A Novel Classification of Attacks on Blockchain Layers: Vulnerabilities, Attacks, Mitigations, and Research Directions
- URL: http://arxiv.org/abs/2404.18090v1
- Date: Sun, 28 Apr 2024 06:40:50 GMT
- Title: A Novel Classification of Attacks on Blockchain Layers: Vulnerabilities, Attacks, Mitigations, and Research Directions
- Authors: Kaustubh Dwivedi, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari,
- Abstract summary: This survey proposes a novel classification of blockchain attacks and an in-depth investigation of blockchain data security.
We reveal the deep dynamics of these security concerns by closely investigating the fundamental causes of attacks at various blockchain tiers.
We also discuss the implications of quantum computing in blockchain and the weaknesses in the current technology that can be exploited in the future.
- Score: 0.8540657305162735
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The widespread adoption of blockchain technology has amplified the spectrum of potential threats to its integrity and security. The ongoing quest to exploit vulnerabilities emphasizes how critical it is to expand on current research initiatives. Thus, using a methodology based on discrete blockchain layers, our survey study aims to broaden the existing body of knowledge by thoroughly discussing both new and known attack vectors inside the blockchain ecosystem. This survey proposes a novel classification of blockchain attacks and an in-depth investigation of blockchain data security. In particular, the paper provides a thorough discussion of the attack techniques and vulnerabilities that are specific to each tier, along with a detailed look at mitigating techniques. We reveal the deep dynamics of these security concerns by closely investigating the fundamental causes of attacks at various blockchain tiers. We clarify mitigation methods for known vulnerabilities and offer new information on recently developed attack vectors. We also discuss the implications of quantum computing in blockchain and the weaknesses in the current technology that can be exploited in the future. Our study advances the field of blockchain security and privacy research while also contributing to our understanding of blockchain vulnerabilities and attacks. This survey paper is a useful tool for readers who want to learn more about the intricacies of blockchain security. It also invites researchers to help strengthen blockchain privacy and security, paving the way for further developments in this dynamic and ever-evolving field.
Related papers
- Mastering AI: Big Data, Deep Learning, and the Evolution of Large Language Models -- Blockchain and Applications [17.293955748551053]
The article begins with an introduction to cryptography fundamentals.
It covers topics such as proof-of-work, proof-of-stake, and smart contracts.
The article concludes by addressing the current state of academic research on blockchain.
arXiv Detail & Related papers (2024-10-14T02:56:36Z) - A Survey and Comparison of Post-quantum and Quantum Blockchains [4.965489431705061]
The rapid progress of quantum computing poses a significant threat to the security of existing blockchain technologies.
The emergence of Shor's and Grover's algorithms raises concerns regarding the compromise of the cryptographic systems underlying blockchains.
It is essential to develop methods that reinforce blockchain technology against quantum attacks.
arXiv Detail & Related papers (2024-09-02T16:20:22Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Collaborative Cybersecurity Using Blockchain: A Survey [0.0]
Collaborative cybersecurity relies on organizations sharing information to boost security, but trust management is a key concern.
Decentralized solutions like distributed ledgers, particularly blockchain, are crucial for eliminating single points of failure.
This paper addresses this gap by surveying blockchain's role in collaborative cybersecurity from 2016 to 2023.
arXiv Detail & Related papers (2024-03-07T11:12:35Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems [43.80265187232706]
Cross-chain bridges are used to facilitate token and data exchanges across blockchains.
Although bridges are becoming increasingly popular, they are still in their infancy and have been attacked multiple times recently.
This paper analyzes the security landscape of cross-chain bridges in a holistic manner.
arXiv Detail & Related papers (2023-12-19T20:13:21Z) - Protecting the Decentralized Future: An Exploration of Common Blockchain
Attacks and their Countermeasures [1.1499361198674167]
Rising number of security threats have attracted cybercriminals as a target.
This research aims to offer a thorough analysis of mitigating blockchain attacks.
The study also highlights how crucial it is to take into account the particular needs of every blockchain application.
arXiv Detail & Related papers (2023-06-20T20:56:06Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Recent advances in Blockchain Technology: A survey on Applications and
Challenges [9.420795715422711]
The rise of blockchain technology within a few years has attracted researchers across the world.
The prime reason for worldwide attention is undoubtedly due to its feature of immutability along with the decentralized approach of data protection.
arXiv Detail & Related papers (2020-09-12T03:31:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.