A Denial-of-Service Attack Based on Selfish Mining and Sybil Attack in Blockchain Systems

被引:0
|
作者
Zhang, Jing [1 ]
Zha, Chunming [1 ]
Zhang, Qingbin [1 ]
Ma, Shaohua [1 ]
机构
[1] Henan Polytech Univ, Coll Software, Jiaozuo 454000, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Privacy; Profitability; Buildings; Proof of Work; Denial-of-service attack; Blockchains; Consensus protocol; Security; Synchronization; Game theory; Blockchain; mining attack; selfish mining; Sybil attack; denial of service;
D O I
10.1109/ACCESS.2024.3499350
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of blockchain security research, especially regarding the core Proof of Work (PoW) consensus mechanism, researchers continue to reveal novel methods of mining attacks. Recently, Wang et al. demonstrated an innovative attack mode: the Selfish Mining-based denial of service (SDoS) attack, revealing how this attack strategy introduces a new threat to the blockchain system through the selfish mining strategy. Expanding upon Wang et al.'s findings, our research refines the mining strategy by integrating the strategy of Equal-Fork Stubborn Mining, a more sophisticated variant of selfish mining that can significantly enhance the attacker's advantage under certain network conditions. Furthermore, we combine this refined strategy with a Sybil attack aimed at disrupting the normal propagation and confirmation processes of blocks within the blockchain system, effectively reducing the income of honest miners. Therefore, we propose a new mining attack - a denial of service (SSDoS) attack based on selfish mining and sybil attack. Our experimental results indicate that compared to other known mining attacks, the implementation of the SSDoS attack by an attacker drastically reduces the willingness of honest miners to continue their mining activities, leading to a significantly lower level of participation. For an honest miner controlling 10% of the total computational power, the portion of the critical profitability factor calculated in SSDoS that is higher than the one calculated in SDoS accounts for about 25%.
引用
收藏
页码:170309 / 170320
页数:12
相关论文
共 50 条
  • [11] Selfish mining attack in blockchain: a systematic literature review
    Madhushanie, Nadisha
    Vidanagamachchi, Sugandima
    Arachchilage, Nalin
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 2333 - 2351
  • [12] Attack diagnosis: Throttling distributed denial-of-service attacks close to the attack sources
    Chen, RL
    Park, JM
    ICCCN 2005: 14TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2005, : 275 - 280
  • [13] The Deviation Attack: A Novel Denial-of-Service Attack Against IKEv2
    Ninet, Tristan
    Legay, Axel
    Maillard, Romaric
    Traonouez, Louis-Marie
    Zendra, Olivier
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 66 - 74
  • [14] The SYN flood denial-of-service attack in a protected network
    Thead, EA
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 86 - 89
  • [15] Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation
    Wu, Yongdong
    Suhendra, Vivy
    Saputra, Hendra
    Zhao, Zhigang
    2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 115 - 122
  • [16] Key agreement protocols resistant to a denial-of-service attack
    Hirose, Shouichi
    Matsura, Kanta
    IEICE Transactions on Information and Systems, 2001, E84-D (04) : 477 - 484
  • [17] Optimal Denial-of-Service Attack Scheduling With Energy Constraint
    Zhang, Heng
    Cheng, Peng
    Shi, Ling
    Chen, Jiming
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) : 3023 - 3028
  • [18] Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs
    Boraten, Travis
    Kodi, Avinash
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 : 24 - 38
  • [19] Denial-of-service on fpga-based cloud infrastructures — attack and defense
    La T.
    Pham K.
    Powell J.
    Koch D.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (03): : 441 - 464
  • [20] A BitTorrent-driven distributed denial-of-service attack
    Harrington, Jerome
    Kuwanoe, Corey
    Zou, Cliff C.
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 261 - 268