Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures

被引:15
|
作者
Duan, Li [1 ,2 ]
Sun, Yangyang [1 ]
Zhang, Kejia [3 ,4 ]
Ding, Yong [2 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, Beijing 100044, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Guangxi, Peoples R China
[3] Heilongjiang Univ, Sch Math Sci, Harbin 150080, Peoples R China
[4] Heilongjiang Univ, Cryptol & Cyberspace Secur Lab, Harbin 150080, Peoples R China
基金
北京市自然科学基金; 国家重点研发计划; 中国国家自然科学基金;
关键词
Ethereum - Losses - Denial-of-service attack - Network security - Security systems;
D O I
10.1155/2022/5307697
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain technology has been widely used in digital currency, Internet of Things, and other important fields because of its decentralization, nontampering, and anonymity. The vigorous development of blockchain cannot be separated from the security guarantee. However, there are various security threats within the blockchain that have shown in the past to cause huge financial losses. This paper aims at studying the multi-level security threats existing in the Ethereum blockchain, and exploring the security protection schemes under multiple attack scenarios. There are ten attack scenarios studied in this paper, which are replay attack, short url attack, false top-up attack, transaction order dependence attack, integer overflow attack, re-entrancy attack, honeypot attack, airdrop hunting attack, writing of arbitrary storage address attack, and gas exhaustion denial of service attack. This paper also proposes protection schemes. Finally, these schemes are evaluated by experiments. Experimental results show that our approach is efficient and does not bring too much extra cost and that the time cost has doubled at most.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Research on security threats and Countermeasures for Cloud Computing
    Mi, Qing
    Ni, Zhen-tao
    Wang, Xiao-duan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 322 - 327
  • [32] Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract
    Kushwaha, Satpal Singh
    Joshi, Sandeep
    Singh, Dilbag
    Kaur, Manjit
    Lee, Heung-No
    IEEE ACCESS, 2022, 10 : 6605 - 6621
  • [33] The Impact of Ethereum Node Service Centralization on the Security and Efficiency of Blockchain
    Sinkevich, Denis
    Anikin, Anton
    Chibrikov, Alexey
    Rak, Dmitry
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS-ICCSA 2024 WORKSHOPS, PT I, 2024, 14815 : 214 - 225
  • [34] Moral Minds as Multiple-Layer Organizations
    Coelho, Helder
    da Rocha Costa, Antonio Carlos
    Trigo, Paulo
    ADVANCES IN ARTIFICIAL INTELLIGENCE - IBERAMIA 2010, 2010, 6433 : 254 - 263
  • [35] Security in Software-Defined Networking: Threats and Countermeasures
    Shu, Zhaogang
    Wan, Jiafu
    Li, Di
    Lin, Jiaxiang
    Vasilakos, Athanasios V.
    Imran, Muhammad
    MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05): : 764 - 776
  • [36] On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
    Kumar, Rakesh
    Goyal, Rinkaj
    COMPUTER SCIENCE REVIEW, 2019, 33 : 1 - 48
  • [37] Machine learning security and privacy: a review of threats and countermeasures
    Paracha, Anum
    Arshad, Junaid
    Farah, Mohamed Ben
    Ismail, Khalid
    EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01)
  • [38] A Survey: Security Threats and Countermeasures in Software Defined Networking
    Mubarakali, Azath
    Alqahtani, Abdulrahman Saad
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2019, : 180 - 185
  • [39] Security Threats and Countermeasures for Intra-Vehicle Networks
    Wampler, David
    Fu, Huirong
    Zhu, Ye
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 153 - +
  • [40] E-business, recent threats and security countermeasures
    Pournouri, Sina
    Craven, Matthew
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (03) : 169 - 184