Optimal mixed block withholding attacks based on reinforcement learning

The vulnerabilities in cryptographic currencies facilitate the adversarial attacks. Therefore, the attackers have incentives to increase their rewards by strategic behaviors. Block withholding attacks (BWH) are such behaviors that attackers withhold blocks in the target pools to subvert the blockchain ecosystem. Furthermore, BWH attacks may dwarf the countermeasures by combining with selfish mining attacks or other strategic behaviors, for example, fork after withholding (FAW) attacks and power adaptive withholding (PAW) attacks. That is, the attackers may be intelligent enough such that they can dynamically gear their behaviors to optimal attacking strategies. In this paper, we propose mixed‐BWH attacks with respect to intelligent attackers, who leverage reinforcement learning to pin down optimal strategic behaviors to maximize their rewards. More specifically, the intelligent attackers strategically toggle among BWH, FAW, and PAW attacks. Their main target is to fine‐tune the optimal behaviors, which incur maximal rewards. The attackers pinpoint the optimal attacking actions with reinforcement learning, which is formalized into a Markov decision process. The simulation results show that the rewards of the mixed strategy are much higher than that of honest strategy for the attackers. Therefore, the attackers have enough incentives to adopt the mixed strategy.

[1]  Harish Garg,et al.  Generalized intuitionistic fuzzy soft power aggregation operator based on t‐norm and their application in multicriteria decision‐making , 2018, Int. J. Intell. Syst..

[2]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[3]  Youliang Tian,et al.  A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs , 2020, IEEE Transactions on Industrial Informatics.

[4]  Hu-Chen Liu,et al.  A new approach for emergency decision‐making based on zero‐sum game with Pythagorean fuzzy uncertain linguistic variables , 2019, Int. J. Intell. Syst..

[5]  Prateek Saxena,et al.  On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.

[6]  Tao Li,et al.  Randomness invalidates criminal smart contracts , 2019, Inf. Sci..

[7]  Hongwei Li,et al.  Secure Multi-Party Computation: Theory, practice and applications , 2019, Inf. Sci..

[8]  Deke Guo,et al.  Selfholding: A combined attack model using selfish mining with block withholding attack , 2019, Comput. Secur..

[9]  Xinchun Cui,et al.  Secure computation protocols under asymmetric scenarios in enterprise information system , 2019, Enterp. Inf. Syst..

[10]  Fengyin Li,et al.  A game-theoretic method based on Q-learning to invalidate criminal smart contracts , 2019, Inf. Sci..

[11]  Zoe L. Jiang,et al.  Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing , 2020, Inf. Sci..

[12]  Hong Liu,et al.  A scalable coevolutionary multi-objective particle swarm optimizer , 2010, Int. J. Comput. Intell. Syst..

[13]  Bin Xiao,et al.  Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System , 2019, CCS.

[14]  Wei Yang,et al.  New q‐rung orthopair fuzzy partitioned Bonferroni mean operators and their application in multiple attribute decision making , 2018, Int. J. Intell. Syst..

[15]  Lei Guo,et al.  Containment control of heterogeneous fractional-order multi-agent systems , 2017, J. Frankl. Inst..

[16]  Jiaqi Zheng,et al.  Toward optimal participant decisions with voting-based incentive model for crowd sensing , 2020, Inf. Sci..

[17]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[18]  Meni Rosenfeld,et al.  Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.

[19]  Hong Wang,et al.  Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments , 2016, Int. J. Ad Hoc Ubiquitous Comput..

[20]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[21]  Hong Wang,et al.  An attention mechanism and multi-granularity-based Bi-LSTM model for Chinese Q&A system , 2020, Soft Comput..

[22]  Michael Davidson,et al.  On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms , 2020, IACR Cryptol. ePrint Arch..

[23]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[24]  Yongdae Kim,et al.  Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.