论文标题
IOTA协议中的寄生虫链检测
Parasite Chain Detection in the IOTA Protocol
论文作者
论文摘要
近年来,市场上出现了一些基于定向无环图(DAG)的分布式分类帐技术。与区块链技术类似,基于DAG的系统旨在建立一个不可变的分类帐,并面临有关分类帐国家不可逆性的安全问题。但是,由于其更为复杂的性质和最近的知名度,对敌对行动的研究到目前为止很少受到关注。在本文中,我们关注对IOTA加密货币的一种特殊类型的攻击,更具体地说,是一种寄生虫链攻击,试图恢复存储在DAG结构中的历史记录,也称为Tangle。 为了提高纠缠的安全性,我们提出了这种攻击的检测机制。在这种机制中,我们通过对其的某些方面进行采样,尤其是批准者数量的分布来拥抱DAG结构的复杂性。我们最初描述了预测没有任何恶意参与者的纠缠所期望的分布的模型。然后,我们介绍将此参考分布与测量分布进行比较的指标。在发现后,可以采取措施使攻击失败。我们表明,由于寄生虫链的形式与主要纠缠不同,因此可以检测某些类型的恶意链。我们还表明,尽管攻击者可能会更改寄生虫链的结构以避免检测,但由于攻击的效率降低,因此以很大的成本进行了攻击。
In recent years several distributed ledger technologies based on directed acyclic graphs (DAGs) have appeared on the market. Similar to blockchain technologies, DAG-based systems aim to build an immutable ledger and are faced with security concerns regarding the irreversibility of the ledger state. However, due to their more complex nature and recent popularity, the study of adversarial actions has received little attention so far. In this paper we are concerned with a particular type of attack on the IOTA cryptocurrency, more specifically a Parasite Chain attack that attempts to revert the history stored in the DAG structure, also called the Tangle. In order to improve the security of the Tangle, we present a detection mechanism for this type of attack. In this mechanism, we embrace the complexity of the DAG structure by sampling certain aspects of it, more particularly the distribution of the number of approvers. We initially describe models that predict the distribution that should be expected for a Tangle without any malicious actors. We then introduce metrics that compare this reference distribution with the measured distribution. Upon detection, measures can then be taken to render the attack unsuccessful. We show that due to a form of the Parasite Chain that is different from the main Tangle it is possible to detect certain types of malicious chains. We also show that although the attacker may change the structure of the Parasite Chain to avoid detection, this is done so at a significant cost since the attack is rendered less efficient.