IT PARK
    Most Popular

    NASA is developing an artificial intelligence interface where astronauts can talk directly to AI

    May 18, 2025

    Cloudera Extends Open Lake Warehouse All-in-One to Enable Trusted Enterprise AI

    Apr 09, 2025

    What causes the bitcoin network hash rate to increase?

    May 05, 2025

    IT PARK IT PARK

    • Home
    • Encyclopedia

      Do you know what 3D Mapping is?

      May 20, 2025

      What is the hosts file? Where is the hosts file?

      May 19, 2025

      Apple phone into the water how to do? Four first aid measures to help you

      May 18, 2025

      A one-minute walk through the difference between a switch and a router

      May 17, 2025

      What are the Wi-Fi password security levels?

      May 16, 2025
    • AI

      Meta Quest 3 expected to support generative AI by 2024

      May 20, 2025

      Can AI work this round when you ask a doctor online to break a disease?

      May 19, 2025

      NASA is developing an artificial intelligence interface where astronauts can talk directly to AI

      May 18, 2025

      76-year-old father of deep learning Hinton left Google! Publishes AI threat theory, pessimistic prediction of catastrophic risk

      May 17, 2025

      What is the neural network of artificial intelligence?

      May 16, 2025
    • Big Data

      Winning Business Excellence with Data Analytics

      May 20, 2025

      Has the development of big data come to an end?

      May 19, 2025

      How Research Institutes Should Use Data Analytics Tools to Improve Research Efficiency

      May 18, 2025

      How to Program Big Data Effectively

      May 17, 2025

      Five database concepts, read the database layout of Amazon Cloud Technologies

      May 16, 2025
    • CLO

      Healthcare Explores Cloud Computing Market: Security Concerns Raise, Multi-Party Collaboration Urgently Needed

      May 20, 2025

      Remote work and cloud computing create a variety of endpoint security issues

      May 19, 2025

      Three common misconceptions about sustainability and cloud computing

      May 18, 2025

      Ten Ways Cloud-Native Development is Changing Cybersecurity

      May 17, 2025

      What is a multi-cloud network?

      May 16, 2025
    • IoT

      Smart Supply Chain Guide

      May 20, 2025

      Internet of Things and the Elderly

      May 19, 2025

      The Future of the Internet of Things and Self-Storage

      May 18, 2025

      Skills shortage remains the biggest barrier to IoT adoption in the oil and gas industry

      May 17, 2025

      Why the Metaverse Matters for the Future of Manufacturing

      May 16, 2025
    • Blockchain

      Blockchain Foundation - What is Blockchain Technology

      May 20, 2025

      Blockchain Wallet

      May 19, 2025

      Scientists propose quantum proof-of-work consensus for blockchain

      May 18, 2025

      How blockchain technology can be applied to environmental protection to drive a green economy

      May 17, 2025

      After the collision between quantum computing and blockchain - quantum blockchain

      May 16, 2025
    IT PARK
    Home » Blockchain » How blockchain is revolutionizing cybersecurity
    Blockchain

    How blockchain is revolutionizing cybersecurity

    The decentralized, consensus-driven and lack-of-trust nature of blockchains makes them inherently resilient to attacks.
    Updated: Apr 26, 2025
    How blockchain is revolutionizing cybersecurity

    In October 2020, Google publicly disclosed details about a cyber attack that occurred in September 2017. It reported that it was a distributed denial-of-service (DDoS) attack from a foreign country that lasted a total of six months and was the largest attack of its kind ever.

    Hackers exploited the decentralized nature of the Internet to both maintain anonymity and overcome resistance to the attack. A common approach to DDoS attacks is to infect multiple nodes in multiple domains to form a semi-coordinated network called a "botnet". These independent bots are then hijacked to launch attacks against more centralized targets, often giving hackers an asymmetric advantage. More distributed software deployments, database management and security protocols can reduce the vulnerability of targets by extending the attack surface and reducing the reliance on centralized trust.

    The key to this decentralized approach is that this is a solution that already has multiple features for which regional chains can defend against attacks.

         The asymmetric threat landscape

    While Google withstood the 2017 attack, it was unprecedented in scale. At the peak of the attack, it reached 2.5 Tbps (a metric for comparing DDoS attack events), four times as fast. In the last 10 years, the number of DDoS attacks has grown even more exponentially.

    The purpose of a DDoS attack is to limit or completely shut down traffic to a target network or service by sending false requests from multiple malicious infected sources to the target network or service. The decentralized nature of these attacks makes them difficult to defeat, as they have no single source that can be stopped.

    Instead, the targets of cyber attacks are largely more concentrated. Servers typically reside behind a limited number of IP addresses, providing a centralized attack surface where compromised passwords or password credentials can expose an entire database. Hackers can simultaneously control or restrict access to a large number of resources for ransom.

    To combat hackers, designs are moving away from the traditional centralized trust model to a more "untrustworthy" approach, especially with respect to security protocols. Assigning trust through consensus to verify important elements such as access, authentication and database transactions is a function for which blockchain is best suited.

         Blockchain is more than just encryption

    Over a decade ago, blockchain became essentially synonymous with cryptocurrency in public parlance. However, in addition to crypto-like smart contracts, non-fungible tokens (NFTs), decentralized financing and distributed software, other blockchain applications such as Ethereum have emerged as various use cases on other platforms.

    The decentralized, consensus-driven and lack-of-trust nature of blockchains makes them inherently resilient to attacks. For those blockchain solutions that leverage proof-of-work verification methods (such as Bitcoin), hackers must gain control of most nodes to disrupt ledger transactions - a computationally expensive approach by design. This computational cost can be extended to other types of operations in a security solution, thereby reducing the need for a central authority.

    Many DDoS attacks leverage Internet Domain Name Servers (DNS) - mapping IP addresses to readable website names. By moving the DNS to the blockchain, resources can be spread across multiple nodes, making it impossible for an attacker to control the database. Yet simply building databases or applications on the blockchain does not necessarily make them invulnerable. Hackers are very persistent, and they are becoming more powerful adversaries as governments become increasingly involved in cyber warfare.

    The process of building blockchains can be enhanced with AI to detect and prevent malicious data manipulation. Moreover, AI built specifically to protect systems or databases can be implemented on a more distributed model. As blockchain applications, there is no need to trust nodes to remain intact.

         The future will go decentralized

    DDoS, data breaches, ransomware attacks, social media phishing, and even direct cryptocurrency mining attacks are on the rise, costing victims hundreds of billions of dollars a year. The increasing frequency, sophistication, scale, and economic consequences of cyberattacks have the public increasingly worried, and governments and private organizations are looking for ways to keep up with the evolving threat.

    blockchain Security Network
    Previous Article Gartner's Latest Forecast: Global Cloud Revenue to Surpass Non-Cloud Revenue
    Next Article Has the development of big data come to an end?

    Related Articles

    Blockchain

    Blockchain technology helps track new crown virus

    Mar 31, 2025
    Blockchain

    Blockchain technology leads the wave of financial digitization

    Apr 06, 2025
    IoT

    Internet of Things and the Elderly

    May 19, 2025
    Most Popular

    NASA is developing an artificial intelligence interface where astronauts can talk directly to AI

    May 18, 2025

    Cloudera Extends Open Lake Warehouse All-in-One to Enable Trusted Enterprise AI

    Apr 09, 2025

    What causes the bitcoin network hash rate to increase?

    May 05, 2025
    Copyright © 2025 itheroe.com. All rights reserved. User Agreement | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.