Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Securing Blockchain Networks like Ethereum and Hyperledger Fabric
Securing Blockchain Networks like Ethereum and Hyperledger Fabric

Securing Blockchain Networks like Ethereum and Hyperledger Fabric: Learn advanced security configurations and design principles to safeguard Blockchain networks

By Alessandro Parisi
$29.99 $20.98
Book Apr 2020 244 pages 1st Edition
eBook
$29.99 $20.98
Print
$43.99
Subscription
$15.99 Monthly
eBook
$29.99 $20.98
Print
$43.99
Subscription
$15.99 Monthly

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now

Product Details


Publication date : Apr 13, 2020
Length 244 pages
Edition : 1st Edition
Language : English
ISBN-13 : 9781838646486
Category :
Concepts :
Table of content icon View table of contents Preview book icon Preview Book

Securing Blockchain Networks like Ethereum and Hyperledger Fabric

Introducing Blockchain Security and Attack Vectors

In this chapter, we will introduce the fundamental constitutive elements of blockchain technology, such as distributed ledger, peer-to-peer network topology, and consensus algorithms, all of which will be further explored in depth in the chapters that follow.

These notions are essential to fully understand the aspects of cyber security associated with blockchain technology, especially with regard to identifying possible attack vectors.

In particular, we will cover the following topics in this chapter:

  • An introduction to blockchain
  • The building blocks of blockchain
  • Blockchain network topology
  • Establishing trust through consensus algorithms
  • Potential threats that affect trust

An introduction to blockchain

The blockchain is often compared to the internet in terms of innovation potential. Just as the network of networks has allowed information and ideas to circulate globally, allowing for the reduction of gaps in terms of space and time, in the same way, the blockchain proposes to become the Internet of Value.

Another aspect that unites the internet and blockchain is their ability to disintermediate the productive sectors (starting from the financial one) to reduce the areas of inefficiency and allow the emergence of innovative solutions, thereby overcoming the rigidity derived from the status quo preserved by incumbent operators.

Blockchain as the Internet of Value

Blockchain is commonly defined...

The building blocks of blockchain

Now, we're going to analyze the constituent elements of the blockchain and start with the blocks. As we mentioned earlier, transactions are stored within the blockchain blocks, so each block is composed of two parts:

  • A block header, in which the link to the previous block is stored in the form of a hashing checksum digest. This is done to prevent the possibility of altering the transactions stored in the previous block.
  • A block body, containing the list of transactions, complete with relevant information (including the amount transferred, the addresses of peers, and so on).

The following diagram shows the structure of Bitcoin blocks and their mutual relationships within the blockchain:

You can check out the image in the following link, https://commons.m.wikimedia.org/wiki/File:Bitcoin_Block_Data.png. As a consequence of how the blocks...

Blockchain network topology

Now, let's look at the networking features of the blockchain.

The following diagram is a typical example of the centralized network topology, in which there is a central node that acts as a hub for sharing information with the other nodes:

You can check out the image in the following link, https://commons.m.wikimedia.org/wiki/File:NetworkCentral.svg. The advantages of the centralized network can be summarized by the fact that there is only one central authority (server) that acts as an arbitrator. This manages the requests coming from the remaining nodes of the network (clients).

However, the fundamental limit of centralized networks is the fact that the central node represents a single point of failure for the entire network (which can, therefore, be the target of Denial of Service attacks, for example). If the central node is compromised, all...

Establishing trust through consensus algorithms

As we mentioned in the previous paragraph, one of the main challenges we face in blockchain is to reach an agreement with all the counterparties regarding the validity of the transactions made, without having to resort to a central authority.

The blockchain adopts a collective coordination system, known as distributed consensus, which does not require centralized coordination.

This solution is inspired by the various examples that exist in nature regarding the collective coordination of independent individual behaviors, such as swarm intelligence, in order to reach a common goal (in the case of the blockchain, consent for the transactions being carried out).

On account of this, a collective decision-making process has to be introduced, in which all the nodes independently maintain a local copy of the transactions that are carried...

Potential threats that affect trust

The potential threats that might affect trust in the blockchain involve the following aspects:

  • The blockchain distributed architecture
  • The blockchain application layer
  • The blockchain security model

Now, let's look at some of the main threats concerning these different aspects.

Threats to the distributed architecture

In general, the security threats concerning the blockchain are different compared to traditional applications, precisely because of the distributed nature of the blockchain architecture. Therefore, many of the attacks that are performed on centralized architectures are actually ineffective when performed on blockchain. Nonetheless, the latter suffers from vulnerabilities...

Summary

In this chapter, we introduced the basic concepts of the blockchain and provided a reference framework regarding the topics we will cover in the following chapters. In particular, we have looked at the mechanisms that govern the achievement of consensus and trust within the blockchain and the possible threats in terms of security.

In the next chapter, we will introduce the cryptographic fundamentals that are used in the blockchain and fully understand their cyber security implications.

Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • Explore blockchain concepts such as cryptography, consensus algorithms, and security assumptions
  • Architect network security for mission-critical decentralized apps (Dapps) using design security considerations
  • Consider various deployment and operational aspects while building a blockchain network

Description

Blockchain adoption has extended from niche research to everyday usage. However, despite the blockchain revolution, one of the key challenges faced in blockchain development is maintaining security, and this book will demonstrate the techniques for doing this. You’ll start with blockchain basics and explore various blockchain attacks on user wallets, and denial of service and pool mining attacks. Next, you’ll learn cryptography concepts, consensus algorithms in blockchain security, and design principles while understanding and deploying security implementation guidelines. You’ll not only cover architectural considerations, but also work on system and network security and operational configurations for your Ethereum and Hyperledger Fabric network. You’ll later implement security at each level of blockchain app development, understanding how to secure various phases of a blockchain app using an example-based approach. You’ll gradually learn to securely implement and develop decentralized apps, and follow deployment best practices. Finally, you’ll explore the architectural components of Hyperledger Fabric, and how they can be configured to build secure private blockchain networks. By the end of this book, you’ll have learned blockchain security concepts and techniques that you can implement in real blockchain production environments.

What you will learn

Understand blockchain consensus algorithms and security assumptions Design secure distributed applications and smart contracts Understand how blockchains manage transactions and help to protect wallets and private keys Prevent potential security threats that can affect distributed ledger technologies (DLTs) and blockchains Use pentesting tools for assessing potential flaws in Dapps and smart contracts Assess privacy compliance issues and manage sensitive data with blockchain

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now

Product Details


Publication date : Apr 13, 2020
Length 244 pages
Edition : 1st Edition
Language : English
ISBN-13 : 9781838646486
Category :
Concepts :

Table of Contents

15 Chapters
Preface Chevron down icon Chevron up icon
Section 1: Blockchain Security Core Concepts Chevron down icon Chevron up icon
Introducing Blockchain Security and Attack Vectors Chevron down icon Chevron up icon
Cryptography Essentials Chevron down icon Chevron up icon
Blockchain Security Assumptions Chevron down icon Chevron up icon
Section 2: Architecting Blockchain Security Chevron down icon Chevron up icon
Trustless Blockchain Networks Chevron down icon Chevron up icon
Securing Hyperledger Fabric Chevron down icon Chevron up icon
Section 3: Securing Decentralized Apps and Smart Contracts Chevron down icon Chevron up icon
Decentralized Apps and Smart Contracts Chevron down icon Chevron up icon
Preventing Threats for DApps and Smart Contracts Chevron down icon Chevron up icon
Section 4: Preserving Data Integrity and Privacy Chevron down icon Chevron up icon
Exploiting Blockchain as an Attack Vector Chevron down icon Chevron up icon
Analyzing Privacy and GDPR Compliance Issues Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Filter icon Filter
Top Reviews
Rating distribution
Empty star icon Empty star icon Empty star icon Empty star icon Empty star icon 0
(0 Ratings)
5 star 0%
4 star 0%
3 star 0%
2 star 0%
1 star 0%

Filter reviews by


No reviews found
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.