References
[1] NAKAMOTO S. Bitcoin: A peer-to-peer electronic cash system.
Satoshi Nakamoto Institute, 2008.
[2] MUKHOPADHYAY U, SKJELLUM A, HAMBOLU O, et al. A
brief survey of cryptocurrency systems. Proceedings of the 14th
Annual Conference on Privacy, Security and Trust ( PST'16 ),
2016, Dec 12 - 14, Auckland, New Zealand. Piscataway, NJ,
USA: IEEE, 2017: 745 - 752.
[3] FENG Q, HE D B, ZEADALLY S, et al. A survey on privacy
protection in blockchain system. Journal of Network and Computer Applications, 2019, 126: 45 - 58.
[4] SUN G Y. On attack mode and security of block-chain. Network
Security Technology and Application, 2018(8): 26 - 27.
[5] GERMANUS D, ROOS S, STRUFE T, et al. Mitigating eclipse
attacks in peer-to-peer networks. Proceedings of the 2014 IEEE Conference on Communications and Network Security (CNS'14),
2014, Oct 29 - 31, San Francisco, CA, USA. Piscataway, NJ,
USA: IEEE, 2014: 400 - 408.
[6] BISSIAS G, LEVINE B N, OZISIK A P, et al. An analysis of
attacks on block-chain consensus. ArXiv preprint, arXiv:1610.
07985, 2016.
[7] TAN Q F, GAO Y, SHI J Q, et al. Toward a comprehensive
insight into the eclipse attacks of tor hidden services. IEEE
Internet of Things Journal 2019, 6(2): 1584 - 1593.
[8] YE C C, LI G Q, CAI H M, et al. Security detection model of
blockchain. Journal of Software, 2018, 29(5): 1348 - 1359 (in Chinese).
[9] SAPIRSHTEIN A, SOMPOLINSKY Y, ZOHAR A. Optimal
selfish mining strategies in Bitcoin. Financial Cryptography and
Data Security: Proceedings of the 20th International Conference on
Financial Cryptography and Data Security ( FC'16 ), 2016, Feb
22 - 26, Bridgetown, Barbados. LNSC 9603. Berlin, Germany:
Springer, 2015: 515 - 532.
[10] HEILMAN E, KENDLER A, ZOHAR A, et al. Eclipse attacks on
Bitcoin's peer-to-peer network. Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15), 2015, Aug 12 -
14, Washington, DC, USA. Berkeley, CA, USA: USENIX Association, 2015: 129 - 144.
[11] CAUBET J, ESPARZA O, MUNOZ L J, et al. RIAPPA: A robust
identity assignment protocol for P2P overlays. Security and Communication Networks, 2014, 7(12): 2743 - 2760.
[12] LIU Z J, LI C L, SUN Z, et al. Artificial immune based bitcoin
fast transaction anomaly detection model. Application Research of Computers , 2020, 37(9): 2815 - 2818 (in Chinese).
[13] WU D, LIU X D, YAN X B, et al. Equilibrium analysis of
Bitcoin block withholding attack: A generalized model. Reliability Engineering and System Safety, 2019, 185: 318 - 328.
[14] DONG X W, WU F, FAREE A, et al. Selfholding: A combined
attack model using selfish mining with block withholding attack. Computers and Security, 2019, 87: Article 101584.
[15] XU G Q, GUO B J, SU C H, et al. Am I eclipsed? A smart
detector of eclipse attacks for Ethereum. Computers and Security,
2020, 88: Article 101604.
[16] LU J S, YANG P, CHEN W, et al. Abnormal detection of eclipse
attacks on blockchain based on immunity. Computer Science, 2018, 45(2): 8 - 14 (in Chinese).
[17] DU X L, LI D F, LIANG K R. A biform game approach to
preventing block withholding attack of blockchain based on semi-CIS value. International Journal of Computational Intelligence
Systems, 2019, 12(2): 1353 - 1360.
[18] WANG L, REN N, LI B Z. Research on evolutionary game and
prevention and control strategy of blockchain 51% double spend attack. Computer Engineering and Applications, 2020, 56(3):
28 - 34 (in Chinese).
[19] FANG W D, ZHANG W X, PAN T, et al. Cyber security in
blockchain: Threats and countermeasures. Journal of Cyber
Security, 2018, 3(2): 87 - 104 (in Chinese).
[20] HU H, YE R G, ZHANG H Q, et al. Quantitative method of
network security situation based on attack prediction. Journal on Communications, 2017, 38(10): 122 - 134 (in Chinese).
[21] LUO Z Y, YANG X, SUN G L, et al. Finite automaton intrusion
tolerance system model based on Markov. Journal on Communications, 2019, 40(10): 79 - 89 (in Chinese).
|