A Denial-of-Service Attack Based on Selfish Mining and Sybil Attack in Blockchain Systems

被引:0
|
作者
Zhang, Jing [1 ]
Zha, Chunming [1 ]
Zhang, Qingbin [1 ]
Ma, Shaohua [1 ]
机构
[1] Henan Polytech Univ, Coll Software, Jiaozuo 454000, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Privacy; Profitability; Buildings; Proof of Work; Denial-of-service attack; Blockchains; Consensus protocol; Security; Synchronization; Game theory; Blockchain; mining attack; selfish mining; Sybil attack; denial of service;
D O I
10.1109/ACCESS.2024.3499350
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of blockchain security research, especially regarding the core Proof of Work (PoW) consensus mechanism, researchers continue to reveal novel methods of mining attacks. Recently, Wang et al. demonstrated an innovative attack mode: the Selfish Mining-based denial of service (SDoS) attack, revealing how this attack strategy introduces a new threat to the blockchain system through the selfish mining strategy. Expanding upon Wang et al.'s findings, our research refines the mining strategy by integrating the strategy of Equal-Fork Stubborn Mining, a more sophisticated variant of selfish mining that can significantly enhance the attacker's advantage under certain network conditions. Furthermore, we combine this refined strategy with a Sybil attack aimed at disrupting the normal propagation and confirmation processes of blocks within the blockchain system, effectively reducing the income of honest miners. Therefore, we propose a new mining attack - a denial of service (SSDoS) attack based on selfish mining and sybil attack. Our experimental results indicate that compared to other known mining attacks, the implementation of the SSDoS attack by an attacker drastically reduces the willingness of honest miners to continue their mining activities, leading to a significantly lower level of participation. For an honest miner controlling 10% of the total computational power, the portion of the critical profitability factor calculated in SSDoS that is higher than the one calculated in SDoS accounts for about 25%.
引用
收藏
页码:170309 / 170320
页数:12
相关论文
共 50 条
  • [1] SDoS: Selfish Mining-Based Denial-of-Service Attack
    Wang, Qiuhua
    Xia, Tianyu
    Wang, Dong
    Ren, Yizhi
    Miao, Gongxun
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3335 - 3349
  • [2] Optimal Selfish Mining-Based Denial-of-Service Attack
    Wang, Qiuhua
    Li, Chengyu
    Xia, Tianyu
    Ren, Yizhi
    Wang, Dong
    Zhang, Guoyan
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 835 - 850
  • [3] Denial-of-Service Attack Detection System
    Thakare, Supriya S.
    Kaur, Parminder
    2017 1ST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND INFORMATION MANAGEMENT (ICISIM), 2017, : 281 - 285
  • [4] Intrusion Detection Systems' Performance for Distributed Denial-of-Service Attack
    de Sousa Araujo, Tiago Emilio
    Matos, Fernando Menezes
    Moreira, Josilene Aires
    2017 CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (CHILECON), 2017,
  • [5] Denial-of-Service attack Possibilities on NFC Technology
    Fahrianto, Feri
    Lubis, Muhammad Fadil
    Fiade, Andrew
    2016 4TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT, 2016, : 228 - 232
  • [6] Denial-of-service attack-detection techniques
    Carl, G
    Kesidis, G
    Brooks, RR
    Rai, S
    IEEE INTERNET COMPUTING, 2006, 10 (01) : 82 - 89
  • [7] Honeypot Scheme for Distributed Denial-of-Service Attack
    Das, Vinu V.
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 497 - 501
  • [8] Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
    Tan, Zhiyuan
    Jamdagni, Aruna
    He, Xiangjian
    Nanda, Priyadarsi
    Liu, Ren Ping
    NEURAL INFORMATION PROCESSING, PT III, 2011, 7064 : 756 - +
  • [9] Stabilization of distributed cyber physical systems subject to denial-of-service attack
    Mahmoud, Magdi S.
    Hamdan, Mutaz M.
    INTERNATIONAL JOURNAL OF CONTROL, 2022, 95 (03) : 692 - 702
  • [10] Event-Triggered Control for Switched Systems With Denial-of-Service Attack
    Zhao, Rui
    Zuo, Zhiqiang
    Wang, Yijing
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (08) : 4077 - 4090