Page 119 - Handbook of Deep Learning in Biomedical Engineering Techniques and Applications
P. 119

Chapter 4 A critical review on using blockchain technology in education domain 107




                      sending excess amount in a wallet to a second wallet
                      isolated from the Internet can be used.
               (f) Peer-to-peer networkebased attacks: These threats occur in
                   BC network layer. Hackers exploit network vulnerabilities to
                   enforce the following attacks:
                   • Routing attack: Here the hacker tampers with the transac-
                      tions before pushing them to the peer nodes. The hacker
                      partitions the network and creates a delay attack by
                      tampering with the messages before sending them to the
                      network.
                   • Eclipse attack: When a node “A” selects “n” malicious
                      peers (X1, X2, .Xn) to have a copy of distributed ledger,
                      then the attacker can eclipse the view of the original ledger
                      and present a manipulated ledger. To overcome eclipse
                      attacks, trust factor of nodes are to be considered. Mali-
                      cious nodes are to be detected and eliminated.
                   • Sybil attack: Here the attacker floods the network with a
                      large number of nodes with pseudonymous identity. The
                      major objective is to generate a fork enabling double
                      spending for the attacker. Block generation capability
                      depends on computational power of the miner. This rela-
                      tionship can provide Sybil attack resistence.
                   • DDoS attack: When a network is flooded with a large num-
                      ber of requests from different IPs, the system becomes over-
                      loaded. Upto some extent, this attack can be prevented in
                      BC using transaction fees. DDoS attacks can be detected us-
                      ing attack patterns and machine learning techniques. PoA
                      also overcomes DDoS attacks to a certain extent.
                   • Transaction malleability attack: When an attacker mod-
                      ifies the transaction ID, then its hash can be changed.
                      Hence, this transaction can be verified before the original
                      transaction and result in payment. Silk road attack uses
                      “transaction malleability” to repeatedly withdraw coins
                      from the bitcoin system until it was completely empty.
                   • Timejack attack: Internal timing of a node in a BC network
                      is got from the median time of its peer nodes. When an
                      eclipse attack occurs, median time of the node depends
                      on timing of the malicious nodes only. Now the node
                      cannot accept blocks from original BC network. Double
                      spending can now occur.
                   • DNS hijacks: Here the attacker is able to intercept DNS
                      queries and redirects it to a malevolent node. This can
                      occur due to man-in-the-middle attack, cache poisoning,
                      router hijacking, or using a rogue DNS server.
   114   115   116   117   118   119   120   121   122   123   124