A Denial-of-Service Attack Based on Selfish Mining and Sybil Attack in Blockchain Systems

被引:0
|
作者
Zhang, Jing [1 ]
Zha, Chunming [1 ]
Zhang, Qingbin [1 ]
Ma, Shaohua [1 ]
机构
[1] Henan Polytech Univ, Coll Software, Jiaozuo 454000, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Privacy; Profitability; Buildings; Proof of Work; Denial-of-service attack; Blockchains; Consensus protocol; Security; Synchronization; Game theory; Blockchain; mining attack; selfish mining; Sybil attack; denial of service;
D O I
10.1109/ACCESS.2024.3499350
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of blockchain security research, especially regarding the core Proof of Work (PoW) consensus mechanism, researchers continue to reveal novel methods of mining attacks. Recently, Wang et al. demonstrated an innovative attack mode: the Selfish Mining-based denial of service (SDoS) attack, revealing how this attack strategy introduces a new threat to the blockchain system through the selfish mining strategy. Expanding upon Wang et al.'s findings, our research refines the mining strategy by integrating the strategy of Equal-Fork Stubborn Mining, a more sophisticated variant of selfish mining that can significantly enhance the attacker's advantage under certain network conditions. Furthermore, we combine this refined strategy with a Sybil attack aimed at disrupting the normal propagation and confirmation processes of blocks within the blockchain system, effectively reducing the income of honest miners. Therefore, we propose a new mining attack - a denial of service (SSDoS) attack based on selfish mining and sybil attack. Our experimental results indicate that compared to other known mining attacks, the implementation of the SSDoS attack by an attacker drastically reduces the willingness of honest miners to continue their mining activities, leading to a significantly lower level of participation. For an honest miner controlling 10% of the total computational power, the portion of the critical profitability factor calculated in SSDoS that is higher than the one calculated in SDoS accounts for about 25%.
引用
收藏
页码:170309 / 170320
页数:12
相关论文
共 50 条
  • [41] Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things
    Alimi, Kuburat Oyeranti Adefemi
    Ouahada, Khmaies
    Abu-Mahfouz, Adnan M.
    Rimer, Suvendi
    Alimi, Oyeniyi Akeem
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (03)
  • [42] Entropy-based denial-of-service attack detection in cloud data center
    Cao, Jiuxin
    Yu, Bin
    Dong, Fang
    Zhu, Xiangying
    Xu, Shuai
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (18): : 5623 - 5639
  • [43] Response to distributed denial-of-service attack using active technology
    Kim, HJ
    Na, JC
    Sohn, SW
    Proceedings of the Eighth IASTED International Conference on Internet and Multimedia Systems and Applications, 2004, : 244 - 248
  • [44] A Forensic Mechanism to Trace the Master of Distributed Denial-of-Service Attack
    Thiruvaazhi, Uloli
    Alex, M. Edington
    INFORMATION SECURITY JOURNAL, 2012, 21 (01): : 36 - 46
  • [45] A Low-Cost Distributed Denial-of-Service Attack Architecture
    Huang, Kaifan
    Yang, Lu-Xing
    Yang, Xiaofan
    Xiang, Yong
    Tang, Yuan Yan
    IEEE ACCESS, 2020, 8 : 42111 - 42119
  • [46] Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals
    Luo, Xiapu
    Chan, Edmond W. W.
    Chang, Rocky K. C.
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
  • [47] Security estimation under Denial-of-Service attack with energy constraint
    Li, Li
    Zhang, Huixia
    Xia, Yuanqing
    Yang, Hongjiu
    NEUROCOMPUTING, 2018, 292 : 111 - 120
  • [48] Analysis of Denial-of-Service Attack Vectors in Software Defined Networks
    Portante, Anthony
    Mullins, Barry
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 479 - 488
  • [49] An adaptive observer design for denial-of-service attack detection in platoon
    Zhang, Xiaofei
    Du, Haiping
    Jia, Zhijuan
    Cui, Chi
    Cheng, Yage
    Yan, Yan
    OPTIMAL CONTROL APPLICATIONS & METHODS, 2023, 44 (04): : 2148 - 2165
  • [50] Enhanced of key agreement protocols resistant to a denial-of-service attack
    Hwang, MS
    Lo, JW
    Liu, CH
    FUNDAMENTA INFORMATICAE, 2004, 61 (3-4) : 389 - 398