Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools

Full metadata record
DC Field Value Language
dc.contributor.authorSaad, M.-
dc.contributor.authorKim, J.-
dc.contributor.authorNyang, D.-
dc.contributor.authorMohaisen, D.-
dc.date.accessioned2021-12-02T21:41:24Z-
dc.date.available2021-12-02T21:41:24Z-
dc.date.created2021-08-31-
dc.date.issued2021-04-01-
dc.identifier.issn1084-8045-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/128970-
dc.description.abstractBlockchain-based cryptocurrencies, such as Bitcoin, have seen on the rise in their popularity and value, making them a target to several forms of Denial-of-Service (DoS) attacks, and calling for a better understanding of their attack surface from both security and distributed systems standpoints. In this paper, and in the pursuit of understanding the attack surface of blockchains, we explore a new form of attack that can be carried out on the memory pools (mempools), and mainly targets blockchain-based cryptocurrencies. We study this attack on Bitcoin's mempool and explore the attack's effects on transactions fee paid by benign users. To counter this attack, this paper further proposes Contra-∗, a set of countermeasures utilizing fee, age, and size (thus, Contra-F, Contra-A, and Contra-S) as prioritization mechanisms. Contra-∗ optimize the mempool size and help in countering the effects of DoS attacks due to spam transactions. We evaluate Contra-∗ by simulations and analyze their effectiveness under various attack conditions. © 2021 Elsevier Ltd-
dc.languageEnglish-
dc.language.isoen-
dc.publisherAcademic Press-
dc.titleContra-∗: Mechanisms for countering spam attacks on blockchain's memory pools-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, J.-
dc.identifier.doi10.1016/j.jnca.2020.102971-
dc.identifier.scopusid2-s2.0-85100872599-
dc.identifier.wosid000633020500002-
dc.identifier.bibliographicCitationJournal of Network and Computer Applications, v.179-
dc.relation.isPartOfJournal of Network and Computer Applications-
dc.citation.titleJournal of Network and Computer Applications-
dc.citation.volume179-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Interdisciplinary Applications-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordAuthorBlockchains-
dc.subject.keywordAuthorDDoS attacks-
dc.subject.keywordAuthorMemory pool-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > School of Electrical Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Joong heon photo

Kim, Joong heon
공과대학 (전기전자공학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE