Abstract

This paper presents a study of attack planessurfaces and possible ways of conducting various attacks on decentralized systems based on Blockchain technology. To accomplish the task, the effectiveness of the attack is studied relative to the plane of its application, namely, relatively: cryptographic designs of Blockchain technology, distributed architecture of systems based on Blockchain technology, Blockchain application context. Several attacks have been identified for each of these planes, including malicious mining strategies, coordinated peer behavior, 51% attacks, domain name attacks (DNS), distributed denial of service attacks, delayed consensus achieving, Blockchain branching, orphaned and obsolete blocks, digital wallet thefts and privacy attacks.An attack by malicious mining allows an attacker to increase rewards by intentionally keeping his blocks closed in order to obtain a longer version of the Blockchain register than the current main version of the register. A 51% attack occurs when a single attacker, a group of nodes, or a mining pool (a combination of miners) in a network reaches most of the total processing power of mining in the system and gets the ability to manipulate the functionality of the Blockchain system. In the plane of DNS attacks, an attacker can potentially isolate peers of the Blockchain system, distribute fake blocks with fraudulent transactions among new nodes, and invalidate transactions. Manifestations of DDoS attacks can vary, depending on the nature of the functionality of the Blockchain application, the features of its network architecture and the behavior of peer nodes. Measures to counter attacks on peer-to-peer peer-to-peer architecture are considered.

Highlights

  • - cryptographic designs of Blockchain technology; - distributed architecture of systems based on Blockchain technology; - Blockchain application context

  • Malicious branching can be either soft or hard, the latter occurring when new blocks accepted by the network are invalid for nodes that have a knowledge of the Blockchain ledger before the branching begins

  • An example of the use of Blockchain ledger hard branching is the rollback of transactions on the Ethereum platform to return digital assets after a successful attack on a decentralized autonomous organization (DAO) and theft of a third of the cryptocurrency [1]

Read more

Summary

Branching attacks

Branching is a state in which the nodes in the network have a different view of the state of the Blockchain ledger, persisting for long periods of time or indefinitely. 1. An example of the use of Blockchain ledger hard branching is the rollback of transactions on the Ethereum platform to return digital assets after a successful attack on a decentralized autonomous organization (DAO) and theft of a third of the cryptocurrency [1]. An example of the use of Blockchain ledger hard branching is the rollback of transactions on the Ethereum platform to return digital assets after a successful attack on a decentralized autonomous organization (DAO) and theft of a third of the cryptocurrency [1] This required the agreement of most network nodes. If the delay in achieving consensus is due to a majority attack (or 51 %-attack) or DDoS-attacks, fraudulent actions become difficult and long delays can lead to the depreciation of the cryptocurrency

Obsolete and orphaned blocks
Blockchain attacks counteraction
Attacks on Blockchain peer-to-peer network architecture
The malicious mining
DNS-attacks
DDoS-attacks
Consensus Delay
Countermeasures against Peer-to-Peer Architecture Attacks
Attacks on Blockchain Applications
Blockchain Ledger Data Processing
Double-spending attacks
Digital Wallet Theft
Countermeasures against attacks on Blockchain applications
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.