Anti-Malware With Blockchain - CSE105

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

An Approach For

A Distributed Anti-Malware System


Based on BlockChain Technology
Green University of Bangladesh
Department of
Computer Science & Engineering

Presenting to

MR. TAMIM AL MAHMUD


Assistant Professor & Program Coordinator
Dept. of CSE
Green University of Bangladesh
Green University of Bangladesh
Department of
Computer Science & Engineering

The
presenter

Name: Jahidul Islam


Std ID: 221002504
INTRODUCTION

Where Why Problems Solution

Either static or Distributed DB


dynamic based on
approaches BlockChain
Rapid uses of Malicious with existing Technology is
networking and activities and database. initialized to
computing security Cloud based store the hash
devices concerns Zero-day signature of the
Malware malware and
detectors with broadcast in
3rd party DataB, the network
Quick Fix
Initializing BlockChain technology

To initialize the blockchain, the first block must be


created manually. This block must have all the
characteristics of the chain. These are then Eradicating the involvement of third party.
shared at all the network nodes

BlockChain can ensure better data management


without involving any third party.

Building a Distributed database system

A Distributed Database Management System


(DDBMS) manages the distributed database and
provides mechanisms so as to make the databases
transparent to the users.
BlockChain
Technology
01 What is blockchain?

02 How blockchain works

03 Is blockchain secure?
What is Blockchain?
Blockchain is a shared, immutable ledger that
facilitates the process of recording transactions and
tracking assets in a network.

It is a distributed database that records network


transactions and organizes them into a hierarchical
chain. The chain of blocks is created and maintained
by a peer-to-peer network.
How blockchain works
Blockchain, as a peer-to-peer network, makes use of
clearly defined consensus for executing transactions
between the nodes.
Making transactions on the blockchain involves
Block formation, validation, acceptance.

The proof of work is used for block validation. Any


node in the network can attempt to validate the block
through a process called mining. Miners are awarded
in cryptocurrency for every successful validation of a
new block.
Is blockchain secure?
Blockchains have a heterogeneous architecture made
up of cryptographic algorithms and mathematical
models. The structure of the blocks plays a crucial role
in enabling distributed consensus and ensuring the
security of the system.

The blocks that form the network consist of: Data,


Hash value of the current block, Hash value of the
previous block, Timestamp, Additional information.
A

B C
References

2019 11th International Conference on Communicatio


n Systems & Networks (COMSNETS)

S. Talukder, S. Roy and Tamim. A. Mahmud,


"An Approach For An Distributed Anti-Malware System
Based on BlockChain Technology,“
2019 11th International Conference on Communication
Systems & Networks (COMSNETS),
2019, pp. 1-6, doi: 10.1109/COMSNETS.2019.8711449.

You might also like