A Denial-of-Service Attack Based on Selfish Mining and Sybil Attack in Blockchain Systems

被引:0
|
作者
Zhang, Jing [1 ]
Zha, Chunming [1 ]
Zhang, Qingbin [1 ]
Ma, Shaohua [1 ]
机构
[1] Henan Polytech Univ, Coll Software, Jiaozuo 454000, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Privacy; Profitability; Buildings; Proof of Work; Denial-of-service attack; Blockchains; Consensus protocol; Security; Synchronization; Game theory; Blockchain; mining attack; selfish mining; Sybil attack; denial of service;
D O I
10.1109/ACCESS.2024.3499350
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of blockchain security research, especially regarding the core Proof of Work (PoW) consensus mechanism, researchers continue to reveal novel methods of mining attacks. Recently, Wang et al. demonstrated an innovative attack mode: the Selfish Mining-based denial of service (SDoS) attack, revealing how this attack strategy introduces a new threat to the blockchain system through the selfish mining strategy. Expanding upon Wang et al.'s findings, our research refines the mining strategy by integrating the strategy of Equal-Fork Stubborn Mining, a more sophisticated variant of selfish mining that can significantly enhance the attacker's advantage under certain network conditions. Furthermore, we combine this refined strategy with a Sybil attack aimed at disrupting the normal propagation and confirmation processes of blocks within the blockchain system, effectively reducing the income of honest miners. Therefore, we propose a new mining attack - a denial of service (SSDoS) attack based on selfish mining and sybil attack. Our experimental results indicate that compared to other known mining attacks, the implementation of the SSDoS attack by an attacker drastically reduces the willingness of honest miners to continue their mining activities, leading to a significantly lower level of participation. For an honest miner controlling 10% of the total computational power, the portion of the critical profitability factor calculated in SSDoS that is higher than the one calculated in SDoS accounts for about 25%.
引用
收藏
页码:170309 / 170320
页数:12
相关论文
共 50 条
  • [31] Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud
    Phan, Trung, V
    Park, Minho
    IEEE ACCESS, 2019, 7 : 18701 - 18714
  • [32] Defeating distributed denial-of-service attack with deterministic bit marking
    Kim, Y
    Jo, JY
    Merat, FL
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1363 - 1367
  • [33] Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure
    Satin Asri
    Bernardi Pranggono
    Wireless Personal Communications, 2015, 83 : 2211 - 2223
  • [34] Filter Assignment Policy Against Distributed Denial-of-Service Attack
    Biswas, Rajorshi
    Wu, Jie
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2018), 2018, : 537 - 544
  • [35] Denial-of-Service Vulnerability of Hash-Based Transaction Sharding: Attack and Countermeasure
    Nguyen, Truc
    Thai, My T.
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (03) : 641 - 652
  • [36] A survey of distributed denial-of-service attack, prevention, and mitigation techniques
    Mahjabin, Tasnuva
    Xiao, Yang
    Sun, Guang
    Jiang, Wangdong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (12):
  • [37] Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure
    Asri, Satin
    Pranggono, Bernardi
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (03) : 2211 - 2223
  • [38] A detection scheme against Distributed Reflector Denial-of-Service attack
    Kim, YS
    Jeon, JC
    Jeon, JW
    Yoo, KY
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 44 - 48
  • [39] The model for low-rate denial-of-service attack on RED
    Wu, Libing
    Xu, Ao
    He, Yanxiang
    Wang, Chao
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (09): : 50 - 54
  • [40] Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks
    Choi, Jihyuk
    Chiang, Jerry T.
    Kim, Dongho
    Hu, Yih-Chun
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2010, 50 : 235 - 252