Home > Blockchain >  Set the Wisdom Chain nodes should pay attention to what are the risks?
Set the Wisdom Chain nodes should pay attention to what are the risks?

Time:09-16



Wisdom Chain as a hybrid consensus + DPoS) (PoW public Chain, need to rely on common mechanism of entire network nodes coordinate, and node also need to get involved in the network consensus WDC, or maintenance of network security to ensure its own economic losses, it's also one of the most interest in consensus design core -- rely on the pledge to bind the benefit of the node and the network,

On the other hand, the existence of the punishment mechanism also put an end to the node from the point of view of economy may attack at random, but although punishment mechanisms of beginner's mind is good, but if the node in the early set because some artificial holes, or because of an insufficient security Settings punished by malicious attacks caused pledge, these will cause unnecessary loss to the node, then, become Wisdom Chain nodes, especially the WDC pledge to participate in the mining nodes, should pay attention to what are the risks?

01
Malicious software risk
Because Wisdom Chain need a piece of node online and to monitor the network information timely reply for a long time, some users in order to facilitate management adopted personal devices (such as a personal desktop or laptop computer) to run the miners nodes,

Despite the individual nodes on the maintenance and use a lot of convenience, but because it involves the daily web browsing and other software running, the risk of being malicious software and extortion threats also increased,



Malicious software or blackmail will threat the node's wallet safety and operation stability, will make the wallet stolen miner's threats to assets, and malicious software result in system failure will affect the miners in Wisdom the stable operation on the Chain, would trigger if dropped "frequent punishment mechanism miners addresses are blocked,

In order to avoid the risks of malicious software, miners should try to choose a special tool to dig the node set, common ideal option is to miners software hosted on a dedicated server or a VPS, then dig through SSH remote link to the hosting server Settings,

Dedicated server to avoid the risk of daily use of malicious software, but need to make sure the dedicated server provider does not have the back door or eavesdropping data behavior,

02
DDoS attack risk
Chain projects most of the blocks are required to dig node need public IP, Wisdom Chain, Chain network public IP is to ensure that blocks from the witch Attack, Sybil Attack), while the IP address on the network can check at any time, but as long as don't take the initiative to disclose, want to determine an IP address and contact mining node is pretty difficult,

On the other hand, if a particular IP address can be linked with mining node, or the IP address of the mining node was leaked, and lack of protective measures, so there will be a great risk of the mining node DDoS attacks,

DDoS attack nodes, will be due to the large number of loss traffic bandwidth resources, and a lot of loss of system resources, make its can't receive and send information to the network in a timely manner, if the system resources are DDoS, then processing blocks and trading will be greatly slowed, is unable to catch up with the network process, in this case, because the miners cannot timely, even DDoS no other effects, and may keep the miners due to network punishment is pulled into the blacklist,



In order to prevent DDoS attacks, root, avoid IP address without leakage, or by means of sociology - hide IP is a block chain nodes, for example by the agent will flow disguised as video traffic, other nodes will not according to the nature of traffic information to determine the node, in addition to this, the firewall or the third party flow control service also is right choice, but may have found that the network nodes and receiving adversely affecting trading,

"Sentinel node is put forward by the recent" against DDoS attack means to cope with the situation, the so-called "sentinel node" means that replicates the mining node information of all nodes, through the sentinel node as intermediary, avoiding the IP address of the miners directly connected network leakage risk, once the sentinel node attack, the user can directly disconnects from the sentinel node link, and create new sentinel node as an intermediary link to the network,

03
Strengthen the safety consciousness of node
Many chain safety design emphatically to the block chain governance and economic mechanism, but under the chain node security is still not negligible, directly attacks cause for node drops, on the one hand caused economic losses to the node, on the other hand also to some extent, weakens the network security,

When the node attack into our system, such as the currency of the solar eclipse, will make the network into a bifurcation point, therefore, from the traditional offline security point of view, strengthen the safety consciousness and protection means nodes are necessary,

It should be pointed out that, not just the mining miners, Wisdom Chain the verifier () has not yet joined, future plans and all the nodes also needs to strengthen the defense of the risk, the verifier involves the behavior of the network and computing resources consumption such as block validation, you need to ensure that itself is not affected by DDoS attacks; All nodes or node in order to verify the success of transaction, also need to network resources, only do best without drain, and time to make themselves from assets loss,




Focus on Wisdom Chain dynamic
Twitter: @ Wisdom_Chain
Weibo: WisdomChain
Zhihu: wisdom chain technology community
Facebook: WisdomChain
Telegram: @ WisdomPublicChain


The related resources
WIsdom of Chain and Chain document repository:
https://docs.wisdchain.com/#/
Wisdom Chain website:
https://wisdchain.io/
Wisdom Chain technology BBS:
http://tech.wisdchain.io/
Wisdom Chain open source code library:
https://github.com/WisedomChainGroup
Wisdom Chain block browser:
https://scan.wisdchain.com
  • Related