A Denial-of-Service Attack Based on Selfish Mining and Sybil Attack in Blockchain Systems

被引:0
|
作者
Zhang, Jing [1 ]
Zha, Chunming [1 ]
Zhang, Qingbin [1 ]
Ma, Shaohua [1 ]
机构
[1] Henan Polytech Univ, Coll Software, Jiaozuo 454000, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Privacy; Profitability; Buildings; Proof of Work; Denial-of-service attack; Blockchains; Consensus protocol; Security; Synchronization; Game theory; Blockchain; mining attack; selfish mining; Sybil attack; denial of service;
D O I
10.1109/ACCESS.2024.3499350
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of blockchain security research, especially regarding the core Proof of Work (PoW) consensus mechanism, researchers continue to reveal novel methods of mining attacks. Recently, Wang et al. demonstrated an innovative attack mode: the Selfish Mining-based denial of service (SDoS) attack, revealing how this attack strategy introduces a new threat to the blockchain system through the selfish mining strategy. Expanding upon Wang et al.'s findings, our research refines the mining strategy by integrating the strategy of Equal-Fork Stubborn Mining, a more sophisticated variant of selfish mining that can significantly enhance the attacker's advantage under certain network conditions. Furthermore, we combine this refined strategy with a Sybil attack aimed at disrupting the normal propagation and confirmation processes of blocks within the blockchain system, effectively reducing the income of honest miners. Therefore, we propose a new mining attack - a denial of service (SSDoS) attack based on selfish mining and sybil attack. Our experimental results indicate that compared to other known mining attacks, the implementation of the SSDoS attack by an attacker drastically reduces the willingness of honest miners to continue their mining activities, leading to a significantly lower level of participation. For an honest miner controlling 10% of the total computational power, the portion of the critical profitability factor calculated in SSDoS that is higher than the one calculated in SDoS accounts for about 25%.
引用
收藏
页码:170309 / 170320
页数:12
相关论文
共 50 条
  • [21] Gradient Techniques to Predict Distributed Denial-Of-Service Attack
    Qamar R.
    Iraqi Journal for Computer Science and Mathematics, 2022, 3 (02): : 55 - 71
  • [22] Key agreement protocols resistant to a denial-of-service attack
    Hirose, S
    Matsuura, K
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (04): : 477 - 484
  • [23] A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
    Tan, Zhiyuan
    Jamdagni, Aruna
    He, Xiangjian
    Nanda, Priyadarsi
    Liu, Ren Ping
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) : 447 - 456
  • [24] Control Channel Denial-of-Service Attack in SDN-Based Networks
    Sriskandarajah, Shriparen
    McKague, Matthew
    Foo, Ernest
    Ragel, Roshan G.
    Karunarathna, Suneth Namal
    Jadidi, Zahra
    MERCON 2020: 6TH INTERNATIONAL MULTIDISCIPLINARY MORATUWA ENGINEERING RESEARCH CONFERENCE (MERCON), 2020, : 325 - 330
  • [25] Denial-of-service attack hits Ohio State University
    不详
    COMPUTERS & SECURITY, 2003, 22 (03) : 179 - 179
  • [26] Denial-of-Service Attack Detection Using Anomaly with Misuse Based Method
    Suganya, R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 124 - 128
  • [27] Stochastic Denial-of-Service Attack Allocation in Leader-Following Multiagent Systems
    Sun, Lucheng
    Zhang, Ya
    Sun, Changyin
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (05): : 2848 - 2857
  • [28] An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
    Cetinkaya, Ahmet
    Ishii, Hideaki
    Hayakawa, Tomohisa
    ENTROPY, 2019, 21 (02)
  • [29] Service discovery with denial-of-service attack resistance using risk evaluation
    Nakagawa, Tomohiro
    Miyake, Motoharu
    Inamura, Yu
    Inamura, Hiroshi
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 138 - +
  • [30] A Selfish Attack on Chainweb Blockchain
    Wang, Suyang
    Yin, Bo
    Zhang, Shuai
    Cheng, Yu
    Cai, Lin X.
    Cao, Xianghui
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,