Understanding and Detecting Majority Attacks

Thomas Cilloni, Xiyu Cai, Charles Fleming, Jun Li

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

3 Citations (Scopus)

Abstract

Blockchain technologies are becoming increasingly popular for financial and business solutions thanks to their many features and adaptability. However, their security is not assured. Of particular concern are majority attacks, which exploit the consensus algorithm used to resolve competing chains to modify past and present transactions on the blockchain. Despite numerous in-the-wild majority attacks, detecting in-progress attacks remains difficult, with most attacks remaining undetected for hours or days. to understand better these attacks and why they are so difficult to detect, in this paper we present a series of increasingly sophisticated attacks performed in an experimental environment and analyze the resulting network traffic. We then propose a possible detection mechanism based on the shared characteristics of these attacks. The implementation of such an algorithm is finally tested in a variety of experimental environments.

Original languageEnglish
Title of host publicationProceedings - 2020 IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2020
EditorsJie Xu, Stefan Schulte, Peter Ruppel, Axel Kupper, Divyesh Jadav
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages11-21
Number of pages11
ISBN (Electronic)9781728170220
DOIs
Publication statusPublished - Aug 2020
Event2nd IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2020 - Oxford, United Kingdom
Duration: 3 Aug 20206 Aug 2020

Publication series

NameProceedings - 2020 IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2020

Conference

Conference2nd IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2020
Country/TerritoryUnited Kingdom
CityOxford
Period3/08/206/08/20

Keywords

  • blockchain
  • majority attack
  • security

Fingerprint

Dive into the research topics of 'Understanding and Detecting Majority Attacks'. Together they form a unique fingerprint.

Cite this