Simulação do Penny Attack no Ethereum e sua Identificação usando Classificadores

Abstract


The growing interest in Ethereum leads to concerns in its security, given that there have already been attacks that exploited its charging mechanism or Penny Attack. These attacks affected the network, causing transactions congestion and there are indications that Ethereum remains susceptible to this type of attack. We analyze the behavior of the network during a Penny Attack, assuming its negligible cost to the attacker and seeking machine learning techniques to detect it previously, using transaction attributes. Our techniques had an AUC, Fb and recall greater than 94%, 82% and 98% respectively.

Keywords: Ethereum, DDoS, Comitê, Aprendizado de máquina

References

Buterin, V. (2016). Transaction spam attack: Next steps. URLhttps://blog.ethereum.org/2016/09/22/transaction-spam-attack-next-steps.

Chen, T., Li, X., Wang, Y., Chen, J., Li, Z., Luo, X., Au, M. H., and Zhang, X. (2017). Anadaptive gas cost mechanism for ethereum to defend against under-priced dos attacks.In International Conference on Information Security Practice and Experience, pages3-24. Springer.

Gautham (2016). Ethereum network comes across yet another dos attack. URLhttps:/Nvww.newsbtc.com/2016/09/23/ethereum-dao-attack-attack-platforms-credibility.

Gerard, D. (2017). Attack of the 50 foot blockchain: Bitcoin, blockchain, Ethereum &smart contracts. David Gerard.

Sousa, J. E. d. A., Oliveira, V., Valadares, J., Vieira, A. B., Bernardino, H. S., and Dias,G. (2019). An analysis of the fees and pending time correlation in ethereum. In IFIPLANOMS, 9th Latin American Network Operations and Management Symposium.

Sousa, J. E. d. A., Oliveira, V., Valadares, J., Vieira, A. B., Villela, S. M., Bernardino,H.sS., and Dias, G. (2020). An analysis of the fees and pending time correlation inethereum. International Journal of Network Management nem.2113.
Published
2020-12-07
SOUSA, José Eduardo de Azevedo; OLIVEIRA, Vinicius; VALADARES, Julia Almeida; VIEIRA, Alex Borges; BERNARDINO, Heder Soares; VILLELA, Saulo Moraes; GONÇALVES, Glauber Dias. Simulação do Penny Attack no Ethereum e sua Identificação usando Classificadores. In: BLOCKCHAIN WORKSHOP: THEORY, TECHNOLOGY AND APPLICATIONS (WBLOCKCHAIN), 3. , 2020, Rio de Janeiro. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2020 . p. 108-113. DOI: https://doi.org/10.5753/wblockchain.2020.12438.