-tolerance-8a0634a270ba,libraryCatalog:medium.com
Cosmos SDK documentation cosmos SDK. https://docs.cosmos.network/master/cosmos-hub/validators/overview.html
Martinez, J.: Understanding proof of stake: the nothing at stake theory (2018)
Mizrahi, I.B.C.L.A., Rosenfeld, M.: Proof of activity: extending bitcoin’s proof of work via proof of stake (2014)
Buterin, V.: Long-range attacks: the serious problem with adaptive proof of work (2018). Accessed 26 Dec 2014
Li, W., Andreina, S., Bohli, J.M., Karame, G.: Securing proof-of-stake blockchain protocols. In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-JoancomartÃ, J. (eds.) Data Privacy Management, Cryptocurrencies and Blockchain Technology. Lecture Notes in Computer Science, pp. 297–315. Springer International Publishing, Cham (2017)
Acknowledgement
This study is funded by the NATO SPS Project CyRADARS (Cyber Rapid Analysis for Defense Awareness of Real-time Situation), Project SPS G5286.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Burmaka, I., Stoianov, N., Lytvynov, V., Dorosh, M., Lytvyn, S. (2021). Proof of Stake for Blockchain Based Distributed Intrusion Detecting System. In: Shkarlet, S., Morozov, A., Palagin, A. (eds) Mathematical Modeling and Simulation of Systems (MODS'2020). MODS 2020. Advances in Intelligent Systems and Computing, vol 1265. Springer, Cham. https://doi.org/10.1007/978-3-030-58124-4_23
Download citation
DOI: https://doi.org/10.1007/978-3-030-58124-4_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58123-7
Online ISBN: 978-3-030-58124-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)