Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools

被引:112
|
作者
Johnson, Benjamin [2 ]
Laszka, Aron
Grossklags, Jens [1 ]
Vasek, Marie [3 ]
Moore, Tyler [3 ]
机构
[1] Penn State Univ, State Coll, PA 16801 USA
[2] Univ Calif Berkeley, Berkeley, CA 94720 USA
[3] Southern Methodist Univ, Dallas, TX 75275 USA
基金
美国国家科学基金会; 美国安德鲁·梅隆基金会;
关键词
Game theory; Bitcoin; Internet; Security; DDoS; SECURITY; ECONOMICS;
D O I
10.1007/978-3-662-44774-1_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the unique features of the digital currency Bitcoin is that new cash is introduced by so-called miners carrying out resource-intensive proof-of-work operations. To increase their chances of obtaining freshly minted bitcoins, miners typically join pools to collaborate on the computations. However, intense competition among mining pools has recently manifested in two ways. Miners may invest in additional computing resources to increase the likelihood of winning the next mining race. But, at times, a more sinister tactic is also employed: a mining pool may trigger a costly distributed denial-of-service (DDoS) attack to lower the expected success outlook of a competing mining pool. We explore the trade-off between these strategies with a series of game-theoretical models of competition between two pools of varying sizes. We consider differences in costs of investment and attack, as well as uncertainty over whether a DDoS attack will succeed. By characterizing the game's equilibria, we can draw a number of conclusions. In particular, we find that pools have a greater incentive to attack large pools than small ones. We also observe that larger mining pools have a greater incentive to attack than smaller ones.
引用
收藏
页码:72 / 86
页数:15
相关论文
共 50 条
  • [21] A game-theoretic analysis of denial of service attacks in wireless random access
    Sagduyu, Yalin Evren
    Ephremides, Anthony
    [J]. WIRELESS NETWORKS, 2009, 15 (05) : 651 - 666
  • [22] A game-theoretic analysis of denial of service attacks in wireless random access
    Sagduyu, Yalin Evren
    Ephremides, Anthony
    [J]. 2007 5TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS AND WORKSHOPS, VOLS 1-2, 2007, : 224 - +
  • [23] A Game-Theoretic Model for DDoS Mitigation Strategies with Cloud Services
    Al Islam, Maher
    Fung, Carol J.
    Tantawy, Ashraf
    Abdelwahed, Sherif
    [J]. PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [24] Counterterrorism - A game-theoretic analysis
    Arce, DG
    Sandler, T
    [J]. JOURNAL OF CONFLICT RESOLUTION, 2005, 49 (02) : 183 - 200
  • [25] A game-theoretic analysis of skyscrapers
    Helsley, Robert W.
    Strange, William C.
    [J]. JOURNAL OF URBAN ECONOMICS, 2008, 64 (01) : 49 - 64
  • [26] A Game-Theoretic Model on Coalitional Attacks in Smart Grid
    Yang, Xinyu
    He, Xiaofei
    Lin, Jie
    Yu, Wei
    Yang, Qingyu
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 435 - 442
  • [27] Securing NextG Systems against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution
    Sagduyu, Yalin E.
    Erpek, Tugba
    Shi, Yi
    [J]. MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2023,
  • [28] Dynamic Game-Theoretic Defense Approach against Stealthy Jamming Attacks in Wireless Networks
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    [J]. 2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 252 - 258
  • [29] A Game-Theoretic Defense Against Data Poisoning Attacks in Distributed Support Vector Machines
    Zhang, Rui
    Zhu, Quanyan
    [J]. 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [30] A game-theoretic approach for power systems defense against dynamic cyber-attacks
    Hasan, Saqib
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2020, 115