Abstract: Various examples relate to an apparatus, device, method, and a non-transitory ma-chine-readable storage medium for a node of a blockchain network. The apparatus comprises interface circuitry, machine-readable instructions and processor circuitry to execute the machine-readable instructions to compare a traffic pattern of re-quests associated with one or more smart contracts hosted by the node of the blockchain network with a reference traffic pattern, determine an estimated denial of service of at least one of the one or more smart contracts based on the compari-son between the traffic pattern and the reference traffic pattern, determine one or more potential mitigations for the estimated denial of service, and apply at least one of the one or more potential mitigations. (Fig. 1a).
Description:RELATED APPLICATION
[001] The present application claims priority to U.S. Non-Provisional Patent Application No. 18/344,882 filed on 30 June 2023 and titled “Apparatus, Device, Method, and Non-Transitory Machine-Readable Storage Medium for a Node of a Blockchain Network” the entire disclosure of which is hereby incorporated by reference.
Background
[002] The term Web3 refers to an architecture for a third generation of the internet, which is a decentralized, open-source, blockchain-based version of the web that enables peer-to-peer interactions without the need for intermediaries. Web3 aims to create a more secure, transparent, and decentralized internet where users can fully own and control their data without the need for centralized authori-ties or third-party platforms. Web3 is based on several technologies, such as block-chain networks, smart contracts, and decentralized applications (dApps).
[003] Detecting coordinated and distributed attacks (e.g., Distributed Denial of Service - DDoS) in heterogeneous Web3 environments like edge computing is challenging, because requests may come from multiple sources (and may therefore not be detectable as denial of service). This is a challenge in distributed systems that provide a service on edge. Such services may be based on rules that govern service provision, responsibilities, and scope through a Service Level Agreement (SLA). System components may be distributed and coordinated with each other, fostering a communication economy.
[004] Many popular blockchain networks partially address the challenge of DDoS attacks by requiring transaction fees (e.g., gas in some networks). However, this approach might not suffice for handling Denial of Service attacks. Moreover, this challenge might not be addressed in layer 2 networks (which may be less well-protected as they require mechanisms like a custom consensus mechanisms), or private blockchain networks.
Brief description of the Figures
[005] Some examples of apparatuses and/or methods will be described in the following by way of example only, and with reference to the accompanying fig-ures, in which:
[006] Fig. 1a shows a schematic diagram of an example of an apparatus or device for a node of a blockchain network, and of a node comprising such an ap-paratus or device;
[007] Fig. 1b shows a flow chart of an example of a method for a node of a blockchain network;
[008] Fig. 2 shows a schematic diagram of an example of a proposed architecture; and
[009] Fig. 3 shows a schematic diagram of an operational flow.
Detailed Description
[0010] Some examples are now described in more detail with reference to the enclosed figures. However, other possible examples are not limited to the features of these embodiments described in detail. Other examples may include modifica-tions of the features as well as equivalents and alternatives to the features. Fur-thermore, the terminology used herein to describe certain examples should not be restrictive of further possible examples.
, Claims:1. An apparatus for a node of a blockchain network, the apparatus comprising interface circuitry, machine-readable instructions and processor circuitry to execute the machine-readable instructions to:
compare a traffic pattern of requests associated with one or more smart contracts hosted by the node of the blockchain network with a reference traffic pattern;
determine an estimated denial of service of at least one of the one or more smart contracts based on the comparison between the traffic pattern and the refer-ence traffic pattern;
determine one or more potential mitigations for the estimated denial of ser-vice; and
apply at least one of the one or more potential mitigations.
| # | Name | Date |
|---|---|---|
| 1 | 202344080422-POWER OF AUTHORITY [27-11-2023(online)].pdf | 2023-11-27 |
| 2 | 202344080422-FORM 1 [27-11-2023(online)].pdf | 2023-11-27 |
| 3 | 202344080422-DRAWINGS [27-11-2023(online)].pdf | 2023-11-27 |
| 4 | 202344080422-DECLARATION OF INVENTORSHIP (FORM 5) [27-11-2023(online)].pdf | 2023-11-27 |
| 5 | 202344080422-COMPLETE SPECIFICATION [27-11-2023(online)].pdf | 2023-11-27 |
| 6 | 202344080422-FORM 3 [23-05-2024(online)].pdf | 2024-05-23 |
| 7 | 202344080422-Correspondence-Letter [19-07-2024(online)].pdf | 2024-07-19 |
| 8 | 202344080422-Proof of Right [29-10-2024(online)].pdf | 2024-10-29 |