Implementing a Nokia Bell Labs automated patch management via the Blockchain technology

29 August 2019

New Image

1 Introduction 2 Vulnerability Management 2.1 Threats and Patch management needs . . . . . . . . . . . . . . 2.2 Patch management policies and solutions . . . . . . . . . . . . 2.3 Existing Patching management methods and its challenges . 3 Proposed System 4 BFT Protocol 4.1 Challenges in existing BFT protocol . . . . . . . . . . . . . . . 5 HoneyBadger BFT 5.1 Features and Assumptions . . . . . . . . . . . . 5.1.1 Communication Network Assumptions 5.1.2 Timing Assumptions . . . . . . . . . . . 5.1.3 System Assumptions . . . . . . . . . . . 5.2 HBBFT protocol construction . . . . . . . . . . 5.2.1 Erasure Coding . . . . . . . . . . . . . . 5.2.2 Merkle Tree . . . . . . . . . . . . . . . . 5.2.3 Reliable Broadcast . . . . . . . . . . . . 5.2.4 Threshold Cryptography . . . . . . . . . 5.2.5 Cryptographic Common Coin . . . . . . 5.2.6 Binary Byzantine Agreement . . . . . . 5.2.7 Common Subset Agreement . . . . . . . 5.2.8 Construction of HoneyBadger BFT . . 6 Comparison HBBFT with other protocols 6.1 Network Model and Message Transmission 6.2 Attacks prevention and threats . . . . . . . 6.3 Blockchain Types and Timing Assumptions 6.4 Mining Methods . . . . . . . . . . . . . . . . 1 2 4 5 7 8 10 12 13 14 14 15 15 15 16 16 16 17 17 17 19 19 19 21 21 22 23 23