Initial Evidence of Elevated Reconnaissance Attacks Against Nodes in P2P Overlay Networks
- URL: http://arxiv.org/abs/2411.14623v1
- Date: Thu, 21 Nov 2024 22:56:16 GMT
- Title: Initial Evidence of Elevated Reconnaissance Attacks Against Nodes in P2P Overlay Networks
- Authors: Scott Seidenberger, Anindya Maiti,
- Abstract summary: We investigate the state of active reconnaissance attacks on P2P network nodes by deploying a series of honeypots alongside actual nodes across globally distributed vantage points.
We find that nodes experience not only increased attacks, but also specific types of attacks targeting particular ports and services.
- Score: 0.9003384937161055
- License:
- Abstract: We hypothesize that peer-to-peer (P2P) overlay network nodes can be attractive to attackers due to their visibility, sustained uptime, and resource potential. Towards validating this hypothesis, we investigate the state of active reconnaissance attacks on Ethereum P2P network nodes by deploying a series of honeypots alongside actual Ethereum nodes across globally distributed vantage points. We find that Ethereum nodes experience not only increased attacks, but also specific types of attacks targeting particular ports and services. Furthermore, we find evidence that the threat assessment on our nodes is applicable to the wider P2P network by having performed port scans on other reachable peers. Our findings provide insights into potential mitigation strategies to improve the security of the P2P networking layer.
Related papers
- Deanonymizing Ethereum Validators: The P2P Network Has a Privacy Issue [19.43262773933136]
Many blockchain networks aim to preserve the anonymity of validators in the peer-to-peer (P2P) network.
This work demonstrates that the P2P network does not offer this anonymity.
We present a methodology that enables any node in the network to identify validators hosted on connected peers.
arXiv Detail & Related papers (2024-09-06T15:57:43Z) - Blockchain Economic Denial of Sustainability Attack: Exploiting Latency Optimization in Ethereum Transaction Forwarding [13.13413794919346]
Economic Denial of Sustainability (EDoS) attack can cause financial losses in traffic costs for operators of modified nodes.
We show that an attacker can amplify network traffic at modified nodes by a factor of 3,600, and cause economic damages 13,800 times greater than the amount needed to carry out the attack.
arXiv Detail & Related papers (2024-08-02T18:06:33Z) - Relaxing Graph Transformers for Adversarial Attacks [49.450581960551276]
Graph Transformers (GTs) surpassed Message-Passing GNNs on several benchmarks, their adversarial robustness properties are unexplored.
We overcome these challenges by targeting three representative architectures based on (1) random-walk PEs, (2) pair-wise-short-paths, and (3) spectral perturbations.
Our evaluation reveals that they can be catastrophically fragile and underlines our work's importance and the necessity for adaptive attacks.
arXiv Detail & Related papers (2024-07-16T14:24:58Z) - Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security [1.2644625435032817]
Research on Nakamoto-style consensus protocols has shown that network delays degrade the security of these protocols.
This contradicts the very foundation of blockchains, namely that decentralization improves security.
We take a closer look at how the network scale affects security of Nakamoto-style blockchains.
arXiv Detail & Related papers (2024-04-15T16:09:41Z) - Data Availability and Decentralization: New Techniques for zk-Rollups in Layer 2 Blockchain Networks [14.27943855519429]
This paper introduces new techniques to address the data availability and decentralization challenges in Layer 2 networks.
We introduce the concept of proof of download'', which ensures that Layer 2 nodes cannot aggregate transactions without downloading historical data.
For decentralization, we introduce a new role separation for Layer 2, allowing nodes with limited hardware to participate.
arXiv Detail & Related papers (2024-03-16T06:34:51Z) - Tikuna: An Ethereum Blockchain Network Security Monitoring System [0.0]
This paper focuses on protecting the lowest level layer in the blockchain, particularly the P2P network that allows the nodes to communicate and share information.
The P2P network layer may be vulnerable to several families of attacks, such as Distributed Denial of Service (DDoS), eclipse attacks, or Sybil attacks.
We introduce Tikuna, an open-source tool for monitoring and detecting potential attacks on the blockchain P2P network, at an early stage.
arXiv Detail & Related papers (2023-10-13T15:39:50Z) - Secure Deep Learning-based Distributed Intelligence on Pocket-sized
Drones [75.80952211739185]
Palm-sized nano-drones are an appealing class of edge nodes, but their limited computational resources prevent running large deep-learning models onboard.
Adopting an edge-fog computational paradigm, we can offload part of the computation to the fog; however, this poses security concerns if the fog node, or the communication link, can not be trusted.
We propose a novel distributed edge-fog execution scheme that validates fog computation by redundantly executing a random subnetwork aboard our nano-drone.
arXiv Detail & Related papers (2023-07-04T08:29:41Z) - Graph Agent Network: Empowering Nodes with Inference Capabilities for Adversarial Resilience [50.460555688927826]
We propose the Graph Agent Network (GAgN) to address the vulnerabilities of graph neural networks (GNNs)
GAgN is a graph-structured agent network in which each node is designed as an 1-hop-view agent.
Agents' limited view prevents malicious messages from propagating globally in GAgN, thereby resisting global-optimization-based secondary attacks.
arXiv Detail & Related papers (2023-06-12T07:27:31Z) - Adversarial Camouflage for Node Injection Attack on Graphs [64.5888846198005]
Node injection attacks on Graph Neural Networks (GNNs) have received increasing attention recently, due to their ability to degrade GNN performance with high attack success rates.
Our study indicates that these attacks often fail in practical scenarios, since defense/detection methods can easily identify and remove the injected nodes.
To address this, we devote to camouflage node injection attack, making injected nodes appear normal and imperceptible to defense/detection methods.
arXiv Detail & Related papers (2022-08-03T02:48:23Z) - Adversarial Attack and Defense in Deep Ranking [100.17641539999055]
We propose two attacks against deep ranking systems that can raise or lower the rank of chosen candidates by adversarial perturbations.
Conversely, an anti-collapse triplet defense is proposed to improve the ranking model robustness against all proposed attacks.
Our adversarial ranking attacks and defenses are evaluated on MNIST, Fashion-MNIST, CUB200-2011, CARS196 and Stanford Online Products datasets.
arXiv Detail & Related papers (2021-06-07T13:41:45Z) - AN-GCN: An Anonymous Graph Convolutional Network Defense Against
Edge-Perturbing Attack [53.06334363586119]
Recent studies have revealed the vulnerability of graph convolutional networks (GCNs) to edge-perturbing attacks.
We first generalize the formulation of edge-perturbing attacks and strictly prove the vulnerability of GCNs to such attacks in node classification tasks.
Following this, an anonymous graph convolutional network, named AN-GCN, is proposed to counter edge-perturbing attacks.
arXiv Detail & Related papers (2020-05-06T08:15:24Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.