Skip to main content

New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11928))

Abstract

Since almost all new bitcoins nowadays are minted by mining pools, the security of mining pools is quite crucial to the health of the Bitcoin system. Among the attacks targeting at mining pools, the distributed denial-of-service (DDoS) attack is the notable one. Previous research shows that mining pools would launch DDoS attacks on others when the size is relatively large. However, no mining pools claimed responsibility to any DDoS attacks on mining pools till now. In this paper, we revise the previous game-theoretic analysis model by adding DDoS defense cost. With the assumption that the whole computing resource of any mining pool consists of mining, defense and attack, we obtain some interesting conclusions. (1) If the failure probability of DDoS attack is high, then mining pools would have a greater incentive to stay peacefully. (2) Increasing the computing resource in mining is always the primary choice for mining pools, no matter whether they are launching DDoS attacks or under DDoS attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    The pairs in figures denote the choices of players B and S, respectively. For example, (MD) denotes that player B chooses mining while player S chooses DDoS attacks.

References

  1. https://defuse.ca/bitcoin-pool-ddos.htm, June 2011

  2. https://www.coindesk.com/bitcoin-mining-pools-ddos-attacks, March 2015

  3. https://news.8btc.com/a-brief-history-of-bitcoin-mining-pools-over-17-mining-pools-choose-to-shut-down, November 2018

  4. https://www.cbronline.com/news/cryptocurrency-verge-attack, May 2018

  5. https://www.blockchain.com/explorer, August 2019

  6. https://www.buybitcoinworldwide.com/mining/hardware, July 2019

  7. https://www.investopedia.com/tech/how-choose-cryptocurrency-mining-pool/, June 2019

  8. Böhme, R., Christin, N., Edelman, B., Moore, T.: Bitcoin: economics, technology, and governance. J. Econ. Perspect. 29(2), 213–38 (2015)

    Article  Google Scholar 

  9. Clark, D.J., Konrad, K.A.: Asymmetric conflict: weakest link against best shot. J. Conflict Resolut. 51(3), 457–469 (2007)

    Article  Google Scholar 

  10. Cremonini, M., Nizovtsev, D.: Understanding and influencing attackers’ decisions: implications for security investment strategies. In: 5th Annual Workshop on the Economics of Information Security, WEIS 2006, Robinson College, University of Cambridge, England, UK, 26–28 June 2006 (2006)

    Google Scholar 

  11. Eyal, I.: The miner’s dilemma. In: 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, 17–21 May 2015, pp. 89–103 (2015). https://doi.org/10.1109/SP.2015.13

  12. Fultz, N., Grossklags, J.: Blue versus red: towards a model of distributed security attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167–183. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03549-4_10

    Chapter  Google Scholar 

  13. Grossklags, J., Johnson, B., Christin, N.: When information improves information security. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 416–423. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14577-3_37

    Chapter  Google Scholar 

  14. Johnson, B., Laszka, A., Grossklags, J., Vasek, M., Moore, T.: Game-theoretic analysis of ddos attacks against bitcoin mining pools. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 72–86. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44774-1_6

    Chapter  Google Scholar 

  15. Karami, M., Park, Y., McCoy, D.: Stress testing the booters: understanding and undermining the business of DDoS services. In: Proceedings of the 25th International Conference on World Wide Web, pp. 1033–1043. International World Wide Web Conferences Steering Committee (2016)

    Google Scholar 

  16. Laszka, A., Johnson, B., Grossklags, J.: When bitcoin mining pools run dry - a game-theoretic analysis of the long-term impact of attacks between mining pools. In: Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, 30 January 2015, Revised Selected Papers, pp. 63–77 (2015)

    Chapter  Google Scholar 

  17. Li, Z., Liao, Q., Striegel, A.: Botnet economics: uncertainty matters. In: Johnson, M.E. (ed.) Managing Information Risk and the Economics of Security, pp. 245–267. Springer, Boston (2009). https://doi.org/10.1007/978-0-387-09762-6_12

    Chapter  Google Scholar 

  18. Liu, P., Zang, W., Yu, M.: Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur. 8(1), 78–118 (2005)

    Article  Google Scholar 

  19. Luu, L., Saha, R., Parameshwaran, I., Saxena, P., Hobor, A.: On power splitting games in distributed computation: the case of Bitcoin pooled mining. In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13–17 July 2015, pp. 397–411 (2015). https://doi.org/10.1109/CSF.2015.34

  20. Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 25:1–25:39 (2013)

    Article  Google Scholar 

  21. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2009). http://www.bitcoin.org/bitcoin.pdf

  22. Schechter, S.E., Smith, M.D.: How much security is enough to stop a thief? In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 122–137. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45126-6_9

    Chapter  Google Scholar 

  23. Spyridopoulos, T., Karanikas, G., Tryfonas, T., Oikonomou, G.: A game theoretic defence framework against dos/ddos cyber attacks. Comput. Secur. 38, 39–50 (2013)

    Article  Google Scholar 

  24. Tang, C., Wu, L., Wen, G., Zheng, Z.: Incentivizing honest mining in blockchain networks: A reputation approach. IEEE Trans. Circuits Syst. II: Express Briefs (2019, in press)

    Google Scholar 

  25. Vasek, M., Thornton, M., Moore, T.: Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. In: Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, 7 March 2014, Revised Selected Papers, pp. 57–71 (2014). https://doi.org/10.1007/978-3-662-44774-1_5

    Google Scholar 

Download references

Acknowledgement

The authors would like to thank the anonymous reviewers for their invaluable comments. This work was supported in part by the Natural Science Foundation of Zhejiang under Grant LR18F020003 and the National Natural Science Foundation of China under Grant U1709217.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guiyi Wei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zheng, R. et al. (2019). New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost. In: Liu, J., Huang, X. (eds) Network and System Security. NSS 2019. Lecture Notes in Computer Science(), vol 11928. Springer, Cham. https://doi.org/10.1007/978-3-030-36938-5_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36938-5_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36937-8

  • Online ISBN: 978-3-030-36938-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics