Uploaded by himgau243

Blockchain Attacks

advertisement
Attacks in Blockchain, its counter measures and effectiveness
Reference
Attack
Basic Theory
Countermeasure
Effectiveness
S. Singh et al [1]
Liveliness Attack
Attack used to delay the
confirmation time of a
transaction as much as
possible by going through its
three phases: preparation,
denial and retarder phase.
Two different block
Feasible solution
generation strategies
encoded by Conflux’s
consensus protocol. One
gives an optimal solution
by quick confirmation of
consensus and other
provides a high throughput
and confirmation in
blockchain systems.
A. Begum et al [2]
Double Spending
Attack
In this attack, a successful
transaction is duplicated with
the same fund creating a flaw
that no two tokens can be
spent twice in digital ledger.
MSP (Multistage Secure
Pool) framework which
allows the pool to
authenticate the
transactions. The proposed
framework includes four
stages to overcome this
attack are 1) detection
stage, 2) confirmation
stage, 3) Forwarding stage,
and 4) broadcast stage.
Effectively controls
double spending but
other vulnerability
like 51% attack leads
to double spending
problem. Thus, open
to provide solution.
S. Sayeed et al [3]
51% Vulnerability
Attack
Applies on PoW based
blockchain when a single
minor hash function occupies
more than 50% of the total
blockchain hash function and
can manipulate and reverse
the transaction, stops others
mining operations and hinder
transaction verification.
Two Phase Proof-of-Work
prevents the pool from
increasing beyond the
alarming size by shrinking
the incentive for miner in
the pool. 2P-PoW prevents
from creating hegemony
by either outsourcing a
major chunk of their hash
rate or exposing the
private keys of pool
operator.
Infeasible solution as
by increasing the
block size might be
not sufficient since a
powerful adversary
can still overload the
network by
generating the dust
transaction. Thus,
open to solution.
S. Singh et al [1]
Private Key Security
Attack
An attacker detect
vulnerability in elliptical
curve digital signature to
acquire User’s private key to
access funds and verify
transaction of the user.
A public key infrastructure Effective solution in
used to authenticate the
cryptography for
identity ensuring the
secure public keys.
integrity of a blockchain
network and a group key
management to secure
communication to achieve
confidentiality.
S. Singh et al [1]
Privacy Leakage
Blockchain is traceable and
even though measures are
taken to ensure privacy, there
are still some leakages of
confidential information that
is acquired by the attackers to
perform malicious operation.
HAWK framework used to
provide privacy for smart
contracts which allows
codeless private contracts
to enhance the security.
Hawk divides a system
into private and public part
which stores financial
information as private and
other codes as public.
Effective solution but
still not used in
overall blockchain
network because
overall change in
structure of
blockchain will be
required.
Attacks in Blockchain, its counter measures and effectiveness
Reference
Attack
Basic Theory
Countermeasure
Effectiveness
S. Solat et al [6]
Selfish Mining Attack
Some miners try to waste
other legitimate miner’s
mining power. Attacker
attempt to fork the private
chain and maintain a longer
private chain and hold more
blocks.
Zero Block, prevents this
attack by using a novel
timestamp-free technique
that exploits the Poisson
nature of the proof-ofwork and the current
knowledge on the
propagation of information
in Bitcoin.
Much effective than
previous solutions
which were
inefficient to
forgeable timestamping techniques.
But still require
feasible solution.
M. Saad et al [4]
BGP Hijacking Attack
Attacker intercepts the
blockchain network by
manipulating the BGP, after
which data can be routed and
modified by the attacker.
The BGPsec protocol is
used to fix vulnerabilities
like fake routing updates
incurring traffic hijacking
and interception by
attesting routing updates.
Infeasible solution as
it is unable to ensure
correct packet
delivery on the
internet.
S. Singh et al [1]
Balance Attack
Attacker introduces a delay
between valid subgroups with
the same mining power and
executes the transaction.
These attacks can be easily
countered by patching
vulnerabilities in
programming platform and
using secure programming
Effective solution as
major attack is due to
careless programming
practice.
Y. Chen et al [5]
Sybil Attack
Forging an identity in a peerto-peer network of a
reputation system, thus
destroying the reputation.
NetFlow algorithm selects
a credible node of a
network node based on
transaction information to
ensure that the authorized
agent lost part of the
revenue for the block.
Effective solution
References:
[1] S. Singh, A. S. M. S. Hosen and B. Yoon, "Blockchain Security Attacks, Challenges, and Solutions for the Future
Distributed IoT Network," in IEEE Access, vol. 9, pp. 13938-13959, 2021, doi: 10.1109/ACCESS.2021.3051602.
[2] A. Begum, A. H. Tareq, M. Sultana, M. K. Sohel, T. Rahman, and A. H. Sarwar, ‘‘Blockchain attacks, analysis and a
model to solve double spending attack,’’ Int. J. Mach. Learn. Comput., vol. 10, no. 2, pp. 1–6, 2020.
[3] S. Sayeed and H. Marco-Gisbert, ‘‘Assessing blockchain consensus and security mechanisms against the 51%
attack,’’ Appl. Sci., vol. 9, no. 9, p. 1788, Apr. 2019.
[4] M. Saad et al., "Exploring the Attack Surface of Blockchain: A Comprehensive Survey," in IEEE Communications
Surveys & Tutorials, vol. 22, no. 3, pp. 1977-2008, third quarter 2020, doi: 10.1109/COMST.2020.2975999.
[5] Yourong Chen, Hao Chen, Yang Zhang, Meng Han, Madhuri Siddula, Zhipeng Cai, A survey on blockchain systems:
Attacks, defenses, and privacy preservation, High-Confidence Computing, Volume 2, Issue 2, 2022,100048, ISSN
2667-2952, https://doi.org/10.1016/j.hcc.2021.100048.
[6] S. Solat and M. Potop-Butucaru, “Zeroblock: Preventing selfish mining in bitcoin.” axXiv preprint
arXiv:1605.02435,2016
Submitted by: Himanshu Gautam (2021IS42)
Download