Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools

被引:115
作者
Johnson, Benjamin [2 ]
Laszka, Aron
Grossklags, Jens [1 ]
Vasek, Marie [3 ]
Moore, Tyler [3 ]
机构
[1] Penn State Univ, State Coll, PA 16801 USA
[2] Univ Calif Berkeley, Berkeley, CA 94720 USA
[3] Southern Methodist Univ, Dallas, TX 75275 USA
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014 | 2014年 / 8438卷
基金
美国国家科学基金会; 美国安德鲁·梅隆基金会;
关键词
Game theory; Bitcoin; Internet; Security; DDoS; SECURITY; ECONOMICS;
D O I
10.1007/978-3-662-44774-1_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the unique features of the digital currency Bitcoin is that new cash is introduced by so-called miners carrying out resource-intensive proof-of-work operations. To increase their chances of obtaining freshly minted bitcoins, miners typically join pools to collaborate on the computations. However, intense competition among mining pools has recently manifested in two ways. Miners may invest in additional computing resources to increase the likelihood of winning the next mining race. But, at times, a more sinister tactic is also employed: a mining pool may trigger a costly distributed denial-of-service (DDoS) attack to lower the expected success outlook of a competing mining pool. We explore the trade-off between these strategies with a series of game-theoretical models of competition between two pools of varying sizes. We consider differences in costs of investment and attack, as well as uncertainty over whether a DDoS attack will succeed. By characterizing the game's equilibria, we can draw a number of conclusions. In particular, we find that pools have a greater incentive to attack large pools than small ones. We also observe that larger mining pools have a greater incentive to attack than smaller ones.
引用
收藏
页码:72 / 86
页数:15
相关论文
共 26 条
[1]   The economics of information security [J].
Anderson, Ross ;
Moore, Tyler .
SCIENCE, 2006, 314 (5799) :610-613
[2]  
[Anonymous], 2004, P ACM SIGCOMM WORKSH
[3]  
[Anonymous], 2012, P 13 ACM C EL COMM, DOI DOI 10.1145/2229012.2229022
[4]  
[Anonymous], ACM T INFORM SYSTEM
[5]  
[Anonymous], BITCOIN PEER TO PEER
[6]  
Barber Simon., 2012, Lecture Notes in Computer Science, Volume, V7397, P399, DOI DOI 10.1007/978-3-642-32946-3
[7]   CRIME AND PUNISHMENT - ECONOMIC APPROACH [J].
BECKER, GS .
JOURNAL OF POLITICAL ECONOMY, 1968, 76 (02) :169-217
[8]   Decision-theoretic and game-theoretic approaches to IT security investment [J].
Cavusoglu, Huseyin ;
Raghunathan, Srinivasan ;
Yue, Wei T. .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) :281-304
[9]  
CHAUM D, 1990, LECT NOTES COMPUT SC, V403, P319
[10]   Asymmetric conflict - Weakest link against best shot [J].
Clark, Derek J. ;
Konrad, Kai A. .
JOURNAL OF CONFLICT RESOLUTION, 2007, 51 (03) :457-469