前言:想要写出一篇引人入胜的文章?我们特意为您整理了区块链技术在网络安全中运用范文,希望能给你带来灵感和参考,敬请阅读。
摘要:区块链技术为一种去中心化分布式账本技术,也是一种无人信托平台,其主要以解决网络信任问题为主,其主要以自身独特加密方式为数据信息的储存与隐私安全提供保障,从而确保数据记录的精确性与公正性。基于此,本文将主要针对如何在网络安全中有效运用区块链技术展开相关探讨分析,供相关读者参考。
关键词:区块链;网络安全;数据信息
Keywords: block chain; network security; data information
近年来,随着信息技术的发展,网络安全问题也随之出现,为人们使用网络带来了一些干扰和影响。区块链技术就是在这样的大环境下诞生,并很快被新时代的人们所接受,其最初还只是用于货币交易,随着区块链技术不断发展,其应用范围愈加广泛,尤其是在网络安全方面,也有一定程度上的突破。然而,也应该清楚地看到,任何事物都需要一个发展过程,只有经过不断地改善,才能使区块链技术在网络安全中的作用得到最大限度发挥。
In recent years, with the development of information technology, cyber-security issues have also emerged, with some disruption and impact on the use of networks. Block-chain technologies have been born in such an environment and soon accepted by the people of the new era. They were initially used only for monetary transactions. As block-chain technologies have evolved, they have also been used to a greater extent, especially in terms of cybersecurity.
1区块链技术的基本概述
Basic overview of block chain technology
区块链技术是一种技术,其包含了点对点传输、加密算法、共识机制、分区数据存储等多种技术,而共识机制则是一种可以在区块链中建立信任和获得利益的算法。区块链技术的优点一是开放性,可以对用户的个人信息进行严密的保护,并且大部分的数据都是公开和透明的,也就是说,可以在指定的端口上访问。二是稳定性,数据的采集与存储不会有任何的改变,具有很好的稳定性,可以对数据的信息进行最大程度的保护。三是自主性,利用区块链技术,可以将受信的人从原来的人变成机器,从而降低被人操控、干涉的可能性;因此,数据的真实性得到了最大程度的保障。四是匿名性,由于节点之间的通信必须遵循一定的规则,所以不需要互相信任,也不会被监视,这对保护网络中的个人隐私具有十分重要的意义。
Block chain technology is a technology that includes a variety of techniques, such as point-to-point transmission, encryption algorithms, consensus mechanisms, and zoning data storage, while consensus mechanisms are an algorithm that builds trust and benefits in the block chain. Block chain technology has the advantage of being open to close protection of user's personal information, and most of the data is open and transparent, i.e. it can be accessed at a specified port. Secondly, stability, data collection and storage will not change at all, will be very stable and will maximize the protection of data information. Thirdly, ownership, using block chain technology, will reduce the likelihood of manipulation and interference by turning the trusted person from the original person into a machine; thus, data authenticity is guaranteed to the greatest extent possible. Fourth, since communications between nodes are subject to certain rules, there is no need for mutual trust and will not be monitored, which is very important for protecting personal privacy in the network.
2区块链技术在网络安全中的应用优势
Strengths in the application of block chain technology to network security
2.1有助于阻止侵害网络信息数据的内外部行为
2.1. Internal and external behaviour that helps to deter information violations against networks
基于区块链的网络安全技术实质上是分区自治数据管理系统,其强调各个节点安全保护功能,并能够按照有关需求通过自治方式进行操作;对于网络内外的恶意威胁,可以进行稳健防范。这种严密、严谨、科学的分部自治数据管理系统,在面对不安全网络环境时,也能充分利用区块链安全保护能力,有效地阻止来自内外的攻击,最大限度地支持网络数据和信息的安全性。
The network security technology based on the block chain is essentially a subregional autonomous data management system, which emphasizes node security protection functions and is capable of operating in an autonomous manner in accordance with the relevant needs, and is robust in the case of malicious threats both inside and outside the network. Such a rigorous, rigorous and scientific branch autonomy data management system, in the face of an insecure network environment, also makes full use of the sector chain security protection capability, effectively deterring attacks from within and outside the network and maximizing support for the security of network data and information.
2.2有助于高质高效抵制个别恶意侵权网络安全行为
2.2 Support high-quality and efficient resistance to individual malicious violations of cyber security
区块链技术所应用的是一个共识安全系统,能最大程度地利用整个网络整体实力抵御恶意攻击,以保证网络安全。共识安全系统工作原理主要利用区块链中大部分节点,共同对抗和打击恶意入侵行为,虽然需要处理大量数据,但却可以快速地解决相应恶意侵权。此外,区块链技术可以在强大网络共同体系状态下发挥功能与作用。
Block chain technology applies a consensus security system that maximizes the strength of the entire network against malicious attacks in order to ensure cybersecurity. The consensus security system works primarily by using most of the nodes of the block chain to confront and combat malicious invasions, although it requires a large amount of data to be processed, it can quickly address the corresponding malicious violations. Moreover, block chain technology can function and function in the context of a strong network common system.
2.3有助于为网络空间的安全运转提供强大的基础支持
2.3 Help to provide a strong foundational support for the safe operation of cyberspace
与常规的安全技术相比,区块链技术是一种良好扩展方式,它能够将区块链技术和其他的安全技术有机地融合在一起,形成一个完整的安全生态体系。同时,可以将其技术与应用技术相融合,实现多种应用,以适应各种产业的网络安全需求;提供灵活、针对性强、操作性强的网络安全技术与运作模式。在开放式的网络化运作中,区块链技术因其本身的技术优势而倍受重视,尤其是在网络的安全性方面,其自身强有力的技术支撑为网络安全打下坚实基础
In contrast to conventional security technologies, block chain technology is a good way of spreading that integrates block chain technology and other security technologies organically into a complete safe ecological system. At the same time, it can integrate its technology with application technology and achieve multiple applications to suit the network security needs of various industries; it provides flexible, targeted and operational technologies and operating models of cybersecurity. In open network operations, block chain technology is valued for its own technical advantages, especially in terms of network security, and its strong technical support provides a solid foundation for network security.
3区块链的基础架构
Structure of the 3 block chain
在当前的计算机网络中,架构与实现协议是两个关键因素,其中分层是当前最常用的模型。在区块链底层结构2.0中,有六层结构:数据层、网络层、共识层、激励层、合同层、应用层。以数据层为例,数据层是整个体系结构的基础,其任务是将一次的业务数据储存到一个新区块中,再通过哈希函数及Merkle树形的数据结构,将储存于此区块内的事务数据进行封装,并借助上述协定来进行处理;按照该准则,生成一个带有时序标志的新块体,并通过相应的协调机制将其与主链条相连。数据层包含数据块、哈希功能以及链接的构造;Merkle树、时标、不对称密码等技术要素确保了在分散账本中的数据的可靠与稳定。
In the current computer network, architecture and realization protocols are two key factors, of which stratification is the most commonly used model. In block bottom structure 2.0, there are six layers of structure: data layer, network layer, consensus layer, incentive layer, contract layer, application layer. In the data layer, for example, the data layer is the basis of the entire structure of the system. The task is to store one business data in a new block, encapsulate the data stored in this block through the Hashi function and the Merkele tree structure, and process it through the above agreements; in accordance with the guidelines, generate a new block with time-sequence marking and link it to the main chain through a corresponding coordination mechanism. The data layer contains data blocks, Hashi functions, and the construction of links; the technical elements of Merkele trees, time frames, asymmetric codes ensure the reliability and stability of data in the decentralized books.
4网络安全存在的主要风险
4 Main risks to cybersecurity
随着互联网技术飞速发展,人们日常工作与生活得到了极大便利,但同时也有其自身的双重属性,对人们的生产和生活造成了极大威胁;而且,随着互联网技术发展,这一威胁也在不断发展。网络安全主要是指网络系统安全、操作系统安全、软件应用和管理安全。如果内网没有有效保护措施,便可能会受到外部网络攻击,而在局域网中,如果用户安全等级过低,很可能会遭到恶意攻击、信息被窃取等情况发生。而且,如果被入侵,很有可能会引起系统故障,造成严重后果。此外,由于一些软件系统不健全、“后门”等问题也会给用户造成极大安全隐患,而网络技术在实际应用中也有被盗用、非法修改等问题。这些危险对个体和社会皆有着极为不利的负面影响。目前,世界各国对网络安全问题给予了极大关注,并采取了多种技术保护措施,但仍然无法从根本上消除网络安全隐患,只能做到阶段性防范,减少风险。
With the rapid development of Internet technology, the day-to-day work and life of people is greatly facilitated, but also with its own dual attributes, which pose a great threat to people's production and lives; and with the development of Internet technology, the threat continues to grow. Cyber security refers mainly to security of network systems, security of operating systems, and security of software applications and management. Without effective protection measures for intranets, they may be attacked by external networks. In local networks, there is a high risk of malicious attacks and theft of information.
5区块链技术在网络安全上的运用
Application of block chain technology to network security
5.1可增强网络数据的存储和共享能力
5.1 Increased capacity for data storage and sharing on the Web
任何一种数据都是为实际工作服务,在不同应用阶段,其要求也各不相同,常常需要进行加密和共享,区块链技术是一种以共识为基础运作方式,其不仅能为用户提供更高层次安全保护,还能为用户提供更多数据交换。相关监管机构还可以通过区块链对系统内部交易进行审核和监控。
Any type of data serves the actual work, and its requirements vary at different stages of application, often requiring encryption and sharing. Block chain technology is a consensus-based way of operating that not only provides higher levels of security for users, but also provides more data exchange for users.
5.2可加强对关键基础设施的保护力度
5.2 Protection of critical infrastructure can be strengthened
由于互联网自身的缺陷,它的核心结构已成为一种潜在的安全威胁,而由中心故障引起的全线故障,则会导致整个网络的整体失效。如果影响到底层的网络,就会产生连锁反应,导致整个网络的瘫痪,从而给社会带来巨大的冲击。例如,曾经发生的皖、桂、琼、浙、苏等地的网络瘫痪,就是因为服务器遭到了黑客的攻击,使得域名被攻破,导致了所有依靠域名系统的网络系统的崩溃;给各层次的互联网企业带来了巨大的经济损失和社会影响。
As a result of the Internet’s own deficiencies, its core structure has become a potential security threat, and a full-line malfunction caused by a central failure can lead to the failure of the entire network as a whole. If it affects the bottom network, a chain reaction can occur, leading to the paralysis of the network as a whole, which has had a tremendous impact on society.
5.3驱动国防安全
5.3 Drivers of defence security
在国防与执法过程中,需要确保重要的数据的安全性和免遭破坏,如果数据出错,会造成严重的影响;近年来,为了保证区块链的安全与完整性,各国纷纷对其展开了深入的探索;而且在军事和法律上也得到了运用。如今,外国军方正积极地探讨区块链军事用途,美国《2018财年国防授权法案》中清楚地指出,国防部需要对其进行全方位的分析,美国国防部资深科研项目(DARPA)正在进行一次利用区块链技术解决战场上的复杂通信问题,保护军事卫星、核武器等高度保密数据免遭黑客攻击。俄国防部门建立了一个专门的研究部门——开发区区块链技术,其目的是加强互联网的安全和打击主要的信息基础结构;以色列的军民一体化系统把以色列称为“一个很受欢迎的区块链革新地区”等等。根据军事探究的视角,可以将其分为三大类:作战、军事管理、军事“物联网”。从操作上看,分散的、可扩展的、跨网络的块链,具有很好的保密性能和防损性,使其具有很好的适应性。例如,在中、远程导弹等关键兵器中,应用区块链技术进行指挥信息处理,以达到对高层命令的访问;这种技术可以避免误操作、误命令,并可避免对武器系统中的关键信息进行攻击和攻击。在今后的发展中,将从个人信任、制度信任向机器信任发展,为新的指挥与管理模式提供了强有力的支撑。在无人集群中引入一个应用于无人集群的技术,它具有一定的相容性,能够有效地阻止恶意节点对其进行伪劣的攻击和欺骗,从而保障了整个系统的安全性,确保了无人机协同作业的稳定、高效。在军事管理中,运用区块链机间的信任,能有效地减少部队的不确定性、多样性和复杂性。
In the course of defence and law enforcement, there is a need to ensure the security and safety of vital data, and to protect them from sabotage if the data are wrong; in recent years, in order to safeguard the security and integrity of the block chain, States have explored them in depth; and in military and legal applications. Today, the foreign military is actively exploring the military use of the block chain; the United States Defence Authorization Act for 2018 clearly states that the Ministry of Defence needs to analyse it in its entirety, and that the Senior Research Project of the United States Department of Defense (DARPA) is conducting a process of using block-chain technology to solve complex communications problems on the battlefield and to protect highly classified data, such as military satellites, nuclear weapons, from hacker attacks. The Russian defence sector has established a dedicated research unit to develop block-link technology, with the aim of enhancing the security of the Internet and combating the main information infrastructure; Israel's civil-military integration system has referred to as a “highly popular area of sector innovation” and, based on a military perspective, is divided into three categories: combat, military management, military goods networking.
5.4在通信技术中的应用
5.4 Applications in communications technology
区块链技术的运用,使得网络通讯更加可靠,区块链技术在网络通讯技术中的应用原则,可以概括为:区块链技术可以将所传送的所有数据资讯,在极短时间内,快速地传送至遍布全球网络节点,确保数据资讯高效、安全,即便是在无网络或网络被切断情况下,区块链技术也可以通过无线广播、传真等方式进行数据传输。在当今网络通讯日益多元化的今天,区块链技术能够创造出一个更加完善的通讯服务环境,保证通讯品质,提高系统可靠性。如果网络节点中的一个或多个节点发生了故障,那么就不会对整个区块链系统的运行产生任何的负面影响。即便是因为受到了一些外力干扰,大部分的节点都可以正常工作。当一个区块链被恶意病毒入侵时,也可以使用协议方法来确保可以被认证数据及时、安全和可靠的传输,在这些方面,采用区块链技术可以保证网络通讯安全与可靠。
The application of block chain technology makes network communications more reliable, and the principles for the application of block chain technology in network communication technology can be summarized as follows: block chain technology can quickly transmit all data information transmitted to global network nodes within a very short period of time, ensuring that data information is efficient, secure, and that, even in the absence of networks or networks being cut off, segment chain technology can be transmitted through wireless broadcasting, faxing, etc. In today’s increasingly diverse network communications technology can create a better communications service environment, ensuring quality of communications and improving system reliability. If one or more nodes in the network fail, there will be no negative impact on the functioning of the entire network system. Most of the nodes can work properly, even because of some outside interference.
5.5在网络资产管理中的应用
5.5 Applications in network asset management
区块链技术还可以有效地实现对有形资产和无形资产的有效管理,将此技术用于网络资产管理的原则可以归纳为,区块链技术最显著特点之一就是无法随意改变,其可以更好地监控和管理网络资源,保证数据一致性。利用区块链技术对网络资产进行有效的管理,能够有效地管理网络资产中的域名、知识产权、积分等无形资产,并保证其安全。而有形资产则可以通过区块链技术与物联网技术相结合,实现有形资产的相应标识,强化对有形资产的管理。另外,通过将区块链与物联网技术相结合,可以将资产转让的相关信息进行录入,从而实现对资产的追溯,利用该技术,可以为各个行业提供有关产品流通状况,为企业进行产品经营、数据、信息等服务,从而使有形资产的管理更加可靠、可控。因此,运用区块链技术进行网上资产管理,可以有效地改善实体和无形资产的安全;提高了企业的安全管理水平。
Block chain technologies can also effectively achieve effective management of tangible and intangible assets. The principle of using this technology for the management of network assets can be summarized as one of the most significant features of block chain technologies that cannot be changed at will, which can better monitor and manage network resources and ensure data consistency. Effective management of network assets using block chain technologies can effectively manage and secure intangible assets such as domain names, intellectual property rights, credits, etc. in network assets.
5.6构建更完善的社交网络
5.6 Better social networking
集中式网络化社会体制,使使用者一切网络行为均受到网络系统监控,使用者的档案数据全部暴露于网络上,一旦网络上遭非法攻击,不但影响到使用者的个人数据,也影响到与使用者有关的信息安全,甚至造成企业、家庭、学校、公共舆论和社会评价体系等社会问题。利用区块链技术构建安全、畅通、高效的社交网络,是当前的一个重大问题。而应用于区块链的密码技术,则能为用户创造一个更为安全的社交空间。此外,采用区块链还可以帮助建立更加公平和完善的网上奖励制度,比如;通过投票、点赞、评论等社交活动,可以转变成一种激励用户的网络金钱,让用户不用再为社交网络上的用户担忧被篡改;它能有效控制用户的社会性,并能激励用户积极投入到社区的网络安全中去,现在已经被很多公司所认可,而且还在不断发展和普及之中。
A centralized network of social institutions that exposes users to all web-based monitoring of their behaviour. The user's archival data is exposed to the Internet. Once illegally attacked on the Internet, it affects not only the user's personal data, but also the user-related information security, and even social problems such as businesses, families, schools, public opinion and social assessment systems. The use of block-link technologies to build secure, accessible and efficient social networks is a major issue.
6结语
6 Concluding remarks
区块链技术是目前最先进、最安全的技术,其自身分布式特性、去中心化的特性可以为多个网络提供更好的保护。且其智能公约、共识机制、数字签名等技术能够有效地保障各个行业的数据安全,并有效地保护用户隐私,区块链技术的发展与应用,对进一步优化我国的网络环境、加速我国的社会安全建设都有着重要的作用。
Block chain technology is currently the most advanced and secure technology, and its own distributional and decentralized features can provide better protection for multiple networks. And its smart conventions, consensus mechanisms, digital signatures, etc., can effectively guarantee data security in various sectors and effectively protect user privacy. The development and application of block chain technology has an important role in further optimizing the country’s network environment and accelerating social security in the country.
作者:王宝龙 单位:天津轻工职业技术学院
By Wang Bolong, Tianjin Institute of Light Industry and Technology
注册有任何问题请添加 微信:MVIP619 拉你进入群
打开微信扫一扫
添加客服
进入交流群
发表评论