Most powerful technology of the trending world is Blockchain. Because of it’s shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. It does not get...
详细信息
ISBN:
(纸本)9783031759567
Most powerful technology of the trending world is Blockchain. Because of it’s shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. It does not gets limited here, it is widely used in Financial Management and Accounting, Record management in government, Healthcare, Banking, supply chain and so on. In simple terms, Blockchain is a collection of useful information (data). No central authority has the single control on it. Each transaction is documented as a "block" of data as it happens. Every block is interconnected with those that came before and after *** to its decentralized nature, after each and every transaction the block information gets appended in the longest chain and is made transparent to everyone enhancing the trust. But Blockchain is suffering from many cyber attacks. Many solutions are made to increase the level of security. Even in Jan 2019 majority attack has happened in Ethereum classic. The most rare occurrence of the event is the 51% attack (majority attack) which take the control of the hashing rate or hashing power of the network, potentially causing a network disruption. Leading to the cause of Mining Monopoly. Most of the time this happens when the attacker blocks all transactions from a miner in their own private network before broadcasting their own version to the network. The other possibilities of this majority attack can break the basis terms like Reverse transaction, Double spending attack. The attacker takes the control of not confirming some transaction, changing the block rewards, stealing the coins and even creating the coins. The majority assault, also known as the 51% attack, aims to split the blockchain in order to invalidate completed transactions and tamper with data integrity. Our approach is to provide security of blockchain transactions by following the POS (proof of stake) and tightening the network strength by tracing out the anomalous behaviour in the
This research work addresses the growing significance of Anomaly Detection Systems (IDSs) in ensuring the security of digital systems and networks. The inherent challenge in distinguishing genuine anomalies from benig...
详细信息
作者:
Vidhya, S.School of Computing
Srm Institute of Science and Technology Department of Computing Technologies Chennai India
In the fast-moving environment everyone handles different types of trash. A common man to large industries produces trash and it is accumulating everywhere. Recycling the trashes to reduce the source product requireme...
详细信息
Accessing data from cloud storage has become an essential part of information management since it simplifies data retrieval and manipulation. However, along with this ease comes possible latency problems and the requi...
详细信息
This paper presents a movie recommendation system utilizing the DBSCAN(Density Based Spatial Clustering of Applications with Noise) algorithm. Traditional recommendation system mostly rely on collaborative filtering o...
详细信息
This paper focuses on developing an advanced Stellar Data Analysis and Deep Space Data Analysis System, leveraging the power of machine learning and deep learning algorithms. Utilizing cutting-edge techniques such as ...
详细信息
This study presents an innovative approach to managing traffic congestion through an intelligent system that combines advanced congestion detection with adaptive signal control. The system leverages artificial intelli...
详细信息
One of today's most important issues is climate change, primarily due to carbon emissions. Accurate carbon emissions forecasting is crucial in developing countries like India to inform effective policy decisions a...
详细信息
Secure multi-keyword search for outsourced cloud data has gained popularity, especially for scenarios involving multiple data owners. This work proposes a method for secure multi-keyword searches across encrypted clou...
详细信息
The project aims to address the escalating challenge of malware, a critical threat in the cybersecurity domain. Traditional detection methods are struggling to keep pace with sophisticated, evolving malware attacks. D...
详细信息
暂无评论