Russian Federation
Russian Federation
Russian Federation
Russian Federation
The article considers the application of Markov processes to assess the states of a blockchain system. The peculiarities of using the Markov process model in the context of determining the set of possible states of the blockchain system are defined, and the key aspects of reliability and stability of its functioning are identified. The proposed approach is tested by modeling and determining the states of the Ethereum blockchain system when destructive influences are implemented by calling a reentrancy defect.
smart contracts, modeling of destructive influences, state transition graph, Markov process model, countermeasure methods
1. Repin M.M., Krivonogov A.A. Problemy obespecheniya informacionnoy bezopasnosti smart-kontraktov v sistemah na osnove tehnologii raspredelennyh reestrov. – M.: OOO «Izdatel'stvo TRIUMF», 2020. – 115 s. DOI: https://doi.org/10.32986/978-5-93673-286-7-08-2020; EDN: https://elibrary.ru/TNORHR
2. Krivonogov A.A., Repin M.M., Fedorov N.V. Metodika analiza uyazvimostey i opredeleniya urovnya bezopasnosti smart-kontraktov pri razmeschenii v sistemah raspredelennyh reestrov // Voprosy kiberbezopasnosti. – 2020. – №4(38). – S. 56-65. DOI: https://doi.org/10.21681/2311-3456-2020-04-56-65; EDN: https://elibrary.ru/AWSSNU
3. Cyrul'nik V.F., Magazev A.A. Primenenie odnoy markovskoy modeli bezopasnosti dlya povysheniya nadezhnosti i vybora optimal'noy konfiguracii // Prikladnaya matematika i fundamental'naya informatika. 2019. № 1(6) – S. 25-32. DOI: https://doi.org/10.25206/2311-4908-2019-6-1-25-32; EDN: https://elibrary.ru/IPXFVX
4. Scheglov K.A., Scheglov A.Yu. Markovskie modeli ugrozy bezopasnosti informacionnoy sistemy // Priborostroenie. 2015. T. 58, №12. – S. 957-965.
5. Gorohova V. F. Optimizaciya vybora sredstv zaschity ot atak s ispol'zovaniem pogloschayuschih markovskih cepey // Sistemy upravleniya, informacionnye tehnologii i matematicheskoe modelirovanie: sb. tr. po materialam IV Vserossiyskoy nauchno-prakticheskoy konferencii s mezhdunarodnym uchastiem: v 2 t. T. 1. 2022. – C. 126-134. DOI: https://doi.org/10.25206/978-5-8149-3487-1-2022-1-126-134; EDN: https://elibrary.ru/TDMART
6. Tokarev V.L. Skrytye markovskie modeli v zadache obnaruzheniya atak na komp'yuternye seti // Chebyshevskiy sbornik. 2021. №5 (81). – S. 391-399. DOI: https://doi.org/10.22405/2226-8383-2021-22-5-391-399; EDN: https://elibrary.ru/FDRRVI
7. Kornienko A. A., Nikitin A. B., Diasamidze S. V., Kuz'menkova E. Yu. Modelirovanie komp'yuternyh atak na raspredelennuyu informacionnuyu sistemu // Izvestiya Peterburgskogo universiteta putey soobscheniya. 2018. №4. – S. 613-626. EDN: https://elibrary.ru/ZAMGMH