Analysis of planes of attacks on the Blockchain system
DOI:
https://doi.org/10.30837/rt.2020.1.200.10Keywords:
Blockchain technology, malicious mining, 51% attack, DDoS attacks and DNS attacksAbstract
This paper presents a study of attack planessurfaces and possible ways of conducting various attacks on decentralized systems based on Blockchain technology. To accomplish the task, the effectiveness of the attack is studied relative to the plane of its application, namely, relatively: cryptographic designs of Blockchain technology, distributed architecture of systems based on Blockchain technology, Blockchain application context. Several attacks have been identified for each of these planes, including malicious mining strategies, coordinated peer behavior, 51% attacks, domain name attacks (DNS), distributed denial of service attacks, delayed consensus achieving, Blockchain branching, orphaned and obsolete blocks, digital wallet thefts and privacy attacks.
An attack by malicious mining allows an attacker to increase rewards by intentionally keeping his blocks closed in order to obtain a longer version of the Blockchain register than the current main version of the register. A 51% attack occurs when a single attacker, a group of nodes, or a mining pool (a combination of miners) in a network reaches most of the total processing power of mining in the system and gets the ability to manipulate the functionality of the Blockchain system. In the plane of DNS attacks, an attacker can potentially isolate peers of the Blockchain system, distribute fake blocks with fraudulent transactions among new nodes, and invalidate transactions. Manifestations of DDoS attacks can vary, depending on the nature of the functionality of the Blockchain application, the features of its network architecture and the behavior of peer nodes. Measures to counter attacks on peer-to-peer peer-to-peer architecture are considered.
References
Siegel D. Understanding the DAO attack. [Online]. 2016. Available: https://www.coindesk.com/understanding-dao-hack-journalists .
Baldwin C. Bitcoin worth 72 million stolen from Bitfinex exchange in Hong Kong [Online]. Reuters, 2016. Available: http://reut.rs/2gc7iQ9.
Kwon Y., Kim D., Son Y., Vasserman E., Kim Y. Be selfish and avoid dilemmas: Fork after withholding (FAW) attacks on Bitcoin, in CCS '17: Proceeding of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017. Р. 195-209.
Eyal I., Sirer E. G. How to disincentivize large Bitcoin mining pools. Bitcoin Block Explorer. 2014. [Online]. Available: https://www.blockchain.com/charts.
Eyal I., Sirer E.G. Majority is not enough: Bitcoin mining is vulnerable // Proceedings of the Eighteenth International Conference on Financial Cryptography and Data Security. 2014. Р. 436-54.
Bitcoin Community. “51 % Attack”. 2017. [Online]. Available: https://learncryptography.com/cryptocurrencyl5l-attack.
Bastian M. Preventing the 51 %-attack: A stochastic analysis of two phase proof of work in Bitcoin. [Online]. 2015. Available: https://goo.gl/nJsMzV.
Bitcoin developer guide. [Online]. 2017. Available: https://bitcoinorg/en/developer-guide.
Kang A.R., Spaulding J., Mohaisen A. Domain name system security and privacy: Old problems and new challenges. [Online]. CoRR. 2016. Available: http://arxiv.org/abs/1606.07080.
Muncaster P. World's largest Bitcoin exchange Bitfinex crippled by DDoS. [Online]. 2017. Available: http://bit.ly/2kqo6HU.
Cimpanu C. Bitcoin trader hit by 'severe DDoS attack' as Bitcoin price nears all-time high. [Online]. 2017. Available: http://bit.ly/21A5iT6.
Sapirshtein A., Sompolinsky Y., Zohar A. Optimal selfish mining strategies in Bitcoin // Financial Cryptography and Data Security. Springer. 2016. Р. 515-532.
Heilman E. One weird trick to stop selfish miners: fresh Bitcoins, a solution for the honest miner // Financial Cryptography and Data Security. Springer. 2014. Р. 161-169.
Solat S., Potop-Butucaru M. ZeroBlock: Preventing selfish mining in Bitcoin // arXiv Preprint. ArXiv: v:1605.02435. 2016.
Johnson B., Laszka A., Grossklags J., Vasek M., Moore T. Game-theoretic analysis of DDoS attacks against Bitcoin mining pools // Financial Cryptography and Data Security. Springer. 2014. Р. 72-86.
Silva P. DNSSEC: The antidote to DNS cache poisoning and other DNS attacks // An F5 Networks, Inc Technical Brief. 2009.
Fleder M., Kester M.S., Pillai S. Bitcoin transaction graph analysis // arXiv Preprint Xiv:1502.01657. 2015.
Huilsing A., Butin D., Gazdag S., Mohaisen A. XMSS: Extended hash-based signatures. [Online]. 2015. Available: https://www.ietf.org/id/draftirtf-cfrg:xmss-hash-based-signatures-10.txt.
Saad M., Mohaisen A., Kamhoua C., Kwiat K., Njilla L. Countering double spending in next-generation Blockchains // 2018 IEEE International Conference on Communications. Kansas City. 2018.
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).