Papers
Topics
Authors
Recent
2000 character limit reached

New intelligent defense systems to reduce the risks of Selfish Mining and Double-Spending attacks using Learning Automata (2307.00529v2)

Published 2 Jul 2023 in cs.CR and cs.LG

Abstract: In this paper, we address the critical challenges of double-spending and selfish mining attacks in blockchain-based digital currencies. Double-spending is a problem where the same tender is spent multiple times during a digital currency transaction, while selfish mining is an intentional alteration of a blockchain to increase rewards to one miner or a group of miners. We introduce a new attack that combines both these attacks and propose a machine learning-based solution to mitigate the risks associated with them. Specifically, we use the learning automaton, a powerful online learning method, to develop two models, namely the SDTLA and WVBM, which can effectively defend against selfish mining attacks. Our experimental results show that the SDTLA method increases the profitability threshold of selfish mining up to 47$\%$, while the WVBM method performs even better and is very close to the ideal situation where each miner's revenue is proportional to their shared hash processing power. Additionally, we demonstrate that both methods can effectively reduce the risks of double-spending by tuning the $Z$ Parameter. Our findings highlight the potential of SDTLA and WVBM as promising solutions for enhancing the security and efficiency of blockchain networks.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (22)
  1. An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress), pages 557–564. Ieee, 2017.
  2. Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Decentralized business review, page 21260, 2008.
  3. Majority is not enough: Bitcoin mining is vulnerable. Communications of the ACM, 61(7):95–102, 2018.
  4. Optimal selfish mining strategies in bitcoin. In Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers 20, pages 515–532. Springer, 2017.
  5. Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, 2016.
  6. Blockchain attacks analysis and a model to solve double spending attack. International Journal of Machine Learning and Computing, 10(2):352–357, 2020.
  7. On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pages 3–16, 2016.
  8. Learning automata: an introduction. Courier corporation, 2012.
  9. Vdhla: Variable depth hybrid learning automaton and its application to defense against the selfish mining attack in bitcoin. arXiv preprint arXiv:2302.12096, 2023a.
  10. Publish or perish: A backward-compatible defense against selfish mining in bitcoin. In Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings, pages 277–292. Springer, 2017.
  11. Ethan Heilman. One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner. In Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers 18, pages 161–162. Springer, 2014.
  12. Countering selfish mining in blockchains. In 2019 International Conference on Computing, Networking and Communications (ICNC), pages 360–364. IEEE, 2019.
  13. Preventing bitcoin selfish mining using transaction creation time. In 2018 International Conference on Software Security and Assurance (ICSSA), pages 19–24. IEEE, 2018.
  14. Nik defense: An artificial intelligence based defense mechanism against selfish mining in bitcoin. arXiv preprint arXiv:2301.11463, 2023b.
  15. On the detection of selfish mining and stalker attacks in blockchain networks. Annals of Telecommunications, 75:143–152, 2020.
  16. Towards detection of selfish mining using machine learning. In International Conference on Cyber Warfare and Security, volume 17, pages 237–243, 2022.
  17. Two bitcoins at the price of one? double-spending attacks on fast payments in bitcoin. Cryptology EPrint Archive, 2012.
  18. Misbehavior in bitcoin: A study of double-spending and accountability. ACM Transactions on Information and System Security (TISSEC), 18(1):1–32, 2015.
  19. Countering double-spend attacks on bitcoin fast-pay transactions. In Proc. Workshop Technol. Consum. Protection, pages 1–3, 2017.
  20. Have a snack, pay with bitcoins. In IEEE P2P 2013 Proceedings, pages 1–5. IEEE, 2013.
  21. Jamal Hayat Mosakheil. Security Threats Classification in Blockchains. Master’s thesis, St. Cloud State University, St. Cloud, Minnesota, 2018.
  22. Joseph Bonneau. Why buy when you can rent? bribery attacks on bitcoin-style consensus. In Financial Cryptography and Data Security: FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers 20, pages 19–26. Springer, 2016.
Citations (1)

Summary

We haven't generated a summary for this paper yet.

Whiteboard

Paper to Video (Beta)

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.