Analysis of planes of attacks on the Blockchain system

Authors

  • P.I. Stetsenko
  • G.Z. Khalimov
  • E.V. Kotukh

DOI:

https://doi.org/10.30837/rt.2020.1.200.10

Keywords:

Blockchain technology, malicious mining, 51% attack, DDoS attacks and DNS attacks

Abstract

This paper presents a study of attack planessurfaces and possible ways of conducting various attacks on decentralized systems based on Blockchain technology. To accomplish the task, the effectiveness of the attack is studied relative to the plane of its application, namely, relatively: cryptographic designs of Blockchain technology, distributed architecture of systems based on Blockchain technology, Blockchain application context. Several attacks have been identified for each of these planes, including malicious mining strategies, coordinated peer behavior, 51% attacks, domain name attacks (DNS), distributed denial of service attacks, delayed consensus achieving, Blockchain branching, orphaned and obsolete blocks, digital wallet thefts and privacy attacks.
An attack by malicious mining allows an attacker to increase rewards by intentionally keeping his blocks closed in order to obtain a longer version of the Blockchain register than the current main version of the register. A 51% attack occurs when a single attacker, a group of nodes, or a mining pool (a combination of miners) in a network reaches most of the total processing power of mining in the system and gets the ability to manipulate the functionality of the Blockchain system. In the plane of DNS attacks, an attacker can potentially isolate peers of the Blockchain system, distribute fake blocks with fraudulent transactions among new nodes, and invalidate transactions. Manifestations of DDoS attacks can vary, depending on the nature of the functionality of the Blockchain application, the features of its network architecture and the behavior of peer nodes. Measures to counter attacks on peer-to-peer peer-to-peer architecture are considered.

References

Siegel D. Understanding the DAO attack. [Online]. 2016. Available: https://www.coindesk.com/understanding-dao-hack-journalists .

Baldwin C. Bitcoin worth 72 million stolen from Bitfinex exchange in Hong Kong [Online]. Reuters, 2016. Available: http://reut.rs/2gc7iQ9.

Kwon Y., Kim D., Son Y., Vasserman E., Kim Y. Be selfish and avoid dilemmas: Fork after withholding (FAW) attacks on Bitcoin, in CCS '17: Proceeding of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017. Р. 195-209.

Eyal I., Sirer E. G. How to disincentivize large Bitcoin mining pools. Bitcoin Block Explorer. 2014. [Online]. Available: https://www.blockchain.com/charts.

Eyal I., Sirer E.G. Majority is not enough: Bitcoin mining is vulnerable // Proceedings of the Eighteenth International Conference on Financial Cryptography and Data Security. 2014. Р. 436-54.

Bitcoin Community. “51 % Attack”. 2017. [Online]. Available: https://learncryptography.com/cryptocurrencyl5l-attack.

Bastian M. Preventing the 51 %-attack: A stochastic analysis of two phase proof of work in Bitcoin. [Online]. 2015. Available: https://goo.gl/nJsMzV.

Bitcoin developer guide. [Online]. 2017. Available: https://bitcoinorg/en/developer-guide.

Kang A.R., Spaulding J., Mohaisen A. Domain name system security and privacy: Old problems and new challenges. [Online]. CoRR. 2016. Available: http://arxiv.org/abs/1606.07080.

Muncaster P. World's largest Bitcoin exchange Bitfinex crippled by DDoS. [Online]. 2017. Available: http://bit.ly/2kqo6HU.

Cimpanu C. Bitcoin trader hit by 'severe DDoS attack' as Bitcoin price nears all-time high. [Online]. 2017. Available: http://bit.ly/21A5iT6.

Sapirshtein A., Sompolinsky Y., Zohar A. Optimal selfish mining strategies in Bitcoin // Financial Cryptography and Data Security. Springer. 2016. Р. 515-532.

Heilman E. One weird trick to stop selfish miners: fresh Bitcoins, a solution for the honest miner // Financial Cryptography and Data Security. Springer. 2014. Р. 161-169.

Solat S., Potop-Butucaru M. ZeroBlock: Preventing selfish mining in Bitcoin // arXiv Preprint. ArXiv: v:1605.02435. 2016.

Johnson B., Laszka A., Grossklags J., Vasek M., Moore T. Game-theoretic analysis of DDoS attacks against Bitcoin mining pools // Financial Cryptography and Data Security. Springer. 2014. Р. 72-86.

Silva P. DNSSEC: The antidote to DNS cache poisoning and other DNS attacks // An F5 Networks, Inc Technical Brief. 2009.

Fleder M., Kester M.S., Pillai S. Bitcoin transaction graph analysis // arXiv Preprint Xiv:1502.01657. 2015.

Huilsing A., Butin D., Gazdag S., Mohaisen A. XMSS: Extended hash-based signatures. [Online]. 2015. Available: https://www.ietf.org/id/draftirtf-cfrg:xmss-hash-based-signatures-10.txt.

Saad M., Mohaisen A., Kamhoua C., Kwiat K., Njilla L. Countering double spending in next-generation Blockchains // 2018 IEEE International Conference on Communications. Kansas City. 2018.

Downloads

How to Cite

Stetsenko, P., Khalimov, G., & Kotukh, E. (2020). Analysis of planes of attacks on the Blockchain system. Radiotekhnika, 1(200), 114–121. https://doi.org/10.30837/rt.2020.1.200.10

Issue

Section

Articles