SlideShare a Scribd company logo
1 of 15
Download to read offline
Eclipse Attacks on Bitcoin’s
Peer-to-Peer Network
Ethan Heilman and Alison Kendler, Boston University; Aviv Zohar, The Hebrew University of
Jerusalem and MSR Israel; Sharon Goldberg, Boston University
24th USENIX Security Symposium
August 12–14, 2015 • Washington, D.C.
Summarized by Hideyuki Komaki (ID: husky)
Outline
1. Eclipse attacks & implications
- What is an eclipse attack?
- 51% attacks with far less than 51% of the mining power.
- N-Confirmation double spending
2. How to eclipse Bitcoin node
- P2P network details
- How to exploit it
3. How many IPs does the attacker need?
- Models & Experimental result
- Botnets & Infrastructure
4. Countermeasures
- Current deployment
- Effectiveness of countermeasures
What is an eclipse attack?
👿
👿
👿
👿
👿
👿
👿
👿
👿
👿
👿
👿
Max 8 outgoing TCP
connections by default
(purple)
Max 117 incoming TCP
connections by default
(blue)
< P2P gossip network >
Each node uses a randomized protocol
to select eight peers with which it forms
long-lived outgoing connections, and to
propagate and store addressed of other
potential peers in the network.
By manipulating the P2P network, the
attacker eclipse the node.
Implications of an eclipse attack
👿
1. 51% attack
2. N-Confirmation double spending
30% of mining power 30% of mining power40% of mining power
👿
30% of mining power
70% of mining powerMerchant
How to eclipse a node?
1. Fill node’s peer tables, with attacker IPs.
2. The node restarts and loses it current outgoing connections.
3. Node makes new connections to only Attacker IPs.
How to store network information & why does it have vulnerability?
Storing and Selecting IPs.
New Table
256 Buckets
Tried Table
64 buckets
New table: IPs the node heard about. (the node has yet initiated
a successful connection but learned from DNS seeder or ADDR
message.)
Tried table: IPs the node peerd with at some point. (an incoming
or an outgoing)
To find an IP to make an outgoing connection to:
1. Choose new or tried table to select from.
2. Select an IP (biased toward “fresher” timestanps).
3. Attempt an outgoing connection to that IP.
Storing and Selecting IPs.
New Table
256 Buckets
Tried Table
64 buckets
140.254.129.21
140.254
/16 IPv4 prefix
An IP address sent to
tried.Hash-by-group makes attack harder! But...
Storing and Selecting IPs.
New Table
256 Buckets
Tried Table
64 buckets
Why can an attacker fill node’s peer table with attacker IPs?:
Vulnerability 1: Selection Bias to choose outgoing node.
Vulnerability 2: Try-try again (An attacker can resend IPs.)
Vulnerability 3: Eviction Bias
Full bucket case:
1. Randomly select 4 IPs.
2. Delete oldest IP.
3. Insert new IP.
How many IPs does the attacker need?
~ Botnet case ~Approach:
1. Model Bitcoin with probability analysis & Monte-Carlo simulations.
2. Use these models to determine effective attack parameters.
3. Experimentally verify these parameters against Bitcoin nodes.
Bot
< Analysis of worst case for attacker >
Before attack: Tried table is 99.9% full of
honest IPs (4093 IPs).
Attacker Resources: Botnets of 4600 IPs, 2
IPs per group. 5 hours invested.
After attack: Node’s tried table is now 98.8%
attacker IPs.
How many IPs does the attacker need?
~ Infrastructure case ~
< Analysis of worst case for attacker >
Before attack: Tried table is 99.9% full of
honest IPs (4090 IPs).
Attacker Resources: Infrastructure of 8192
IPs, 32 group. 10 hours invested.
After attack: Node’s tried table is now 98%
attacker IPs.
the number of addresses per
group t.
Approach:
1. Model Bitcoin with probability analysis & Monte-Carlo simulations.
2. Use these models to determine effective attack parameters.
3. Experimentally verify these parameters against Bitcoin nodes.
Live experiment
Before attack:
Connected a node to the bitcoin network for +43 days.
Node’s tried table has 298 honest IPs.
Attacker Resources:
Botnets of 400 IPs = 400 groups, 1 IPs per group.
1 hour invested.
After attack:
Tried table still mostly empty but 57% of IPs are attacker IPs.
Experimental results:
84% attacker success rate (all 8 going connection eclipsed.)
Countermeasures
1. Deterministic Random eviction
- Vulnerability: The attacker can send IPs over and over again.
- Countermeasure: just as each address deterministically hashed to a single bucket in tried and
new, an address also deterministically hashed to a single slot in the bucket.
2. Random selection
- Vulnerability: The heavily bias makes attack easier.
- Countermeasure: eliminate the bias and select an address at random from tried and new bucket.
3. Test before evict.
- Vulnerability: An older address are likely to be evicted, so attacker IPs get into the bucket easier.
- Countermeasure: before evicting an older address, check if the address can connect successfully,
if so, the address won’t be evicted.
with test
before evict
without test before evict
Countermeasures
4. Feeler Connections
- Vulnerability: current bucket allow to insert “trash”.
- Countermeasure: Add an outgoing connection that establish short-lived test connections to
randomly-selected addresses in new. If connection success, the address is evicted from new and
inserted into tried; otherwise, the address is evicted from new.
5. Anchor connections
- Vulnerability: all outgoing connection will be refresh after the restart.
- Countermeasure: add an anchor table that stores current outgoing connections.
6 More buckets
- Countermeasure: increase the size of the tried and new tables. (it needs to combine other
countermeasure).
7 More outgoing connections
- Countermeasure: increase the number of outgoing connections.
Countermeasures
8. Ban unsolicited ADDR message
- Vulnerability: the attacker can fill new bucket with trash addresses easier.
- Countermeasures: A node could choose not to accept large unsolicited ADDR messages from
incoming peers, and only solicit ADDR messages from outgoing connections when its new table is
too empty. It prevents adversarial incoming connections from flooding a victim’s new table with
trash addresses.
9. Diversify incoming connections
- Vulnerability: Current bitcoin system allows incoming connections from the same IP address.
- Countermeasures: a node accept only a limited number of connection from the same IP address.
10. Anomaly detection
- Countermeasures: monitoring and anomaly detection system that look for the behavior that mining
power is gradually decreasing.
Deployment
Link of github: https://github.com/bitcoin/bitcoin/pull/5941

More Related Content

What's hot

Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systemsvamsi_xmen
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)david rom
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortDisha Bedi
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniAdam Nurudini
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security modelsG Prachi
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection PresentationMustafash79
 
Network software n othr types of software
Network software n othr types of software Network software n othr types of software
Network software n othr types of software Dhani Ahmad
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 
Windows firewall
Windows firewallWindows firewall
Windows firewallVC Infotech
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS)Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS)Hachmdhmdzad
 

What's hot (20)

Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
Network Security
Network SecurityNetwork Security
Network Security
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Network Security
Network SecurityNetwork Security
Network Security
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security models
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Network software n othr types of software
Network software n othr types of software Network software n othr types of software
Network software n othr types of software
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS)Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS)
 

Similar to Eclipse Attacks on Bitcoin’s Peer-to-Peer Network

IP__ Address__Subnetting.pdf
IP__ Address__Subnetting.pdfIP__ Address__Subnetting.pdf
IP__ Address__Subnetting.pdffanuel22
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardwarevanhoefm
 
Lecture28 cc-security3
Lecture28 cc-security3Lecture28 cc-security3
Lecture28 cc-security3Ankit Gupta
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full reportdeepakmarndi
 
2.communcation in distributed system
2.communcation in distributed system2.communcation in distributed system
2.communcation in distributed systemGd Goenka University
 
Filterbased addressing protocol for effective node auto configuration in ad h...
Filterbased addressing protocol for effective node auto configuration in ad h...Filterbased addressing protocol for effective node auto configuration in ad h...
Filterbased addressing protocol for effective node auto configuration in ad h...varun priyan
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
 
An internet worm early warning system
An internet worm early warning systemAn internet worm early warning system
An internet worm early warning systemUltraUploader
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 

Similar to Eclipse Attacks on Bitcoin’s Peer-to-Peer Network (20)

IP__ Address__Subnetting.pdf
IP__ Address__Subnetting.pdfIP__ Address__Subnetting.pdf
IP__ Address__Subnetting.pdf
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardware
 
Lecture28 cc-security3
Lecture28 cc-security3Lecture28 cc-security3
Lecture28 cc-security3
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
Can ppt
Can pptCan ppt
Can ppt
 
1716 1719
1716 17191716 1719
1716 1719
 
1716 1719
1716 17191716 1719
1716 1719
 
2.communcation in distributed system
2.communcation in distributed system2.communcation in distributed system
2.communcation in distributed system
 
spam.ppt
spam.pptspam.ppt
spam.ppt
 
Filterbased addressing protocol for effective node auto configuration in ad h...
Filterbased addressing protocol for effective node auto configuration in ad h...Filterbased addressing protocol for effective node auto configuration in ad h...
Filterbased addressing protocol for effective node auto configuration in ad h...
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
6620handout4t
6620handout4t6620handout4t
6620handout4t
 
DoS.ppt
DoS.pptDoS.ppt
DoS.ppt
 
DoS.ppt
DoS.pptDoS.ppt
DoS.ppt
 
DoS.ppt
DoS.pptDoS.ppt
DoS.ppt
 
Cn ipv4 addressing
Cn ipv4 addressingCn ipv4 addressing
Cn ipv4 addressing
 
Bitcoin MOOC Lecture 2.pptx
Bitcoin MOOC Lecture 2.pptxBitcoin MOOC Lecture 2.pptx
Bitcoin MOOC Lecture 2.pptx
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
 
An internet worm early warning system
An internet worm early warning systemAn internet worm early warning system
An internet worm early warning system
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 

Recently uploaded

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

Eclipse Attacks on Bitcoin’s Peer-to-Peer Network

  • 1. Eclipse Attacks on Bitcoin’s Peer-to-Peer Network Ethan Heilman and Alison Kendler, Boston University; Aviv Zohar, The Hebrew University of Jerusalem and MSR Israel; Sharon Goldberg, Boston University 24th USENIX Security Symposium August 12–14, 2015 • Washington, D.C. Summarized by Hideyuki Komaki (ID: husky)
  • 2. Outline 1. Eclipse attacks & implications - What is an eclipse attack? - 51% attacks with far less than 51% of the mining power. - N-Confirmation double spending 2. How to eclipse Bitcoin node - P2P network details - How to exploit it 3. How many IPs does the attacker need? - Models & Experimental result - Botnets & Infrastructure 4. Countermeasures - Current deployment - Effectiveness of countermeasures
  • 3. What is an eclipse attack? 👿 👿 👿 👿 👿 👿 👿 👿 👿 👿 👿 👿 Max 8 outgoing TCP connections by default (purple) Max 117 incoming TCP connections by default (blue) < P2P gossip network > Each node uses a randomized protocol to select eight peers with which it forms long-lived outgoing connections, and to propagate and store addressed of other potential peers in the network. By manipulating the P2P network, the attacker eclipse the node.
  • 4. Implications of an eclipse attack 👿 1. 51% attack 2. N-Confirmation double spending 30% of mining power 30% of mining power40% of mining power 👿 30% of mining power 70% of mining powerMerchant
  • 5. How to eclipse a node? 1. Fill node’s peer tables, with attacker IPs. 2. The node restarts and loses it current outgoing connections. 3. Node makes new connections to only Attacker IPs. How to store network information & why does it have vulnerability?
  • 6. Storing and Selecting IPs. New Table 256 Buckets Tried Table 64 buckets New table: IPs the node heard about. (the node has yet initiated a successful connection but learned from DNS seeder or ADDR message.) Tried table: IPs the node peerd with at some point. (an incoming or an outgoing) To find an IP to make an outgoing connection to: 1. Choose new or tried table to select from. 2. Select an IP (biased toward “fresher” timestanps). 3. Attempt an outgoing connection to that IP.
  • 7. Storing and Selecting IPs. New Table 256 Buckets Tried Table 64 buckets 140.254.129.21 140.254 /16 IPv4 prefix An IP address sent to tried.Hash-by-group makes attack harder! But...
  • 8. Storing and Selecting IPs. New Table 256 Buckets Tried Table 64 buckets Why can an attacker fill node’s peer table with attacker IPs?: Vulnerability 1: Selection Bias to choose outgoing node. Vulnerability 2: Try-try again (An attacker can resend IPs.) Vulnerability 3: Eviction Bias Full bucket case: 1. Randomly select 4 IPs. 2. Delete oldest IP. 3. Insert new IP.
  • 9. How many IPs does the attacker need? ~ Botnet case ~Approach: 1. Model Bitcoin with probability analysis & Monte-Carlo simulations. 2. Use these models to determine effective attack parameters. 3. Experimentally verify these parameters against Bitcoin nodes. Bot < Analysis of worst case for attacker > Before attack: Tried table is 99.9% full of honest IPs (4093 IPs). Attacker Resources: Botnets of 4600 IPs, 2 IPs per group. 5 hours invested. After attack: Node’s tried table is now 98.8% attacker IPs.
  • 10. How many IPs does the attacker need? ~ Infrastructure case ~ < Analysis of worst case for attacker > Before attack: Tried table is 99.9% full of honest IPs (4090 IPs). Attacker Resources: Infrastructure of 8192 IPs, 32 group. 10 hours invested. After attack: Node’s tried table is now 98% attacker IPs. the number of addresses per group t. Approach: 1. Model Bitcoin with probability analysis & Monte-Carlo simulations. 2. Use these models to determine effective attack parameters. 3. Experimentally verify these parameters against Bitcoin nodes.
  • 11. Live experiment Before attack: Connected a node to the bitcoin network for +43 days. Node’s tried table has 298 honest IPs. Attacker Resources: Botnets of 400 IPs = 400 groups, 1 IPs per group. 1 hour invested. After attack: Tried table still mostly empty but 57% of IPs are attacker IPs. Experimental results: 84% attacker success rate (all 8 going connection eclipsed.)
  • 12. Countermeasures 1. Deterministic Random eviction - Vulnerability: The attacker can send IPs over and over again. - Countermeasure: just as each address deterministically hashed to a single bucket in tried and new, an address also deterministically hashed to a single slot in the bucket. 2. Random selection - Vulnerability: The heavily bias makes attack easier. - Countermeasure: eliminate the bias and select an address at random from tried and new bucket. 3. Test before evict. - Vulnerability: An older address are likely to be evicted, so attacker IPs get into the bucket easier. - Countermeasure: before evicting an older address, check if the address can connect successfully, if so, the address won’t be evicted. with test before evict without test before evict
  • 13. Countermeasures 4. Feeler Connections - Vulnerability: current bucket allow to insert “trash”. - Countermeasure: Add an outgoing connection that establish short-lived test connections to randomly-selected addresses in new. If connection success, the address is evicted from new and inserted into tried; otherwise, the address is evicted from new. 5. Anchor connections - Vulnerability: all outgoing connection will be refresh after the restart. - Countermeasure: add an anchor table that stores current outgoing connections. 6 More buckets - Countermeasure: increase the size of the tried and new tables. (it needs to combine other countermeasure). 7 More outgoing connections - Countermeasure: increase the number of outgoing connections.
  • 14. Countermeasures 8. Ban unsolicited ADDR message - Vulnerability: the attacker can fill new bucket with trash addresses easier. - Countermeasures: A node could choose not to accept large unsolicited ADDR messages from incoming peers, and only solicit ADDR messages from outgoing connections when its new table is too empty. It prevents adversarial incoming connections from flooding a victim’s new table with trash addresses. 9. Diversify incoming connections - Vulnerability: Current bitcoin system allows incoming connections from the same IP address. - Countermeasures: a node accept only a limited number of connection from the same IP address. 10. Anomaly detection - Countermeasures: monitoring and anomaly detection system that look for the behavior that mining power is gradually decreasing.
  • 15. Deployment Link of github: https://github.com/bitcoin/bitcoin/pull/5941