{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T00:35:34Z","timestamp":1760402134270,"version":"build-2065373602"},"reference-count":22,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T00:00:00Z","timestamp":1586908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"\u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439 \u0424\u043e\u043d\u0434 \u0424\u0443\u043d\u0434\u0430\u043c\u0435\u043d\u0442\u0430\u043b\u044c\u043d\u044b\u0445 \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0439 (\u0420\u0424\u0424\u0418)","award":["19-37-90050\/19"],"award-info":[{"award-number":["19-37-90050\/19"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The present article describes the behavioral model of blockchain services; their reliability is confirmed on the basis of experimental data. The authors identify the main technical characteristics and features associated with data transmission through the network. The authors determine the network scheme, working with blockchain transactions and the dependence of network characteristics on application parameters. They analyze the application of this model for the detection of the blockchain service and the possibility of the existing security mechanisms of this technology being evaded. Furthermore, the article offers recommendations for hiding the blockchain traffic profile to significantly complicate its identification in the data network.<\/jats:p>","DOI":"10.3390\/fi12040068","type":"journal-article","created":{"date-parts":[[2020,4,16]],"date-time":"2020-04-16T05:15:41Z","timestamp":1587014141000},"page":"68","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Blockchain Behavioral Traffic Model as a Tool to Influence Service IT Security"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4077-6869","authenticated-orcid":false,"given":"Vasiliy","family":"Elagin","sequence":"first","affiliation":[{"name":"Infocommunication Systems Department, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, 193232 Saint Petersburg, Russia"}]},{"given":"Anastasia","family":"Spirkina","sequence":"additional","affiliation":[{"name":"Infocommunication Systems Department, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, 193232 Saint Petersburg, Russia"}]},{"given":"Andrei","family":"Levakov","sequence":"additional","affiliation":[{"name":"Center Macro-regional Branch or PJSC Rostelecom, 123298 Moscow, Russia"}]},{"given":"Ilya","family":"Belozertsev","sequence":"additional","affiliation":[{"name":"Infocommunication Systems Department, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, 193232 Saint Petersburg, Russia"}]}],"member":"1968","published-online":{"date-parts":[[2020,4,15]]},"reference":[{"key":"ref_1","unstructured":"Mougayar, W. (2016). The Business Blockchain, John Wiley & Sons Inc."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"5791","DOI":"10.1109\/JIOT.2019.2905743","article-title":"Blockchain-Enabled Wireless Internet of Things: Performance Analysis and Optimal Communication Node Deployment","volume":"6","author":"Sun","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Goldstein, A.B., Sokolov, N.A., Elagin, V.S., Onufrienko, A.V., and Belozertsev, I.A. (2019, January 20\u201321). Network Characteristics of Blockchain Technology of on Board Communication. Proceedings of the 2019 Systems of Signals Generating and Processing in the Field of on Board Communications, Moscow, Russia.","DOI":"10.1109\/SOSG.2019.8706826"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Cocco, L., Pinna, A., and Marchesi, M. (2017). Banking on Blockchain: Costs Savings Thanks to the Blockchain Technology. Future Internet, 9.","DOI":"10.3390\/fi9030025"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Sgantzos, K., and Grigg, I. (2019). Artificial Intelligence Implementations on the Blockchain. Use Cases and Future Applications. Future Internet, 11.","DOI":"10.3390\/fi11080170"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Li, Y. (2018). An Integrated Platform for the Internet of Things Based on an Open Source Ecosystem. Future Internet, 10.","DOI":"10.3390\/fi10110105"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Gatteschi, V., Lamberti, F., Demartini, C., Pranteda, C., and Santamar\u00eda, V. (2018). Blockchain and Smart Contracts for Insurance: Is the Technology Mature Enough?. Future Internet, 10.","DOI":"10.3390\/fi10020020"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3416","DOI":"10.1109\/COMST.2018.2842460","article-title":"A Survey on Security and Privacy Issues of Bitcoin","volume":"20","author":"Conti","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"10179","DOI":"10.1109\/ACCESS.2018.2799854","article-title":"When intrusion detection meets blockchain technology: A review","volume":"6","author":"Meng","year":"2018","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","article-title":"MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain","volume":"5","author":"Xia","year":"2017","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., and Pentland, A. (2015, January 21\u201322). Decentralizing Privacy: Using Blockchain to Protect Personal Data. Proceedings of the 2015 IEEE Security and Privacy Workshops, San Jose, CA, USA.","DOI":"10.1109\/SPW.2015.27"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1109\/TDSC.2016.2616861","article-title":"Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams","volume":"15","author":"Aitzhan","year":"2018","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_13","unstructured":"Antonopoulos, A.M. (2017). Mastering Bitcoin, O\u2019Reilly Media Inc."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/ACCESS.2017.2757955","article-title":"A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT","volume":"6","author":"Sharma","year":"2018","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Buinevich, M., Izrailov, K., and Vladyko, A. (2017, January 19\u201322). Testing of utilities for finding vulnerabilities in the machine code of telecommunication devices. Proceedings of the 19th International Conference on Advanced Communication Technology (ICACT), PyeongChang, Korea.","DOI":"10.23919\/ICACT.2017.7890122"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","article-title":"Machine Learning and Deep Learning Methods for Cybersecurity","volume":"6","author":"Xin","year":"2018","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"10127","DOI":"10.1109\/ACCESS.2018.2890507","article-title":"Blockchain for AI: Review and Open Research Challenges","volume":"7","author":"Salah","year":"2019","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TSIPN.2017.2749959","article-title":"Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems against False Data Injection Attacks and Jamming Attacks","volume":"4","author":"Guan","year":"2018","journal-title":"IEEE Trans. Signal Inf. Process. Over Netw."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Goldstein, A.B., Zarubin, A.A., Onufrienko, A.V., Elagin, V.S., and Belozertsev, I.A. (2018, January 4\u20135). Synchronization of delay for OTT services in LTE. Proceedings of the 2018 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO), Minsk, Belarus.","DOI":"10.1109\/SYNCHROINFO.2018.8456944"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Elagin, V.S., Belozertsev, I.A., Goldshtein, B.S., Onufrienko, A.V., and Vladyko, A.G. (2019, January 20\u201321). Models of QOE ensuring for OTT services. Proceedings of the 2019 Systems of Signals Generating and Processing in the Field of on Board Communications, Moscow, Russia.","DOI":"10.1109\/SOSG.2019.8706748"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/978-3-319-61382-6_19","article-title":"Investigation of Traffic Pattern for the Augmented Reality Applications","volume":"10372","author":"Makolkina","year":"2017","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/978-3-642-31665-4_21","article-title":"Delays models of measurement and control data transmission network","volume":"440","author":"Krupanek","year":"2013","journal-title":"Stud. Comput. Intell."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/4\/68\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:30:51Z","timestamp":1760362251000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/4\/68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,15]]},"references-count":22,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2020,4]]}},"alternative-id":["fi12040068"],"URL":"https:\/\/doi.org\/10.3390\/fi12040068","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2020,4,15]]}}}