2022
DOI: 10.1109/tifs.2022.3202696
|View full text |Cite
|
Sign up to set email alerts
|

SDoS: Selfish Mining-Based Denial-of-Service Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Hayat et al [11] proposed a multilayer combination attack method (ML-DDoS) based on DDoS attacks and smart contracts, which was designed to obtain more rewards from attackers. Wang et al [12] designed a new mining attack, a selfish mining-based denial-of-service (SDoS) attack, which targeted the blockchain system based on the PoW mechanism and analyzed the gains and strategies of the attacker and the honest miners through game theory. Mirkin et al [13] implemented a novel DDoS attack based on blockchain incentives called blockchain denial of service (BDoS).…”
Section: The Ddos-based Combination Attacks In Blockchain Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Hayat et al [11] proposed a multilayer combination attack method (ML-DDoS) based on DDoS attacks and smart contracts, which was designed to obtain more rewards from attackers. Wang et al [12] designed a new mining attack, a selfish mining-based denial-of-service (SDoS) attack, which targeted the blockchain system based on the PoW mechanism and analyzed the gains and strategies of the attacker and the honest miners through game theory. Mirkin et al [13] implemented a novel DDoS attack based on blockchain incentives called blockchain denial of service (BDoS).…”
Section: The Ddos-based Combination Attacks In Blockchain Systemsmentioning
confidence: 99%
“…Academics have proposed many methods to solve the DDoS attack problem in the blockchain network layer. At present, these methods can be mainly divided into the following categories: DDoS defense methods combined with blockchain technology, DDoS combination attacks combined with other blockchain attacks, and static game strategies based on the blockchain mining pool [10][11][12][13][14][15][16][17]. Among these existing studies, the use of a static game approach to mitigate DDoS attacks is the most effective [18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%
“…However, these systems suffer hash computation overheads due to the fact thatPoW is used in the distributed shard grouping process to verify identities. However, the SSChain blockchain uses the current PoW algorithm for shard consensus and, because of its non-reshuffled structure, supports sharding of both transactions and states [34,35,36]. The security of the root chain may also be seriously compromised since SSChain operates on two separate chain architectures.…”
Section: Introductionmentioning
confidence: 99%