Malicious Conspiracy on Permissioned Blockchain to Mount Denial-of-endorsement Attacks.
Siyuan ZhengChangqing YinBin WuPublished in: ISPA/BDCloud/SocialCom/SustainCom (2021)
Keyphrases
- malicious users
- detect malicious
- malicious attacks
- detecting malicious
- malicious behavior
- insider attacks
- malicious code
- malicious activities
- normal traffic
- insider threat
- malicious nodes
- malicious traffic
- attack detection
- countermeasures
- static analysis
- semi fragile watermarking
- reverse engineering
- identity theft
- terrorist attacks
- detection mechanism
- traffic analysis
- cyber attacks
- online social networks
- intrusion detection system
- watermarking algorithm
- watermarking scheme