Researchers discover serious Bitcoin routing attack that isolates Bitcoin network and blocks block propagation, leading to revenue loss and widespread vulnerabilities (paper download)

Researchers discover serious Bitcoin routing attack that isolates Bitcoin network and blocks block propagation, leading to revenue loss and widespread vulnerabilities (paper download)

Researchers from the Swiss Federal Institute of Technology and the Hebrew University say they have discovered that "Internet routing attacks" and "malicious Internet service providers (ISPs)" can attack the Bitcoin network. The researchers have published a research paper: "Bitcoin Kidnapped: Routing Attacks on Cryptocurrencies" that describes these attacks and provides some countermeasures. The researchers will also present the paper at the "2017 IEEE Security and Privacy Symposium" in May this year.

We already know a lot about Bitcoin attack vectors, such as double spending, 51% attacks, DDoS, eclipsing, and transaction malleability. However, the authors of the paper assert:

“There is a significant attack vector that is being missed: attacking Bitcoin through the internet routing infrastructure itself.”

Although Bitcoin nodes can be run anywhere in the world, researchers found that most nodes are hosted using a small number of Internet Service Providers (ISPs). Specifically, they found that 13 ISPs host 30% of the nodes in the entire Bitcoin network. In addition, 60% of Bitcoin connections are through 3 ISPs.

The paper states:

“Taken together, these two features make it relatively easy for a malicious ISP to intercept large amounts of Bitcoin traffic. Any third party along the forwarding path can eavesdrop on, delete, modify, inject, or delay Bitcoin messages such as blocks or transactions.”

The paper warns against two of these types of attacks

The paper also describes two types of attacks that are said to be realistic at present. The first is called a " splitting attack " and aims to split the Bitcoin network or "completely disconnect some nodes from the network." The second is called a " delay attack " and aims to delay the propagation of new blocks to some Bitcoin nodes without interrupting the connection between blocks and nodes.

To determine the impact these attacks might have, the authors of the paper set up a network and simulated them. They hijacked their own nodes in natural conditions to understand the impact of the "splitting attack". For the "delay attack", they used an interception software against their own Bitcoin nodes. They ultimately concluded that:

“The potential damage these attacks could do to Bitcoin is worrisome. By isolating a portion of the Bitcoin network or preventing block propagation, attackers could cause a massive waste of mining power, which would lead to lost revenue and widespread vulnerabilities such as double spending.”

Possible countermeasures

The paper provides various recommendations to counter both types of routing attacks. While there is no cure for all attack types, the more countermeasures that are deployed, the more effective Bitcoin users’ defenses will be.

The paper offers several long-term and short-term recommendations, including increasing the diversity of node connections, choosing Bitcoin nodes that are routed farther away, monitoring round-trip communication times, and even encrypting all node traffic. The research team also suggests monitoring any additional statistics so that any deviation from normal behavior can be immediately identified.

View all countermeasures.

<<:  Bitcoin Price Breaks $1,300 on Poloniex, Bitfinex: Reasons & Trends

>>:  Billionaire Novogratz: Buying Bitcoin and Ethereum is the best investment of my life

Recommend

CZ releases Binance 6th anniversary blog: Users first

Dear Binancians, On the occasion of Binance’s six...

Illustration of a large triangle in the center of the palm

There are many different kinds of lines in the pa...

Palmistry of people who will become rich after marriage

In palmistry, if a person's marriage line is ...

What is the fate of a woman with a cinnabar mole?

For a person, the characteristics of his or her f...

What kind of man is selfish?

1. Men with pointed noses The nose is pointed and...

Analysis of face reading: Why Isabella Leong can't marry into a wealthy family

Analysis of face reading: Why Isabella Leong can&...

What does it mean if the left and right earlobes are different? A high IQ

People with different sizes of left and right ear...

Ripple Labs CTO changes attitude towards blockchain technology

Ripple Labs CTO Stefan Thomas has vigorously prom...

What are the personality traits of women with particularly small nostrils?

Judging a person's character by his or her ap...

VCs harvested by the cryptocurrency circle...

All victories come from the persistence of faith....

Analysis of the facial features of women with good financial luck

As one of the traditional physiognomy techniques, ...

Is it true that women with more crow's feet have better luck in love?

If a woman has a relatively strong peach blossom ...

What are the characteristics of the face that is most conducive to romance?

The ten most favorable face types for romance 1. ...