Attacks over Blockchain

The Complete Blockchain Professional Course Various types of attacks over Blockchain
9 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$99.99
List Price:  $139.99
You save:  $40
€93.47
List Price:  €130.87
You save:  €37.39
£79.12
List Price:  £110.77
You save:  £31.65
CA$136.80
List Price:  CA$191.52
You save:  CA$54.72
A$153.03
List Price:  A$214.24
You save:  A$61.21
S$136.24
List Price:  S$190.75
You save:  S$54.50
HK$782.75
List Price:  HK$1,095.89
You save:  HK$313.13
CHF 90.39
List Price:  CHF 126.55
You save:  CHF 36.16
NOK kr1,103.76
List Price:  NOK kr1,545.32
You save:  NOK kr441.55
DKK kr697.01
List Price:  DKK kr975.84
You save:  DKK kr278.83
NZ$168.36
List Price:  NZ$235.71
You save:  NZ$67.35
د.إ367.25
List Price:  د.إ514.16
You save:  د.إ146.91
৳11,001.09
List Price:  ৳15,401.97
You save:  ৳4,400.87
₹8,339.41
List Price:  ₹11,675.50
You save:  ₹3,336.09
RM476.70
List Price:  RM667.40
You save:  RM190.70
₦132,134.22
List Price:  ₦184,993.20
You save:  ₦52,858.97
₨27,905.82
List Price:  ₨39,069.27
You save:  ₨11,163.44
฿3,697.97
List Price:  ฿5,177.30
You save:  ฿1,479.33
₺3,250.47
List Price:  ₺4,550.79
You save:  ₺1,300.31
B$511.57
List Price:  B$716.23
You save:  B$204.65
R1,877.82
List Price:  R2,629.02
You save:  R751.20
Лв182.79
List Price:  Лв255.92
You save:  Лв73.12
₩137,795.03
List Price:  ₩192,918.56
You save:  ₩55,123.52
₪381.78
List Price:  ₪534.51
You save:  ₪152.73
₱5,764.02
List Price:  ₱8,069.86
You save:  ₱2,305.84
¥15,807.91
List Price:  ¥22,131.71
You save:  ¥6,323.80
MX$1,715.83
List Price:  MX$2,402.24
You save:  MX$686.40
QR365.49
List Price:  QR511.70
You save:  QR146.21
P1,379.76
List Price:  P1,931.72
You save:  P551.96
KSh13,280.92
List Price:  KSh18,593.82
You save:  KSh5,312.90
E£4,785.67
List Price:  E£6,700.13
You save:  E£1,914.46
ብር5,752.60
List Price:  ብር8,053.87
You save:  ብር2,301.27
Kz83,397.65
List Price:  Kz116,760.05
You save:  Kz33,362.40
CLP$95,187.41
List Price:  CLP$133,266.18
You save:  CLP$38,078.77
CN¥724.48
List Price:  CN¥1,014.31
You save:  CN¥289.82
RD$5,876.15
List Price:  RD$8,226.85
You save:  RD$2,350.69
DA13,419.92
List Price:  DA18,788.43
You save:  DA5,368.50
FJ$226.22
List Price:  FJ$316.72
You save:  FJ$90.50
Q779.62
List Price:  Q1,091.50
You save:  Q311.88
GY$20,970.66
List Price:  GY$29,359.76
You save:  GY$8,389.10
ISK kr14,012.52
List Price:  ISK kr19,618.09
You save:  ISK kr5,605.56
DH1,012.51
List Price:  DH1,417.55
You save:  DH405.04
L1,776.81
List Price:  L2,487.61
You save:  L710.79
ден5,750.48
List Price:  ден8,050.91
You save:  ден2,300.42
MOP$808.27
List Price:  MOP$1,131.61
You save:  MOP$323.34
N$1,891.23
List Price:  N$2,647.80
You save:  N$756.57
C$3,688.83
List Price:  C$5,164.51
You save:  C$1,475.68
रु13,363.42
List Price:  रु18,709.33
You save:  रु5,345.90
S/376.55
List Price:  S/527.19
You save:  S/150.63
K386.91
List Price:  K541.69
You save:  K154.78
SAR375
List Price:  SAR525.02
You save:  SAR150.01
ZK2,656.27
List Price:  ZK3,718.89
You save:  ZK1,062.61
L465.65
List Price:  L651.93
You save:  L186.28
Kč2,349.23
List Price:  Kč3,289.02
You save:  Kč939.78
Ft36,664.08
List Price:  Ft51,331.18
You save:  Ft14,667.09
SEK kr1,088.81
List Price:  SEK kr1,524.39
You save:  SEK kr435.57
ARS$87,581.58
List Price:  ARS$122,617.72
You save:  ARS$35,036.13
Bs695.16
List Price:  Bs973.25
You save:  Bs278.09
COP$396,484.19
List Price:  COP$555,093.74
You save:  COP$158,609.54
₡50,931.67
List Price:  ₡71,306.37
You save:  ₡20,374.70
L2,475.19
List Price:  L3,465.37
You save:  L990.17
₲746,363.69
List Price:  ₲1,044,939.03
You save:  ₲298,575.33
$U3,863.50
List Price:  $U5,409.05
You save:  $U1,545.55
zł402.98
List Price:  zł564.19
You save:  zł161.21
Already have an account? Log In

Transcript

Hey everyone. Welcome back to the course. In the last lecture, we discuss some of the significant challenges being faced by the industries in the implementation of the blockchain. Now, let's go and understand some of the attacks over the blockchain. One of the significant attacks talked about in length with blockchain is 51% attack. This attack states that if a group of miners control more than 50% of the network's mining hash rate, or computing power, they can take over the network.

It was a speculative attack over the Bitcoin blockchain, but recently we have seen some of the major block chains being attacked using the 51% attack. One of the blockchain projects which came under this attack was Bitcoin gold. Bitcoin gold is one of the top 30 crypto currencies in the world. suffered a 51% attack, losing around $18 million. This attack states that if a single miner or a group of miners are having more hashing power than the other miners connected to the chain, which means 51% of the hashing power of the complete chain, then the miners can take over the network. The potential damage could be that the attacking miners can prevent new transactions, gaining confirmations, allowing them to halt payments between users.

Attackers would also be able to reverse the transactions that were confirmed while they were in control of the blockchain network, meaning they could double spend coins which blockchain is trying to avoid. Bitcoin was almost under attack in 2014 when one of the mining pool known as G hash.io. Briefly exceed 50% of the Bitcoin network computing power, leading the pool to reduce their share voluntary. The second major attack on blockchain is the eclipse attack. The attack is based on the distributed application architecture that partitions that task or workloads among peers without the need for a central coordinating server, or stable hosts. blockchains are based on peer to peer computer node connections.

And if you cripple a node in such a way that it is not able to talk to the other nodes, then it's possible to take advantage of that node and make double spending transactions using the cripple node. The Eclipse attack is likely to happen because of a design strategy flaw in the blockchain, such as peer identity and peer selection process. For example, Simple. Bitcoin has eight outgoing connection, which means that if I am connecting to Bitcoin, my computer will only know about eight different peers to whom I am connected. Now, if these eight peers are under attackers control, then I am just going to verify the transactions that they send me. Suppose the attacker creates a fake transaction on all these eight peers.

My view of the network is only available through these eight peers, which is why my computer will see this fraudulent transaction as a validated transaction coming from these connected peers, as all of them will be communicating the same transaction. Ethereum blockchain also faces the same problem, where they have 13 peers connected or 13 outgoing peer connections. The potential damage which can be done but this attack is that the attacker can Cause double spending of the transactions because a node they are eclipsing won't be able to see what is happening in the complete network. Moreover, attackers can attack the second layer protocols when an attacker can obtain the product and services without actually paying for the same to the victims. They will trick the victims into thinking that the payment channel is still open. While the non Eclipse part of the network says that the payment channel is closed.

Even smart contracts are not safe from this kind of attack, as the users will see the inconsistent view of the blockchain. Sybil attack is the third major attack over the blockchain. In this attack, the attacker attempts to fill the network with the client nodes which they control. If this happens, then whenever you are connecting To the blockchain, you are most likely to communicate with an attackers node. For example, Bitcoin never keeps track of the nodes for any purpose. If somehow attacker isolates a node from the owners network by spinning up his nodes, then the attackers can achieve the Sybil attack.

This kind of attack can make sure that the only attacker is reeling the blocks which he creates, an attacker can also refuse to relay the blocks by other nodes. Moreover, by isolating the node, the attacker can also perform much more sophisticated attacks in continuation of the Sybil attack. Another major attack over the blockchain is time jacking attack. This attack is an extension of the Sybil attack and it depends upon the functionality in which each node Is internally maintaining a network time counter. This counter is based on the median time of the nodes which are connected to the blockchain and shared when the node share the version message with the peers while establishing the connection. The network time inside the blockchain has a feature that if the network medium time is diverting 70 minutes from the system time, then the blockchain shifts its time counter from the network medium time to the system time.

If the nodes shift to the system time, then there will be a significant difference between the time counter each node is keeping the network time counter, which is utilized to validate new blocks. And as the precaution nodes reject any block timestamp that is greater than two hours from the current timestamp nodes in Take the network median time for the acceptance and the rejection of the blocks in a way putting upper and lower bounds for the acceptable range of the block timestamps. If the attacker can make time jacking attack, then the attacker would be able to create a new block with the timestamp set ahead of the real time. Let's take an example where an attacker is making time jacking attack over a single node where the attacker manages to slow down the target time. Let's take the system time ahead of the network time by 60 minutes and acceptance time for the blocks by miners as 120 minutes the attacker will create a new block with the timestamp set about 190 minutes ahead of the real time.

Now as we know the target node is shifted to the system time because the time for the target node Was diverting from the network median time. So the target will see the block timestamp as 60 minutes past network time, and therefore reject this new block. But as the timestamp is 190 minutes, and the network median time is about 70 minutes, the mining nodes will see this block below the 120 minutes time limit and accept this block. This will isolate the target from the network's normal transaction processing, as the network keeps on seeing the blocks within the time limit, but the target node is always rejecting the block because of a greater timestamp. The attacker would continue this attack indefinitely until the target node itself creates a block or clocks are reset by some intervention. This kind of attack can lead to double spending as the attacker can time jack a targeted node Although when the targeted node again sees the network time, the changes done by the attacker will be reverse.

Still, the attacker has a good time window available for attacking the data or doing a double spending transaction over the blockchain. That was all about some of the major attacks over the blockchain. In the next lecture, we are going to discuss how the blockchain is going to take over the world and what kind of effects the globe can experience by introducing blockchain as a global software technology. For any questions feel free to contact us at info at the rate v two blocks.com

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.