Muhammad Saad, L. Njilla, C. Kamhoua, Joongheon Kim, Daehun Nyang, Aziz Mohaisen
{"title":"基于pow的区块链系统中防御DDoS攻击的Mempool优化","authors":"Muhammad Saad, L. Njilla, C. Kamhoua, Joongheon Kim, Daehun Nyang, Aziz Mohaisen","doi":"10.1109/BLOC.2019.8751476","DOIUrl":null,"url":null,"abstract":"In this paper, we present a new form of attack that can be carried out on the memory pools (mempools) of blockchain-based cryptocurrencies. Towards that end, we study such an attack on Bitcoin mempool and explore its effects on transactions fee paid by legitimate users. We also propose countermeasures to contain such an attack. Our countermeasures include fee-based and age-based designs, which optimize the mempool size and help in countering the effects of DDoS attacks. We further evaluate our designs by simulations and analyze their usefulness in varying attack conditions. Our analyses can be extended to other blockchain-based applications which use memory pools to cache network activities.","PeriodicalId":314490,"journal":{"name":"2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"44","resultStr":"{\"title\":\"Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems\",\"authors\":\"Muhammad Saad, L. Njilla, C. Kamhoua, Joongheon Kim, Daehun Nyang, Aziz Mohaisen\",\"doi\":\"10.1109/BLOC.2019.8751476\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we present a new form of attack that can be carried out on the memory pools (mempools) of blockchain-based cryptocurrencies. Towards that end, we study such an attack on Bitcoin mempool and explore its effects on transactions fee paid by legitimate users. We also propose countermeasures to contain such an attack. Our countermeasures include fee-based and age-based designs, which optimize the mempool size and help in countering the effects of DDoS attacks. We further evaluate our designs by simulations and analyze their usefulness in varying attack conditions. Our analyses can be extended to other blockchain-based applications which use memory pools to cache network activities.\",\"PeriodicalId\":314490,\"journal\":{\"name\":\"2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"44\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BLOC.2019.8751476\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BLOC.2019.8751476","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems
In this paper, we present a new form of attack that can be carried out on the memory pools (mempools) of blockchain-based cryptocurrencies. Towards that end, we study such an attack on Bitcoin mempool and explore its effects on transactions fee paid by legitimate users. We also propose countermeasures to contain such an attack. Our countermeasures include fee-based and age-based designs, which optimize the mempool size and help in countering the effects of DDoS attacks. We further evaluate our designs by simulations and analyze their usefulness in varying attack conditions. Our analyses can be extended to other blockchain-based applications which use memory pools to cache network activities.