How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction

A major limitation of many blockchain systems is the lack of strong identities in the underlying P2P network. This allows any nodes to attack the system by creating multiple false personas, thereby disrupting the network's connectivity and sabotaging its operation. In this paper, we focus on P2P networks, and explore practical ways to defend them from such attacks. To do so, we employ a game theoretic approach to the management of each peer's list of known nodes and to the overlay construction mechanisms that utilize this list. We consider the interaction between the defender and attacker as a game. We show that the cost of attacks can be driven up substantially if the defender utilizes available information about peers it chooses to connect to, such as their IP address. In addition to theoretical analysis of the underlying game, we apply our approach to the Bitcoin P2P network and derive effective and practical strategies that guarantee a high safety level against attacks.

[1]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[2]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[3]  Guillaume Pierre,et al.  A survey of DHT security techniques , 2011, CSUR.

[4]  Yuan Zhang,et al.  Making eclipse attacks computationally infeasible in large-scale DHTs , 2011, 30th IEEE International Performance Computing and Communications Conference.

[5]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[6]  Jeong-Kyung Moon,et al.  A security monitoring method for malicious P2P event detection , 2015, Peer-to-Peer Networking and Applications.

[7]  Xiuli Shao,et al.  Detecting P2P botnets by discovering flow dependency in C&C traffic , 2014, Peer-to-Peer Netw. Appl..

[8]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[9]  Yuan Zhang,et al.  Sybil defenses in DHT networks based on social relationships , 2015 .

[10]  Arthur Gervais,et al.  Ethereum Eclipse Attacks , 2016 .

[11]  Iuon-Chang Lin,et al.  A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..

[12]  Jong-Hyouk Lee,et al.  Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network , 2019, IEEE Transactions on Industrial Informatics.

[13]  Atul Singh,et al.  Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[14]  Camilo Rocha,et al.  Double-spend Attack Models with Time Advantange for Bitcoin , 2016, CLEI Selected Papers.

[15]  Ahmed Serhrouchni,et al.  Total Eclipse: How To Completely Isolate a Bitcoin Peer , 2018, 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC).

[16]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.

[17]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[18]  Chris Hankin,et al.  Game Theory Meets Information Security Management , 2014, SEC.

[19]  Laurent Vanbever,et al.  Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[20]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[21]  Min Suk Kang,et al.  A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network , 2019, 2020 IEEE Symposium on Security and Privacy (SP).

[22]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[23]  Can Saygin,et al.  A game theory based cybersecurity assessment model for advanced manufacturing systems , 2018 .

[24]  Laurent Vanbever,et al.  Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies , 2016, ArXiv.

[25]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[26]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[27]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[28]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[29]  Mohammad Reza Meybodi,et al.  A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It , 2018, Wirel. Pers. Commun..

[30]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[31]  Ethan Heilman,et al.  Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..

[32]  Stefan Schmid,et al.  Survey on Cryptocurrency Networking: Context, State-of-the-Art, Challenges , 2020, ArXiv.

[33]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.