Security analysis of distributed ledgers and blockchains through agent-based simulation

Autor: Stefano Ferretti, Luca Serena, Gabriele D'Angelo
Přispěvatelé: Serena L., D'Angelo G., Ferretti S.
Jazyk: angličtina
Rok vydání: 2022
Předmět:
FOS: Computer and information sciences
Security analysis
Computer Science - Cryptography and Security
Computer science
Distributed computing
Overlay network
Denial-of-service attack
Cyber-security
computer.software_genre
Network topology
Virtual environments
Blockchain
Sybil attack
Distributed ledger technologie
Computer Science - Multiagent Systems
Protocol (object-oriented programming)
Computer Science - Performance
Performance (cs.PF)
Parallel and Distributed Simulation
Computer Science - Distributed
Parallel
and Cluster Computing

Hardware and Architecture
Virtual machine
Simulation Parallel and Distributed Simulation Virtual environments Cyber-security Blockchain Distributed ledger technologies
Modeling and Simulation
Scalability
Distributed
Parallel
and Cluster Computing (cs.DC)

computer
Cryptography and Security (cs.CR)
Software
Simulation
Multiagent Systems (cs.MA)
Popis: In this paper we describe LUNES-Blockchain, an agent-based simulator of blockchains that relies on Parallel and Distributed Simulation (PADS) techniques to obtain high scalability. The software is organized as a multi-level simulator that permits to simulate a virtual environment, made of many nodes running the protocol of a specific Distributed Ledger Technology (DLT), such as the Bitcoin or the Ethereum blockchains. This virtual environment is executed on top of a lower-level Peer-to-Peer (P2P) network overlay, which can be structured based on different topologies and with a given number of nodes and edges. Functionalities at different levels of abstraction are managed separately, by different software modules and with different time granularity. This allows for accurate simulations, where (and when) it is needed, and enhances the simulation performance. Using LUNES-Blockchain, it is possible to simulate different types of attacks on the DLT. In this paper, we specifically focus on the P2P layer, considering the selfish mining, the 51% attack and the Sybil attack. For which concerns selfish mining and the 51% attack, our aim is to understand how much the hash-rate (i.e. a general measure of the processing power in the blockchain network) of the attacker can influence the outcome of the misbehaviour. On the other hand, in the filtering denial of service (i.e. Sybil Attack), we investigate which dissemination protocol in the underlying P2P network makes the system more resilient to a varying number of nodes that drop the messages. The results confirm the viability of the simulation-based techniques for the investigation of security aspects of DLTs.
To appear in Simulation Modelling Practice and Theory (Elsevier)
Databáze: OpenAIRE