Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

sophisticated attack strategies

biblio

Visible to the public A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network

Submitted by grigby1 on Tue, 03/09/2021 - 2:50pm
  • Routing protocols
  • network operation
  • peer connections
  • Peer-to-peer computing
  • peering decision
  • peering dynamics
  • prefix hijacking attack
  • propagation delays
  • pubcrawl
  • public Bitcoin
  • Reliability
  • network adversary
  • routing-level attacks
  • security
  • sophisticated attack strategies
  • stealthier partitioning attack
  • targeted Bitcoin node
  • telecommunication network routing
  • telecommunication network topology
  • telecommunication traffic
  • time 5.0 week to 6.0 week
  • Bitcoin network
  • Scalability
  • Resiliency
  • Metrics
  • Human Factors
  • abundant network address resources
  • ASes
  • attack execution period
  • attack traffic rate
  • bitcoin
  • Bitcoin core
  • peer to peer security
  • Bitcoin peer-to-peer network
  • centralization problem
  • computer network security
  • eclipse attack
  • EREBUS attack
  • Human behavior
  • IP networks
  • Monitoring
  • natural man-in-the-middle network

Terms of Use  |  ©2023. CPS-VO