Масштабні атаки на децентралізовані системи, що побудовані на однорангових пірингових мережах
DOI:
https://doi.org/10.32626/2308-5916.2017-15.233-238Анотація
Представлені сценарії масштабних атак на децентралізовані системи на прикладі криптовалюти Bitcoin, які основані на вразливостях протоколу BGP та надмірній централізації першого рівня архітектури даних системПосилання
Bitcoin market capitalization. Blockchain S.A.R.L. [Electronic resource]: https://blockchain.info/ru/charts/market-cap.
Bahack L. Theoretical Bitcoin attacks with less than half of the computational power. arXiv preprint: 1312.7013. 2013. 18 p.
Decker C., Wattenhofer R. Information propagation in the Bitcoin network. In IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P). IEEE. 2013. 10 p.
Biryukov A., Khovratovich D., Pustogarov I. Deanonymisation of clients in Bitcoin P2P network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM. 2014. P. 15–29.
Shi X., Xiang Y., Wang Z. Detecting prefix hijackings in the Internet with Argus. IMC’12, ACM. 2012. P. 15–28.
Zhang Z., Zhang Y., Hu Y. C. Practical defenses against BGP prefix hijacking. CoNEXT’07, ACM. 2007. 12 p.
Ballani H., Francis P., Zhang X. A study of prefix hijacking and interception in the Internet. SIGCOMM ’07, ACM. 2007. P. 265–276.
Boldyreva A., Lychev R. Provable Security of S-BGP and Other Path Vector Protocols: Model, Analysis and Extensions. CCS ’12, ACM. 2012. P. 541–552.
Edman M., Syverson P. As-awareness in tor path selection. In Proceedings of the 16th ACM Conference on Computer and Communications Security. 2009. 10 p.
Stetsenko P., Perekopskiy A., Khalimov G. Attack on Bitcoin peer-to-peer network addressing mechanism. VI Międzynarodowa konferencja studentуw oraz doktorantуw «Inżynier XXI wieku». Bielsko-Biała. 2016. Р. 393–402.
RFC 1930. Guidelines for creation, selection, and registration of an Autonomous System (AS). 1996. 10 р.
Lychev R., Goldberg S., Schapira M. BGP Security in Partial Deployment. In SIGCOMM. 2013. 12 p.
Sapirshtein A., Sompolinsky Y., and Zohar A. Optimal selfish mining strategies in bitcoin. CoRR. 2015. 31 p.
##submission.downloads##
Опубліковано
Номер
Розділ
Ліцензія
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).