Research Shows How Bitcoin Can Be Attacked Via Internet Routing Infrastructure
featured

Research Shows How Bitcoin Can Be Attacked Via Internet Routing Infrastructure

THELOGICALINDIAN - Researchers from ETH Zurich and the Hebrew University accept begin how internet acquisition attacks and awful Internet Service Providers ISPs can advance the Bitcoin arrangement In their analysis cardboard advantaged Hijacking Bitcoin Acquisition Attacks on Cryptocurrencies they call the attacks as able-bodied as countermeasures adjoin them The cardboard will be presented at the 2024IEEE Symposium on aegis and aloofness in May

Also read: Attacks on Data Privacy May Get Scarier in 2017

Internet Routing Attack Vector

There are already abounding accepted Bitcoin advance vectors such as bifold spending, the 51% attack, DDoS, eclipsing, and transaction malleability. However, the authors asserted that:

Research Shows How Bitcoin Can Be Attacked Via Internet Routing InfrastructureWhile a Bitcoin bulge can be run from anywhere on earth, the advisers begin that best of them are hosted with a few ISPs. Specifically, they found that 13 ISPs host 30% of the absolute Bitcoin network. In addition, 60% of all accessible Bitcoin access cantankerous 3 ISPs.

“Together, these two characteristics accomplish it almost accessible for a awful ISP to ambush a lot of Bitcoin traffic,” they wrote, abacus that “any third-party on the forwarding aisle can eavesdrop, drop, modify, inject, or adjournment Bitcoin letters such as blocks or transactions.”

Two Types of Attacks Warned

Research Shows How Bitcoin Can Be Attacked Via Internet Routing InfrastructureThe cardboard again describes two types of attacks claimed to be applied and accessible today.

The aboriginal is alleged a “Partition attack” which aims to allotment the Bitcoin arrangement or “completely abstract a set of nodes from the network”. The additional is alleged a “Delay attack” which aims to adjournment the advancement of new blocks to a set of Bitcoin nodes after abolition their connections.

To actuate their effects, the authors set up a arrangement and accomplished the attacks on themselves. They performed a annex in the agrarian adjoin their own Bitcoin nodes to apprentice the aftereffect of a Partition attack. For a Delay attack, they acclimated an interception software adjoin their own Bitcoin nodes. They eventually came to the cessation that:

Possible Countermeasures

The cardboard offers assorted suggestions to action the acquisition attacks of Research Shows How Bitcoin Can Be Attacked Via Internet Acquisition Infrastructureboth kinds. While annihilation is a cure for all advance types, the added countermeasures deployed, the added able a aegis Bitcoin users will have.

Both continued and concise countermeasures were suggested. Recommended strategies accommodate accretion the assortment of bulge connections, selecting Bitcoin aeon that are baffled added away, ecology round-trip advice times, and alike encrypting all bulge traffic. The analysis aggregation additionally proposes ecology any added added statistics so that deviations from accustomed behaviors can be anon articular at anniversary node.

The abounding account of countermeasures can be apparent here.

What do you anticipate of these attacks? Let us apperceive in the comments area below.

Images address of Shutterstock

Have you apparent our new widget service? It allows anyone to bury advisory Bitcoin.com widgets on their website.