Bitcoin


https://www.apriorit.com/dev-blog/578-blockchain-attack-vectors

Selfish mining attack

  • Attacker increases the share of the reward
  • by not broadcasting mined blocks to the network for some time
  • releasing several blocks at once
  • making other miners lose their blocks

 

Sybil attack

  • Hacker takes control of multiple nodes
  • Victim is surrounded by fake nodes that close up all their transactions.
  • 女巫攻击:利用社交网络中的少数节点控制多个虚假身份,从而利用这些身份控制或影响网络的大量正常节点的攻击方式。

Eclipse attack

  • Hacker controls controls a large number of IP addresses or a distributed botnet.
  • Victim directs all outgoing connections to the IP addresses controlled by the attacker
  • 日蚀攻击:攻击者可通过确保受害者节点不再从网络的其余部分接收正确的信息,而只接收由攻击者操纵的信息来执行日蚀攻击。

Routing attack

hijacking bitcoin

 


investigate 调查

hijacking 劫持


0 条评论

发表评论

Avatar placeholder