OFFENSES IN DECENTRALIZED SYSTEMS
Abstract
Introduction. The article is devoted to the study of the problem of offenses in decentralized systems, in particular in blockchain networks. The author analyzes the main types of offenses that can occur in these systems, such as fraud, various attacks, and others. Since decentralized networks have no centralized control, they become more vulnerable to various types of attacks and abuses. Understanding the nature of decentralized networks can help to solve the problem of crimes in these systems more effectively, and understanding the principles of these networks can help to develop effective and transparent methods of solving such crimes.
Summary of the main results of the study. Taking into account the results of the research, an explanation is provided as to how decentralized networks such as blockchain are organized, what are the offenses in such networks, what are attacks in decentralized systems. A detailed list of the main types of attacks, other types of offenses and abuses in decentralized systems is also provided, a description and explanation is provided for each type, and specific examples are also provided for some of them.
Conclusions. For the first time, a list of the main offenses in decentralized networks such as blockchain has been unified and provided in the context of criminal law.
Downloads
References
/References
LOCKCHAIN TECHNOLOGY ON THE DEMOCRATIC CHOICE. 2020. [цит. за 03, Лютий 2023]. Доступний у: https://scholar.google.com/citations?view_op=view_citation&hl=en&user=pnwJInEAAAAJ&citation_for_view=pnwJInEAAAAJ:d1gkVwhDpl0C
Driscoll S. How Bitcoin Works Under the Hood [Інтернет]. [цит. за 21, Лютий 2023]. Доступний у: http://www.imponderablethings.com/2013/07/how-bitcoin-works-under-hood.html
Черніков М.Ю. Методи захисту транзакцій в блокчейн системах. 2021 [цит. за 21, Лютий 2023]; Доступний у: https://openarchive.nure.ua/handle/document/19433
Double-Spending Problem and Byzantine General’s Problem in Relation to Cryptocurrency [Інтернет]. Freeman Law. [цит. за 03, Лютий 2023]. Доступний у: https://freemanlaw.com/double-spending-problem-and-byzantine-generals-problem-in-relation-to-cryptocurrency-2/
Kovalchuk D, Ivko T, Kuznetsova T, Nariezhnii O. Огляд протоколів консенсусу, що застосовуються в технологіях блокчейн. CS&CS E-journal. 24, Червень 2019;(1):30–43. [цит. за 03, Лютий 2023]. Доступний у: https://periodicals.karazin.ua/cscs/article/view/13081
The Longest Chain—Blockchain Guide [Інтернет]. [цит. за 21, Лютий 2023]. Доступний у: https://learnmeabitcoin.com/technical/longest-chain
Обзор актуальных протоколов достижения консенсуса в децентрализованной среде [Інтернет]. Хабр. [цит. за 21, Лютий 2023]. Доступний у: https://habr.com/ru/company/distributedlab/blog/419185/
Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities. Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu. [Інтернет]. [цит. за 21, Лютий 2023]. Доступний у: https://eprint.iacr.org/search?q=Bitcoin-Enhanced+&title=&authors=&category=&submittedafter=&submittedbefore=&revisedafter=&revisedbefore=
Синхронизация кошельков с Биткоин сетью [Інтернет]. Хабр. [цит. за 21, Лютий 2023]. Доступний у: https://habr.com/ru/company/distributedlab/blog/416469/
Подробно об обновлении Segregated Witness и последствиях его принятия в Bitcoin [Інтернет]. Хабр. [цит. за 21, Лютий 2023]. Доступний у: https://habr.com/ru/company/distributedlab/blog/418853/
Tse D. Bribery and stake grinding attacks. Scaling Blockchains, Stanford University. 2020. EE 374. URL: https://web.stanford.edu/class/archive/ee/ee374/ee374.1206//downloads/l18_notes.pdf (date of access: 23.01.2023)
Liveness—an overview | ScienceDirect Topics [Інтернет]. [цит. за 23, Січень 2023]. Доступний у: https://www.sciencedirect.com/topics/engineering/liveness
What is a distributed hash table? [Інтернет]. Educative: Interactive Courses for Software Developers. [цит. за 23, Січень 2023]. Доступний у: https://www.educative.io/answers/what-is-a-distributed-hash-table
Thellman P. Validators Create New Attack Vectors for Decentralized Systems [Інтернет]. 2019 [цит. за 21, Лютий 2023]. Доступний у: https://www.coindesk.com/markets/2019/02/24/validators-create-new-attack-vectors-for-decentralized-systems/
What Is Delegated Proof of Stake? [Інтернет]. [цит. за 21, Лютий 2023]. Доступний у: https://crypto.com/university/what-is-dpos-delegated-proof-of-stake
Crypto Off-Chain vs. On-Chain Transactions: What Are They? [Інтернет]. Bybit Learn. 2021 [цит. за 29, Січень 2023]. Доступний у: https://learn.bybit.com/blockchain/off-chain-vs-on-chain-transactions/
Bitcoin White Paper [Інтернет]. [цит. за 03, Лютий 2023]. Доступний у: https://bitcoinwhitepaper.co/
What is Simplified Payment Verification (SPV)? Definition & Meaning | Crypto Wiki [Інтернет]. BitDegree.org Crypto Exchanges. [цит. за 20, Січень 2023]. Доступний у: https://www.bitdegree.org/crypto/learn/crypto-terms/what-is-simplified-payment-verification-spv
What is ARP Spoofing | ARP Cache Poisoning Attack Explained | Imperva [Інтернет]. Learning Center. [цит. за 23, Січень 2023]. Доступний у: https://www.imperva.com/learn/application-security/arp-spoofing/
DHCP Starvation Attack [Інтернет]. GeeksforGeeks. 2022 [цит. за 21, Лютий 2023]. Доступний у: https://www.geeksforgeeks.org/dhcp-starvation-attack/
Popovic A, Milijic A. CRYPTO-DEMOCRACY: IMPLICATIONS OF THE BLOCKCHAIN TECHNOLOGY ON THE DEMOCRATIC CHOICE. 2020. [cited for 03, February 2023]. Available at: https://scholar.google.com/citations?view_op=view_citation&hl=en&user=pnwJInEAAAAJ&citation_for_view=pnwJInEAAAAJ:d1gkVwhDpl0C
Driscoll S. How Bitcoin Works Under the Hood [Internet]. [cited for 21, February 2023]. Available at: http://www.imponderablethings.com/2013/07/how-bitcoin-works-under-hood.html
Chernikov M.Yu. Methods of protecting transactions in blockchain systems. 2021 [cited for February 21, 2023]; Available at: https://openarchive.nure.ua/handle/document/19433
Double-Spending Problem and Byzantine General’s Problem in Relation to Cryptocurrency [Internet]. Freeman Law. [cited for 03, February 2023]. Available at: https://freemanlaw.com/double-spending-problem-and-byzantine-generals-problem-in-relation-to-cryptocurrency-2/
Kovalchuk D, Ivko T, Kuznetsova T, Nariezhnii O. Overview of consensus protocols used in blockchain technologies. CS&CS E-journal. 24, June 2019;(1):30–43. [cited for 03, February 2023]. Available at: https://periodicals.karazin.ua/cscs/article/view/13081
The Longest Chain—Blockchain Guide [Internet]. [cited for 21, February 2023]. Available at: https://learnmeabitcoin.com/technical/longest-chain
Overview of actual consensus-building protocols in a decentralized environment [Internet]. Habr [cited for 21, February 2023]. Available at: https://habr.com/ru/company/distributedlab/blog/419185/
Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities. Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu. [Internet]. [cited for 21, February 2023]. Available at: https://eprint.iacr.org/search?q=Bitcoin-Enhanced+&title=&authors=&category=&submittedafter=&submittedbefore=&revisedafter=&revisedbefore=
Synchronization of wallets with the Bitcoin network [Internet]. Habr [cited for 21, February 2023]. Available at: https://habr.com/ru/company/distributedlab/blog/416469/
Details on the Segregated Witness update and the consequences of its acceptance in Bitcoin [Internet]. Habr [cited for 21, February 2023]. Available at: https://habr.com/ru/company/distributedlab/blog/418853/
Tse D. Bribery and stake grinding attacks. Scaling Blockchains, Stanford University. 2020. EE 374. URL: https://web.stanford.edu/class/archive/ee/ee374/ee374.1206//downloads/l18_notes.pdf (date of access: 23.01.2023)
Liveness—an overview | ScienceDirect Topics [Internet]. [cited for 23, January 2023]. Available at: https://www.sciencedirect.com/topics/engineering/liveness
What is a distributed hash table? [Internet]. Educational: Interactive Courses for Software Developers. [cited for 23, January 2023]. Available at: https://www.educative.io/answers/what-is-a-distributed-hash-table
Thellman P. Validators Create New Attack Vectors for Decentralized Systems [Internet]. 2019 [cited for 21, February 2023]. Available at: https://www.coindesk.com/markets/2019/02/24/validators-create-new-attack-vectors-for-decentralized-systems/
What Is Delegated Proof of Stake? [Internet]. [cited for 21, February 2023]. Available at: https://crypto.com/university/what-is-dpos-delegated-proof-of-stake
Crypto Off-Chain vs. On-Chain Transactions: What Are They? [Internet]. Bybit Learn. 2021 [cited for 29, January 2023]. Available at: https://learn.bybit.com/blockchain/off-chain-vs-on-chain-transactions/
Bitcoin White Paper [Internet]. [cited for 03, February 2023]. Available at: https://bitcoinwhitepaper.co/
What is Simplified Payment Verification (SPV)? Definition & Meaning | Crypto Wiki [Internet]. BitDegree.org Crypto Exchanges. [cited for 20, January 2023]. Available at: https://www.bitdegree.org/crypto/learn/crypto-terms/what-is-simplified-payment-verification-spv
What is ARP Spoofing | ARP Cache Poisoning Attack Explained | Imperva [Internet]. Learning Center. [cited for 23, January 2023]. Available at: https://www.imperva.com/learn/application-security/arp-spoofing/
DHCP Starvation Attack [Internet]. GeeksforGeeks. 2022 [cited for 21, February 2023]. Available at: https://www.geeksforgeeks.org/dhcp-starvation-attack/
Copyright (c) 2022 Максим Рафальський
This work is licensed under a Creative Commons Attribution 4.0 International License.