Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Saad, M. | - |
dc.contributor.author | Kim, J. | - |
dc.contributor.author | Nyang, D. | - |
dc.contributor.author | Mohaisen, D. | - |
dc.date.accessioned | 2021-12-02T21:41:24Z | - |
dc.date.available | 2021-12-02T21:41:24Z | - |
dc.date.created | 2021-08-31 | - |
dc.date.issued | 2021-04-01 | - |
dc.identifier.issn | 1084-8045 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/128970 | - |
dc.description.abstract | Blockchain-based cryptocurrencies, such as Bitcoin, have seen on the rise in their popularity and value, making them a target to several forms of Denial-of-Service (DoS) attacks, and calling for a better understanding of their attack surface from both security and distributed systems standpoints. In this paper, and in the pursuit of understanding the attack surface of blockchains, we explore a new form of attack that can be carried out on the memory pools (mempools), and mainly targets blockchain-based cryptocurrencies. We study this attack on Bitcoin's mempool and explore the attack's effects on transactions fee paid by benign users. To counter this attack, this paper further proposes Contra-∗, a set of countermeasures utilizing fee, age, and size (thus, Contra-F, Contra-A, and Contra-S) as prioritization mechanisms. Contra-∗ optimize the mempool size and help in countering the effects of DoS attacks due to spam transactions. We evaluate Contra-∗ by simulations and analyze their effectiveness under various attack conditions. © 2021 Elsevier Ltd | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | Academic Press | - |
dc.title | Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, J. | - |
dc.identifier.doi | 10.1016/j.jnca.2020.102971 | - |
dc.identifier.scopusid | 2-s2.0-85100872599 | - |
dc.identifier.wosid | 000633020500002 | - |
dc.identifier.bibliographicCitation | Journal of Network and Computer Applications, v.179 | - |
dc.relation.isPartOf | Journal of Network and Computer Applications | - |
dc.citation.title | Journal of Network and Computer Applications | - |
dc.citation.volume | 179 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordAuthor | Blockchains | - |
dc.subject.keywordAuthor | DDoS attacks | - |
dc.subject.keywordAuthor | Memory pool | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.