Instantaneous and limiting behavior of an n-node blockchain under cyber attacks from a single hacker

02/08/2022
by   Xiufeng Xu, et al.
0

We investigate the instantaneous and limiting behavior of an n-node blockchain which is under continuous monitoring of the IT department of a company but faces non-stop cyber attacks from a single hacker. The blockchain is functional as far as no data stored on it has been changed, deleted, or locked. Once the IT department detects the attack from the hacker, it will immediately re-set the blockchain, rendering all previous efforts of the hacker in vain. The hacker will not stop until the blockchain is dysfunctional. For arbitrary distributions of the hacking times and detecting times, we derive the limiting functional probability, instantaneous functional probability, and mean functional time of the blockchain. We also show that all these quantities are increasing functions of the number of nodes, substantiating the intuition that the more nodes a blockchain has, the harder it is for a hacker to succeed in a cyber attack.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/27/2018

On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach

Open-access blockchains based on proof-of-work protocols have gained tre...
research
04/06/2019

Exploring the Attack Surface of Blockchain: A Systematic Overview

In this paper, we systematically explore the attack surface of the Block...
research
04/10/2023

Quantum Cyber-Attack on Blockchain-based VANET

Blockchain-based Vehicular Ad-hoc Network (VANET) is widely considered a...
research
05/15/2019

A Framework for Blockchain Interoperability and Runtime Selection

The suitability of a particular blockchain for a given use case depends ...
research
03/30/2023

Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets: A Crypto Terminal Use Case

Blockchain transactions are signed by private keys. Secure key storage a...
research
08/30/2021

Overcoming Data Availability Attacks in Blockchain Systems: LDPC Code Design for Coded Merkle Tree

Light nodes are clients in blockchain systems that only store a small po...
research
04/02/2022

Countering Active Attacks on RAFT-based IoT Blockchain Networks

This paper considers an Internet of Thing (IoT) blockchain network consi...

Please sign up or login with your details

Forgot password? Click here to reset