Disclosure of Invention
The present invention is directed to an online financial transaction management system based on blockchains and big data, so as to solve the problems mentioned in the background art.
In order to solve the technical problems, the invention provides the following technical scheme: an online financial transaction management system based on blockchains and big data, characterized in that: the system comprises: the online transaction verification module, the verification vulnerability analysis module, the user information base, the vulnerability emergency processing module and the transaction asset exchange module;
the method comprises the following steps that a user requests for transaction through the online transaction verification module, pays automatic verification cost, places transaction requests in an order queue to be verified, confirms the priority of verification transaction, binds the transaction into a data block and then adds the data block to a block chain, monitors transaction delay and network congestion conditions through the verification vulnerability analysis module in the online transaction verification process, and acquires all transaction party information on a block chain node when monitoring abnormality, and comprises the following steps: the method comprises the steps of automatically verifying cost and cost of payment, position information of transaction parties distributed on a block chain and line information generated by transaction, collecting historical applied transaction information of all transaction parties, transmitting all the collected information to a user information base, analyzing and judging a mode of attacking the current interfered transaction by calling the collected information, searching historical transaction information of the attacking party, judging whether the corresponding attacking party has behaviors of network transaction congestion and delay caused by abuse attack, transmitting a judgment result to a vulnerability emergency processing module, inquiring position information of users with abuse attack behaviors distributed on the block chain through the vulnerability emergency processing module, modeling the whole block chain, confirming the address of the corresponding user, converting the address into an IP address, confirming the real address of the corresponding user, and delaying or interrupting bad transaction verification of participation of the corresponding user, and adopt temporary limit transaction measure to it, after solving the network congestion problem, register the binding transaction in the block chain through the exchange module of the said trade assets, record the transaction information and visible to the trade side, after the trade is finished, carry out the asset exchange automatically by both sides of trade, judge the potential attack mode that the present trade receives is favorable to taking measures in time, process the trade side with abusing the attack behavior, have reduced the holding time of the phenomenon of network congestion.
Furthermore, the online transaction verification module comprises a transaction order generation unit, a transaction order verification unit and a transaction block binding unit, a user requests for transaction through the transaction order generation unit and pays an automatic verification cost, the transaction request is placed in an order queue through the transaction order verification unit to be verified, the sequence of verification transactions is determined according to the paid automatic verification cost, the transaction is bound into a data block through the transaction block binding unit and then added into a block chain, and transaction process information is transmitted to the verification vulnerability analysis module.
Furthermore, the verification vulnerability analysis module comprises a network congestion monitoring unit, a transaction party information acquisition unit, a behavior data acquisition unit and an attack mode analysis unit, the network congestion condition is monitored through the network congestion monitoring unit, when abnormal network congestion is monitored, automatic verification cost paid by all transaction parties in transaction, angle and distance information of the corresponding transaction parties and a block chain center and line information generated by transaction are acquired through the transaction party information acquisition unit, historical transaction behavior data of all transaction parties are acquired through the behavior data acquisition unit, all acquired data are transmitted to the attack mode analysis unit through the user information base, and the attack mode analysis unit analyzes and judges the attack mode of the current interfered transaction according to the acquired data.
Further, the attack mode analyzing unit is used for judging the attack mode of the current interfered transaction, and the judgment specifically comprises the following steps: inquiring that the automatic verification cost paid by the current transaction is a, when the transaction order is waited to be verified, a third party, namely an attacker submits the same transaction order, the paid automatic verification cost is A, and A>a, judging that the current attack mode is a displacement attack; the number of times of transaction requested by one transaction party is m, m>The value set of 1, m transactions is W = { W = { (W)
1,W
2,...,W
mThe paid automatic verification cost set is b = { b = }
1,b
2,...,b
mIs divided according to the following formulaSeparately calculating transaction value thresholds
And automatically verifying a cost fee threshold
:
Wherein, Wi represents the transaction value of one random transaction, bi represents the automatic verification cost paid by the corresponding transaction, and the priority completion value of the transaction party is higher than that of the transaction party when the transaction party is inquired
And the cost of automatic verification is more than
While injecting all value less than
And the cost of automatic verification is more than
The current attack mode is judged to be suppression attack, the value of transaction request of a transaction party requesting for multiple transactions and the paid automatic verification cost are compared with a threshold value, so that whether the corresponding transaction party has suppression attack behaviors or not is judged, and whether abuse attack behaviors exist in the transaction party or not is judged accurately.
Furthermore, the action data acquisition unit acquires that the number of times of historical transaction completion of transaction parties is K = { K1, K2.. and Kn }, the number of times of transaction completion through the attack mode is K = { K1, K2.. and Kn }, wherein n represents the number of transaction parties, and if Ki is greater than Ki/2, Ki represents the number of times of historical transaction completion of a random transaction party, and Ki represents the number of times of transaction completion of a corresponding transaction party through the attack mode, network transaction congestion caused by abuse attack of the corresponding transaction party is judged, and the judgment result is transmitted to the vulnerability emergency processing module.
Further, the vulnerability emergency processing module comprises a position information query unit, an IP address conversion unit, an abuse attack suppression unit and a bad transaction limiting unit, wherein the position information query unit is used for querying the position information distributed on the block chain of the transaction party with abuse attack behaviors, the block chain center is used as an origin point for modeling, the address where the corresponding user is located is confirmed, the IP address conversion unit is used for converting the address into the IP address, the abuse attack suppression unit is used for suspending or delaying the transaction verification process participated by the transaction party, the bad transaction limiting unit is used for temporarily deleting the transaction party address from the block chain, and warning is given and short-time transaction limitation is carried out on the transaction party. Further, all transaction parties with abuse attack behaviors are screened out through the position information inquiry unit, and the angle set of the connecting line of the node where the corresponding transaction party is located and the center of the block chain and the horizontal direction is inquired in the user information base to be the angle set

={
,
,...,
And the distance set from the center of the blockchain is L = { L1, L2., LJ }, wherein J represents the number of transaction parties abusive attacks, and the position abscissa xi and the total coordinate yi of a random transaction party are respectively calculated according to the following formula:
wherein Li represents the distance from the node where the corresponding transaction party is located to the center of the blockchain,

the method comprises the steps of representing an included angle between a connecting line of a node where a corresponding transaction party is located and the center of a block chain and the horizontal direction, obtaining a transaction position coordinate set of abuse attack, wherein the transaction position coordinate set is (x, y) = { (x 1, y 1), (x 2, y 2),. · xJ, yJ) }, mapping the address where the transaction party is located by the position coordinate, converting the address into an IP address by an IP address conversion unit, suspending or delaying a transaction verification process involving the corresponding transaction party by the abuse attack suppression unit, temporarily deleting the address of the transaction party from the block chain by the bad transaction limitation unit, giving an alarm and carrying out short-time transaction limitation, modeling the transaction block chain, calculating the position coordinate of the transaction party according to the distance and angle data between the node where the transaction party with abuse attack acts and the block chain, and aiming at improving the mapping address of distribution information of the transaction party on the block chain, the method is favorable for accurately and temporarily deleting the address of the transaction party from the block chain, improves the accuracy of searching the warning for the object, and improves the congestion delay phenomenon of decentralized online financial transaction.
Furthermore, the transaction asset exchange module comprises a binding transaction registration unit and an online asset exchange unit, after the problem of network congestion is solved, the binding transaction is registered in a block chain through the binding transaction registration unit, transaction information is recorded and is visible to a transaction party, and after the transaction is finished, the asset exchange is automatically executed by the transaction parties through the online asset exchange unit.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention monitors decentralized online financial transaction delay and network congestion conditions through a verification vulnerability analysis module, collects transaction party information to judge whether the current transaction is under potential attack when abnormity is monitored, analyzes an attack mode, judges whether the transaction party has abuse attack behavior according to the historical transaction information of the transaction party to cause congestion and delay phenomena of network transaction, screens out transaction parties with corresponding behaviors through a vulnerability emergency processing module, inquires the relative position of a node where the transaction party is located and a block chain center, confirms the distribution position information of the transaction party on a block chain, maps an IP address of the transaction party, confirms the transaction party information through the IP address, delays or interrupts the currently involved transaction verification process, warns in a mode of temporarily limiting the transaction, and accurately and effectively improves network transaction congestion and network congestion caused by abuse attack, The delay phenomenon realizes benign fair competition of decentralized online financial transactions under an incentive mechanism.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Referring to fig. 1, the present invention provides the following technical solutions: an online financial transaction management system based on blockchains and big data, characterized in that: the system comprises: the online transaction verification module, the verification vulnerability analysis module, the user information base, the vulnerability emergency processing module and the transaction asset exchange module;
the method comprises the following steps that a user requests for transaction through an online transaction verification module, pays automatic verification cost, places a transaction request in an order queue to be verified, confirms the priority of verification transaction, binds the transaction into a data block and then adds the data block to a block chain, monitors transaction delay and network congestion conditions through a verification vulnerability analysis module in the online transaction verification process, and acquires all transaction party information on a block chain node when monitoring abnormality, and the method comprises the following steps: the method comprises the steps of automatically verifying cost and expense for payment, distributing position information of transaction parties on a block chain and line information generated by transaction, collecting historical applied transaction information of all transaction parties, transmitting all the collected information to a user information base, analyzing and judging a mode of attacking the current interfered transaction by calling the collected information, searching historical transaction information of the attacking party, judging whether the corresponding attacking party has behaviors of network transaction congestion and delay caused by abuse attack, transmitting a judgment result to a vulnerability emergency processing module, inquiring position information distributed on the block chain by a user with abuse attack behaviors through the emergency processing module, modeling the whole block chain, confirming an address of the corresponding user, converting the address into an IP address, confirming a real address of the corresponding user, and delaying or interrupting bad transaction verification participated by the corresponding user, and adopt temporary limit transaction measure to it, after solving the network congestion problem, register the binding transaction in the block chain through trading the asset exchange module, record the transaction information and visible to the transaction side, after the transaction is finished, carry out the asset exchange automatically by both sides of transaction, judge the potential attack mode that the present transaction receives is favorable to taking measures in time, deal with the transaction side that has abuse attack behavior, can reduce the network congestion phenomenon holding time effectively.
The online transaction verification module comprises a transaction order generation unit, a transaction order verification unit and a transaction block binding unit, a user requests for transaction through the transaction order generation unit and pays automatic verification cost fees, the transaction request is placed in an order queue through the transaction order verification unit and waits for verification, the sequence of verification transaction is determined according to the paid automatic verification cost fees, the transaction is bound into a data block through the transaction block binding unit and then added into a block chain, and transaction process information is transmitted to the verification vulnerability analysis module.
The verification vulnerability analysis module comprises a network congestion monitoring unit, a transaction party information acquisition unit, a behavior data acquisition unit and an attack mode analysis unit, the network congestion condition is monitored through the network congestion monitoring unit, when abnormal network congestion is monitored, automatic verification cost paid by all transaction parties in transaction, angle and distance information of the corresponding transaction parties and a block chain center and line information generated by transaction are acquired through the transaction party information acquisition unit, historical transaction behavior data of all transaction parties are acquired through the behavior data acquisition unit, all acquired data are transmitted to the attack mode analysis unit through a user information base, and the attack mode analysis unit analyzes and judges the mode of the current interfered transaction.
The attack mode analysis unit is used for judging the mode of the current interfered transaction, and the method specifically comprises the following steps: inquiring that the automatic verification cost paid by the current transaction is a, when the transaction order is waited to be verified, a third party, namely an attacker submits the same transaction order, the paid automatic verification cost is A, and A>a, judging that the current attack mode is a displacement attack; the number of times of transaction requested by one transaction party is m, m>The value set of 1, m transactions is W = { W1, W2., Wm }, the value set of paid auto-verification cost is b = { b1, b 2., bm }, and the transaction value threshold is calculated according to the following formula respectively
And automatically verifying a cost charge threshold
:
Wherein Wi represents a random one timeThe transaction value bi represents the cost of automatic verification corresponding to the transaction payment, and the priority completion value of the transaction party is higher than that of the transaction party when the transaction party is inquired
And the cost of automatic verification is more than
While injecting into the market all values less than
And the cost of automatic verification is more than
The purpose of comparing the value of the transaction request of a transaction party requesting for multiple transactions and the paid automatic verification cost with the threshold value is to judge whether the corresponding transaction party has the suppression attack behavior currently, so that whether the transaction party has the abuse attack behavior can be accurately judged.
The historical transaction completion times of transaction parties collected by the behavior data collection unit are K = { K1, K2.,. Kn }, the historical transaction completion times of transaction parties through the attack mode are K = { K1, K2.,. Kn }, wherein n represents the number of transaction parties, if Ki is larger than Ki/2, Ki represents the historical transaction completion times of a random transaction party, Ki represents the transaction completion times of a corresponding transaction party through the attack mode, network transaction congestion caused by abuse attack of the corresponding transaction party is judged, and the judgment result is transmitted to the vulnerability emergency processing module.
The vulnerability emergency processing module comprises a position information query unit, an IP address conversion unit, an abuse attack inhibiting unit and a bad transaction limiting unit, wherein the position information distributed on a block chain by a transaction party with an abuse attack behavior is queried through the position information query unit, modeling is carried out by taking the center of the block chain as an origin, the address of a corresponding user is confirmed, the address is converted into the IP address through the IP address conversion unit, the transaction verification process participated by the transaction party is suspended or delayed through the abuse attack inhibiting unit, the address of the transaction party is temporarily deleted from the block chain through the bad transaction limiting unit, warning is given, and short-time transaction limitation is carried out on the address.
All transaction parties with abuse attack behaviors are screened out through the position information query unit, and the included angle set of the connecting line of the node where the corresponding transaction party is located and the block chain center and the horizontal direction is queried in the user information base
={
,
,...,
And the distance set from the center of the blockchain is L = { L1, L2., LJ }, wherein J represents the number of transaction parties abusive attacks, and the position abscissa xi and the total coordinate yi of a random transaction party are respectively calculated according to the following formula:
wherein Li represents the distance from the node where the corresponding transaction party is located to the center of the blockchain,

the included angle between the connecting line of the node where the corresponding transaction party is located and the center of the block chain and the horizontal direction is represented, the transaction position coordinate set for obtaining the abuse attack is (x, y) = { (x 1, y 1), (x 2, y 2),... -, (xJ, yJ) }, the address where the transaction party is located is mapped by the position coordinate, the address is converted into an IP address through an IP address conversion unit,the transaction verification process of participation of a corresponding transaction party is suspended or delayed through the abuse attack inhibiting unit, the address of the transaction party is temporarily deleted from the block chain through the bad transaction limiting unit, warning is given and short-time transaction limitation is carried out, modeling is carried out on the transaction block chain, and the position coordinate of the transaction party is calculated according to the distance and angle data between the node where the transaction party with abuse attack behaviors is located and the block chain, so that the purpose of improving the distribution information of the transaction party on the block chain to map the address where the transaction party is located is achieved, the address of the transaction party is conveniently and accurately temporarily deleted from the block chain, the accuracy of finding a warning given object is improved, and the congestion delay phenomenon of decentralized online financial transaction is improved.
The transaction asset exchange module comprises a binding transaction registration unit and an online asset exchange unit, after the problem of network congestion is solved, the binding transaction is registered in a block chain through the binding transaction registration unit, transaction information is recorded and is visible to a transaction party, and after the transaction is completed, the asset exchange is automatically executed by the transaction parties through the online asset exchange unit.
The first embodiment is as follows: 3 transaction parties with abuse attack behaviors are screened out through the position information query unit, and the included angle set of the connecting line of the node where the corresponding transaction party is located and the block chain center and the horizontal direction is queried in the user information base
={
,
,
}={
,
,
Set of distances to the center of the blockchain is L = { L1, L2, L3} = {100, 60, 80}, according to the formula
And
calculating the position abscissa of the transaction part respectively
,
,
(ii) a Ordinate of the curve
,
,
The set of position coordinates of the transaction location for which an abuse attack is derived is (x, y) = { (x 1, y 1), (x 2, y 2), (x 3, y 3) } { (
,
),(
,
),(
,
) Mapping the address of the trading party by the position coordinate, converting the address into an IP address by an IP address conversion unit, suspending or delaying the trading verification process participated by the corresponding trading party by an abuse attack suppression unit, temporarily deleting the address of the trading party from a block chain by a bad trading limitation unit, giving a warning and carrying out short-time trading limitation.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described above, or equivalents may be substituted for elements thereof. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.