Security analysis of distributed ledgers and blockchains through agent-based simulation
Autor: | Stefano Ferretti, Luca Serena, Gabriele D'Angelo |
---|---|
Přispěvatelé: | Serena L., D'Angelo G., Ferretti S. |
Jazyk: | angličtina |
Rok vydání: | 2022 |
Předmět: |
FOS: Computer and information sciences
Security analysis Computer Science - Cryptography and Security Computer science Distributed computing Overlay network Denial-of-service attack Cyber-security computer.software_genre Network topology Virtual environments Blockchain Sybil attack Distributed ledger technologie Computer Science - Multiagent Systems Protocol (object-oriented programming) Computer Science - Performance Performance (cs.PF) Parallel and Distributed Simulation Computer Science - Distributed Parallel and Cluster Computing Hardware and Architecture Virtual machine Simulation Parallel and Distributed Simulation Virtual environments Cyber-security Blockchain Distributed ledger technologies Modeling and Simulation Scalability Distributed Parallel and Cluster Computing (cs.DC) computer Cryptography and Security (cs.CR) Software Simulation Multiagent Systems (cs.MA) |
Popis: | In this paper we describe LUNES-Blockchain, an agent-based simulator of blockchains that relies on Parallel and Distributed Simulation (PADS) techniques to obtain high scalability. The software is organized as a multi-level simulator that permits to simulate a virtual environment, made of many nodes running the protocol of a specific Distributed Ledger Technology (DLT), such as the Bitcoin or the Ethereum blockchains. This virtual environment is executed on top of a lower-level Peer-to-Peer (P2P) network overlay, which can be structured based on different topologies and with a given number of nodes and edges. Functionalities at different levels of abstraction are managed separately, by different software modules and with different time granularity. This allows for accurate simulations, where (and when) it is needed, and enhances the simulation performance. Using LUNES-Blockchain, it is possible to simulate different types of attacks on the DLT. In this paper, we specifically focus on the P2P layer, considering the selfish mining, the 51% attack and the Sybil attack. For which concerns selfish mining and the 51% attack, our aim is to understand how much the hash-rate (i.e. a general measure of the processing power in the blockchain network) of the attacker can influence the outcome of the misbehaviour. On the other hand, in the filtering denial of service (i.e. Sybil Attack), we investigate which dissemination protocol in the underlying P2P network makes the system more resilient to a varying number of nodes that drop the messages. The results confirm the viability of the simulation-based techniques for the investigation of security aspects of DLTs. To appear in Simulation Modelling Practice and Theory (Elsevier) |
Databáze: | OpenAIRE |
Externí odkaz: |