Muhammad Azeem, Jabar Mahmood, Tayyaba Aslam, K. Shahzadi
{"title":"区块链攻击的系统文献综述","authors":"Muhammad Azeem, Jabar Mahmood, Tayyaba Aslam, K. Shahzadi","doi":"10.1109/FIT57066.2022.00050","DOIUrl":null,"url":null,"abstract":"Block-chain is contemplate as a highly protected, distributed, and immutable source of transaction that is being applied in enormous sectors to intensify the privacy and security. It contains information of crypto currency Bitcoin and transactions, which has gained much attention in many industries. Besides the mentioned tremendous feature of blockchain technology, it can be vulnerable to attacks. attack, Double Spending attack, Denial of Service attack and many more. This paper presents a systematic literature review on different attacks executed on block-chain as well as their proposed detection, prevention, and avoidance methods that reveal their strengths and limitation. Although that there is still no way to detect many attacks like 51 percent attack until it is fully deployed and all the proposed security measure previously proposed are failed to provide real protection against cyber-attacks on block-chain.","PeriodicalId":102958,"journal":{"name":"2022 International Conference on Frontiers of Information Technology (FIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Systematic Literature Review on Block-chain Attacks\",\"authors\":\"Muhammad Azeem, Jabar Mahmood, Tayyaba Aslam, K. Shahzadi\",\"doi\":\"10.1109/FIT57066.2022.00050\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Block-chain is contemplate as a highly protected, distributed, and immutable source of transaction that is being applied in enormous sectors to intensify the privacy and security. It contains information of crypto currency Bitcoin and transactions, which has gained much attention in many industries. Besides the mentioned tremendous feature of blockchain technology, it can be vulnerable to attacks. attack, Double Spending attack, Denial of Service attack and many more. This paper presents a systematic literature review on different attacks executed on block-chain as well as their proposed detection, prevention, and avoidance methods that reveal their strengths and limitation. Although that there is still no way to detect many attacks like 51 percent attack until it is fully deployed and all the proposed security measure previously proposed are failed to provide real protection against cyber-attacks on block-chain.\",\"PeriodicalId\":102958,\"journal\":{\"name\":\"2022 International Conference on Frontiers of Information Technology (FIT)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Frontiers of Information Technology (FIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FIT57066.2022.00050\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Frontiers of Information Technology (FIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FIT57066.2022.00050","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Systematic Literature Review on Block-chain Attacks
Block-chain is contemplate as a highly protected, distributed, and immutable source of transaction that is being applied in enormous sectors to intensify the privacy and security. It contains information of crypto currency Bitcoin and transactions, which has gained much attention in many industries. Besides the mentioned tremendous feature of blockchain technology, it can be vulnerable to attacks. attack, Double Spending attack, Denial of Service attack and many more. This paper presents a systematic literature review on different attacks executed on block-chain as well as their proposed detection, prevention, and avoidance methods that reveal their strengths and limitation. Although that there is still no way to detect many attacks like 51 percent attack until it is fully deployed and all the proposed security measure previously proposed are failed to provide real protection against cyber-attacks on block-chain.