Researchers from the Swiss Federal Institute of Technology and the Hebrew University say they have discovered that "Internet routing attacks" and "malicious Internet service providers (ISPs)" can attack the Bitcoin network. The researchers have published a research paper: "Bitcoin Kidnapped: Routing Attacks on Cryptocurrencies" that describes these attacks and provides some countermeasures. The researchers will also present the paper at the "2017 IEEE Security and Privacy Symposium" in May this year. We already know a lot about Bitcoin attack vectors, such as double spending, 51% attacks, DDoS, eclipsing, and transaction malleability. However, the authors of the paper assert:
Although Bitcoin nodes can be run anywhere in the world, researchers found that most nodes are hosted using a small number of Internet Service Providers (ISPs). Specifically, they found that 13 ISPs host 30% of the nodes in the entire Bitcoin network. In addition, 60% of Bitcoin connections are through 3 ISPs. The paper states:
The paper warns against two of these types of attacksThe paper also describes two types of attacks that are said to be realistic at present. The first is called a " splitting attack " and aims to split the Bitcoin network or "completely disconnect some nodes from the network." The second is called a " delay attack " and aims to delay the propagation of new blocks to some Bitcoin nodes without interrupting the connection between blocks and nodes. To determine the impact these attacks might have, the authors of the paper set up a network and simulated them. They hijacked their own nodes in natural conditions to understand the impact of the "splitting attack". For the "delay attack", they used an interception software against their own Bitcoin nodes. They ultimately concluded that:
Possible countermeasuresThe paper provides various recommendations to counter both types of routing attacks. While there is no cure for all attack types, the more countermeasures that are deployed, the more effective Bitcoin users’ defenses will be. The paper offers several long-term and short-term recommendations, including increasing the diversity of node connections, choosing Bitcoin nodes that are routed farther away, monitoring round-trip communication times, and even encrypting all node traffic. The research team also suggests monitoring any additional statistics so that any deviation from normal behavior can be immediately identified. View all countermeasures. |
<<: Bitcoin Price Breaks $1,300 on Poloniex, Bitfinex: Reasons & Trends
>>: Billionaire Novogratz: Buying Bitcoin and Ethereum is the best investment of my life
In the Tang Dynasty, fat women were considered be...
Some women have flat foreheads, while others have...
A person's face can not only reveal his healt...
Women with messy eyebrows have stagnant careers T...
The facial features can often show how a person...
How to interpret moles around eyes? As the saying...
In fact, everyone is hypocritical in reality, bec...
The appearance of moles can also reveal informati...
In fact, the middle period of a person connects y...
The face of a miserable woman and how to treat it...
BoringDAO provides more than just cross-chain ass...
In today's digital age, cloud storage service...
People always meet many stingy people in life. Fr...
Blockchain technology is known as another disrupt...
In fact, everyone has a place suitable for their ...