论文标题

对日食攻击对比特币客户的分散轻巧检测

Decentralized Lightweight Detection of Eclipse Attacks on Bitcoin Clients

论文作者

Alangot, Bithin, Reijsbergen, Daniel, Venugopalan, Sarad, Szalachowski, Pawel

论文摘要

像比特币这样的无许可区块链系统的客户依靠基本的对等网络发送和接收交易。客户至少要连接到至少一个诚实的同伴,否则,可以说服客户接受区块链的恶意分叉的观点。在这种日食攻击中,客户无法可靠地将区块链的规范视图与攻击者提供的视图区分开。如果客户根据区块链交易的扭曲观点做出业务决策,则可能会导致灾难性。在本文中,我们调查了设计空间,并提出了两种方法,让比特币客户检测到对它们的日食攻击是否正在进行中。每种方法都选择平均攻击时间和网络负载之间的不同权衡。第一个方案是基于可疑块时间戳的检测。第二个方案允许区块链客户使用其自然连接到Internet(即标准Web活动),以八卦与已接触的服务器及其其他客户端有关区块链视图。我们对先前建议的日食攻击对策进行了改进,而无需引入任何专用的基础架构或比特币协议和网络的更改,我们将讨论实施。我们通过使用原始的互联网流量轨迹和现实世界部署来证明基于八卦的方案的有效性。结果表明,我们的协议会产生可忽略不计的开销,并以很高的可能性迅速检测到日食攻击,并且非常适合实际部署。

Clients of permissionless blockchain systems, like Bitcoin, rely on an underlying peer-to-peer network to send and receive transactions. It is critical that a client is connected to at least one honest peer, as otherwise the client can be convinced to accept a maliciously forked view of the blockchain. In such an eclipse attack, the client is unable to reliably distinguish the canonical view of the blockchain from the view provided by the attacker. The consequences of this can be catastrophic if the client makes business decisions based on a distorted view of the blockchain transactions. In this paper, we investigate the design space and propose two approaches for Bitcoin clients to detect whether an eclipse attack against them is ongoing. Each approach chooses a different trade-off between average attack detection time and network load. The first scheme is based on the detection of suspicious block timestamps. The second scheme allows blockchain clients to utilize their natural connections to the Internet (i.e., standard web activity) to gossip about their blockchain views with contacted servers and their other clients. Our proposals improve upon previously proposed eclipse attack countermeasures without introducing any dedicated infrastructure or changes to the Bitcoin protocol and network, and we discuss an implementation. We demonstrate the effectiveness of the gossip-based schemes through rigorous analysis using original Internet traffic traces and real-world deployment. The results indicate that our protocol incurs a negligible overhead and detects eclipse attacks rapidly with high probability, and is well-suited for practical deployment.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源