Font Size: a A A

Research On Network Threat Intelligence Information Trading Mechanism For P2P Transactions

Posted on:2021-11-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhaoFull Text:PDF
GTID:2518306047481294Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology,the situation of cyber threats has become increasingly severem,cyber threat intelligence information,as an important source for cyber security protection organizations to obtain cyber threats,has extremely important research value.Therefore,studying how to conduct efficient and secure cyber threat intelligence information transactions in P2 P transaction scenarios is an important research content of cyber threat intelligence information transactions.The multi-centralized consortium blockchain in a distributed environment uses a node's audit join mechanism to solve the trust problem of nodes within the consortium blockchain,and provides a feasible solution for P2 P transaction-oriented cyber threat intelligence information transactions.Research on how to improve the enthusiasm of transaction cooperation of transaction users and protect the identity privacy of transaction endorsement users is the key research issue of applying consortium blockchain technology to P2 P transaction-oriented cyber threat intelligence information transaction mechanism.First,in order to solve the problem of low interest driving of the nodes in the consortium blockchain,which leads to the low enthusiasm of users to participate in transactions,a threat intelligence transaction promotion method based on benefit distribution is proposed.Based on the research on the sharding mechanism and threat intelligence transaction cost of the consortium blockchain,and using game theory to analyze the game strategy and cooperative equilibrium model for unified and fair benefit distribution,a fair benefit distribution mechanism based on sharding is designed,and through experimental comparison and analysis,it is verified that the proposed mechanism can increase the enthusiasm of transaction participation of nodes in the threat intelligence trading consortium blockchain,and can achieve the effect of attracting more users to participate in transaction cooperation.Secondly,in view of the problem of identity leakage during endorsement verification of transaction endorsement users within the threat intelligence transaction consortium blockchain,a method for anonymous user endorsement in the transaction intelligence endorsement consortium was proposed.Based on the idea of ring signature and knowledge signature,a constant-length transaction-linkable ring signature algorithm(CLTLRS algorithm)applied to the consortium blockchain with a constant length is designed and implemented.The security parameter guarantees a constant signature length The transaction correlation of the signature is completed through the transaction label,and the anonymity,unforgeability and correlation of the algorithm are analyzed.Finally,the factors that affect the operation efficiency of the CLTLRS algorithm are analyzed through experiments,and the operation stability of the CLTLRS algorithm is verified.
Keywords/Search Tags:threat intelligence, consortium blockchain, transaction, game theory, ring signature
PDF Full Text Request
Related items