Researchers from the Swiss Federal Institute of Technology and the Hebrew University say they have discovered that "Internet routing attacks" and "malicious Internet service providers (ISPs)" can attack the Bitcoin network. The researchers have published a research paper: "Bitcoin Kidnapped: Routing Attacks on Cryptocurrencies" that describes these attacks and provides some countermeasures. The researchers will also present the paper at the "2017 IEEE Security and Privacy Symposium" in May this year. We already know a lot about Bitcoin attack vectors, such as double spending, 51% attacks, DDoS, eclipsing, and transaction malleability. However, the authors of the paper assert:
Although Bitcoin nodes can be run anywhere in the world, researchers found that most nodes are hosted using a small number of Internet Service Providers (ISPs). Specifically, they found that 13 ISPs host 30% of the nodes in the entire Bitcoin network. In addition, 60% of Bitcoin connections are through 3 ISPs. The paper states:
The paper warns against two of these types of attacksThe paper also describes two types of attacks that are said to be realistic at present. The first is called a " splitting attack " and aims to split the Bitcoin network or "completely disconnect some nodes from the network." The second is called a " delay attack " and aims to delay the propagation of new blocks to some Bitcoin nodes without interrupting the connection between blocks and nodes. To determine the impact these attacks might have, the authors of the paper set up a network and simulated them. They hijacked their own nodes in natural conditions to understand the impact of the "splitting attack". For the "delay attack", they used an interception software against their own Bitcoin nodes. They ultimately concluded that:
Possible countermeasuresThe paper provides various recommendations to counter both types of routing attacks. While there is no cure for all attack types, the more countermeasures that are deployed, the more effective Bitcoin users’ defenses will be. The paper offers several long-term and short-term recommendations, including increasing the diversity of node connections, choosing Bitcoin nodes that are routed farther away, monitoring round-trip communication times, and even encrypting all node traffic. The research team also suggests monitoring any additional statistics so that any deviation from normal behavior can be immediately identified. View all countermeasures. |
<<: Bitcoin Price Breaks $1,300 on Poloniex, Bitfinex: Reasons & Trends
>>: Billionaire Novogratz: Buying Bitcoin and Ethereum is the best investment of my life
Dear Binancians, On the occasion of Binance’s six...
Almond-shaped eyes were one of the hallmark featur...
There are many different kinds of lines in the pa...
In palmistry, if a person's marriage line is ...
For a person, the characteristics of his or her f...
1. Men with pointed noses The nose is pointed and...
Analysis of face reading: Why Isabella Leong can&...
People with different sizes of left and right ear...
Early bitcoin enthusiasts hailed the cryptocurren...
Ripple Labs CTO Stefan Thomas has vigorously prom...
Judging a person's character by his or her ap...
All victories come from the persistence of faith....
As one of the traditional physiognomy techniques, ...
If a woman has a relatively strong peach blossom ...
The ten most favorable face types for romance 1. ...