IT PARK
    Most Popular

    Five effective business models of Internet of Things

    Jul 28, 2025

    Explanation of the consensus mechanism of blockchain

    Jul 18, 2025

    Google has categorized 6 real-world AI attacks to prepare for immediately

    Jul 20, 2025

    IT PARK IT PARK

    • Home
    • Encyclopedia

      What are "Other" and "Other System Data" on iPhone and how do I clean them up?

      Aug 01, 2025

      Cell phone "a daily charge" and "no power to recharge", which is more harmful to the battery?

      Jul 31, 2025

      Why does the phone turn off when the remaining battery is not zero

      Jul 30, 2025

      Internet era! How to prevent personal information leakage

      Jul 29, 2025

      Which one to choose for mobile power? Analysis of the three major types of battery cells

      Jul 28, 2025
    • AI

      Coping with the "blind spot" of application in the age of artificial intelligence, and finding the "point of view" from the power of time.

      Aug 01, 2025

      AI fraud is efficient and low cost, and the "three magic tricks" effectively prevent potential threats

      Jul 31, 2025

      Many people use AI to help them work: less time to work and more money to earn

      Jul 30, 2025

      Driving Generative AI Pervasiveness: Intel's "duty to do so"

      Jul 29, 2025

      First U.S. Election in the Generative AI Era

      Jul 28, 2025
    • Big Data

      3 Ways to Overcome Big Data Obstacles

      Aug 01, 2025

      How big data analytics is reshaping the future of smart cities

      Jul 31, 2025

      3 Ways to Successfully Manage and Protect Your Data

      Jul 30, 2025

      Big data is transforming education

      Jul 29, 2025

      How data can help organizations achieve their environmental goals

      Jul 28, 2025
    • CLO

      How India can seize a rare opportunity in cloud computing

      Aug 01, 2025

      To make more environmentally friendly use of the cloud IT infrastructure, start with these aspects

      Jul 31, 2025

      Cloud computing, what are the main security challenges

      Jul 30, 2025

      What is cloud computing?

      Jul 29, 2025

      Four advantages are highlighted, and cloud computing is the trend

      Jul 28, 2025
    • IoT

      Iot and Internet misconceptions, which ones do you know?

      Aug 01, 2025

      5 Secrets to Maximizing Return on Investment in IoT

      Jul 31, 2025

      The Role of Industrial IoT Technology in Smart Factories

      Jul 30, 2025

      Is it too early to exit the IoT?

      Jul 29, 2025

      Five effective business models of Internet of Things

      Jul 28, 2025
    • Blockchain

      What does blockchain mining mean?

      Aug 01, 2025

      NFT, from the "art" of Internet natives to the marketing tools of business

      Jul 31, 2025

      What are the main areas of potential application of blockchain in the construction industry?

      Jul 30, 2025

      Difference between blockchain games and regular games

      Jul 29, 2025

      What is a smart contract?

      Jul 28, 2025
    IT PARK
    Home » Blockchain » How blockchain is revolutionizing cybersecurity
    Blockchain

    How blockchain is revolutionizing cybersecurity

    The decentralized, consensus-driven and lack-of-trust nature of blockchains makes them inherently resilient to attacks.
    Updated: Jun 16, 2025
    How blockchain is revolutionizing cybersecurity

    In October 2020, Google publicly disclosed details about a cyber attack that occurred in September 2017. It reported that it was a distributed denial-of-service (DDoS) attack from a foreign country that lasted a total of six months and was the largest attack of its kind ever.

    Hackers exploited the decentralized nature of the Internet to both maintain anonymity and overcome resistance to the attack. A common approach to DDoS attacks is to infect multiple nodes in multiple domains to form a semi-coordinated network called a "botnet". These independent bots are then hijacked to launch attacks against more centralized targets, often giving hackers an asymmetric advantage. More distributed software deployments, database management and security protocols can reduce the vulnerability of targets by extending the attack surface and reducing the reliance on centralized trust.

    The key to this decentralized approach is that this is a solution that already has multiple features for which regional chains can defend against attacks.

         The asymmetric threat landscape

    While Google withstood the 2017 attack, it was unprecedented in scale. At the peak of the attack, it reached 2.5 Tbps (a metric for comparing DDoS attack events), four times as fast. In the last 10 years, the number of DDoS attacks has grown even more exponentially.

    The purpose of a DDoS attack is to limit or completely shut down traffic to a target network or service by sending false requests from multiple malicious infected sources to the target network or service. The decentralized nature of these attacks makes them difficult to defeat, as they have no single source that can be stopped.

    Instead, the targets of cyber attacks are largely more concentrated. Servers typically reside behind a limited number of IP addresses, providing a centralized attack surface where compromised passwords or password credentials can expose an entire database. Hackers can simultaneously control or restrict access to a large number of resources for ransom.

    To combat hackers, designs are moving away from the traditional centralized trust model to a more "untrustworthy" approach, especially with respect to security protocols. Assigning trust through consensus to verify important elements such as access, authentication and database transactions is a function for which blockchain is best suited.

         Blockchain is more than just encryption

    Over a decade ago, blockchain became essentially synonymous with cryptocurrency in public parlance. However, in addition to crypto-like smart contracts, non-fungible tokens (NFTs), decentralized financing and distributed software, other blockchain applications such as Ethereum have emerged as various use cases on other platforms.

    The decentralized, consensus-driven and lack-of-trust nature of blockchains makes them inherently resilient to attacks. For those blockchain solutions that leverage proof-of-work verification methods (such as Bitcoin), hackers must gain control of most nodes to disrupt ledger transactions - a computationally expensive approach by design. This computational cost can be extended to other types of operations in a security solution, thereby reducing the need for a central authority.

    Many DDoS attacks leverage Internet Domain Name Servers (DNS) - mapping IP addresses to readable website names. By moving the DNS to the blockchain, resources can be spread across multiple nodes, making it impossible for an attacker to control the database. Yet simply building databases or applications on the blockchain does not necessarily make them invulnerable. Hackers are very persistent, and they are becoming more powerful adversaries as governments become increasingly involved in cyber warfare.

    The process of building blockchains can be enhanced with AI to detect and prevent malicious data manipulation. Moreover, AI built specifically to protect systems or databases can be implemented on a more distributed model. As blockchain applications, there is no need to trust nodes to remain intact.

         The future will go decentralized

    DDoS, data breaches, ransomware attacks, social media phishing, and even direct cryptocurrency mining attacks are on the rise, costing victims hundreds of billions of dollars a year. The increasing frequency, sophistication, scale, and economic consequences of cyberattacks have the public increasingly worried, and governments and private organizations are looking for ways to keep up with the evolving threat.

    blockchain Security Network
    Previous Article IoT success story: deriving value from sensor data
    Next Article To read big data, you have to master these core technologies first

    Related Articles

    Blockchain

    Why does Web3 need digital identity?

    Jun 22, 2025
    Encyclopedia

    What are the Wi-Fi password security levels?

    Jul 12, 2025
    CLO

    What are the difficulties of cloud computing operations and maintenance?

    Jul 19, 2025
    Most Popular

    Five effective business models of Internet of Things

    Jul 28, 2025

    Explanation of the consensus mechanism of blockchain

    Jul 18, 2025

    Google has categorized 6 real-world AI attacks to prepare for immediately

    Jul 20, 2025
    Copyright © 2025 itheroe.com. All rights reserved. User Agreement | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.