Decentralized Lightweight Detection of Eclipse Attacks on Bitcoin Clients

Bithin Alangot, Daniël Reijsbergen, Sarad Venugopalan, Pawel Szalachowski
{"title":"Decentralized Lightweight Detection of Eclipse Attacks on Bitcoin Clients","authors":"Bithin Alangot, Daniël Reijsbergen, Sarad Venugopalan, Pawel Szalachowski","doi":"10.1109/Blockchain50366.2020.00049","DOIUrl":null,"url":null,"abstract":"Clients of permissionless blockchain systems, like Bitcoin, rely on an underlying peer-to-peer network to send and receive transactions. It is critical that a client is connected to at least one honest peer, as otherwise the client can be convinced to accept a maliciously forked view of the blockchain. In such an eclipse attack, the client is unable to reliably distinguish the canonical view of the blockchain from the view provided by the attacker. The consequences of this can be catastrophic if the client makes business decisions based on a distorted view of the blockchain transactions.In this paper, we investigate the design space and propose two approaches for Bitcoin clients to detect whether an eclipse attack against them is ongoing. Each approach chooses a different trade-off between average attack detection time and network load. The first scheme is based on the detection of suspicious block timestamps. The second scheme allows blockchain clients to utilize their natural connections to the Internet (i.e., standard web activity) to gossip about their blockchain views with other clients through contacted servers. Our proposals improve upon previously proposed eclipse attack countermeasures without introducing any dedicated infrastructure or changes to the Bitcoin protocol and network. We demonstrate the effectiveness of the gossip-based schemes through real-world implementation. The results of our experiments indicate that the protocol incurs a negligible overhead, detects eclipse attacks rapidly with high probability, and is well-suited for practical deployment. 1.","PeriodicalId":109440,"journal":{"name":"2020 IEEE International Conference on Blockchain (Blockchain)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Blockchain (Blockchain)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Blockchain50366.2020.00049","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18

Abstract

Clients of permissionless blockchain systems, like Bitcoin, rely on an underlying peer-to-peer network to send and receive transactions. It is critical that a client is connected to at least one honest peer, as otherwise the client can be convinced to accept a maliciously forked view of the blockchain. In such an eclipse attack, the client is unable to reliably distinguish the canonical view of the blockchain from the view provided by the attacker. The consequences of this can be catastrophic if the client makes business decisions based on a distorted view of the blockchain transactions.In this paper, we investigate the design space and propose two approaches for Bitcoin clients to detect whether an eclipse attack against them is ongoing. Each approach chooses a different trade-off between average attack detection time and network load. The first scheme is based on the detection of suspicious block timestamps. The second scheme allows blockchain clients to utilize their natural connections to the Internet (i.e., standard web activity) to gossip about their blockchain views with other clients through contacted servers. Our proposals improve upon previously proposed eclipse attack countermeasures without introducing any dedicated infrastructure or changes to the Bitcoin protocol and network. We demonstrate the effectiveness of the gossip-based schemes through real-world implementation. The results of our experiments indicate that the protocol incurs a negligible overhead, detects eclipse attacks rapidly with high probability, and is well-suited for practical deployment. 1.
去中心化轻量级检测对比特币客户端的Eclipse攻击
无需许可的区块链系统的客户端,如比特币,依赖于底层的点对点网络来发送和接收交易。客户端连接到至少一个诚实的对等端是至关重要的,否则客户端可能会被说服接受区块链的恶意分叉视图。在这种eclipse攻击中,客户端无法可靠地区分区块链的规范视图和攻击者提供的视图。如果客户基于对区块链交易的扭曲看法做出商业决策,其后果可能是灾难性的。在本文中,我们研究了设计空间,并为比特币客户端提出了两种方法来检测针对它们的日食攻击是否正在进行。每种方法在平均攻击检测时间和网络负载之间选择了不同的权衡。第一种方案是基于可疑块时间戳的检测。第二种方案允许区块链客户端利用他们与互联网的自然连接(即标准的web活动),通过联系的服务器与其他客户端八卦他们的区块链视图。我们的建议改进了之前提出的eclipse攻击对策,而不引入任何专用基础设施或对比特币协议和网络进行更改。我们通过现实世界的实施证明了基于八卦的方案的有效性。实验结果表明,该协议的开销可以忽略不计,能够以高概率快速检测到日食攻击,并且非常适合实际部署。1.
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信