Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools

  title={Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools},
  author={B. Johnson and Aron Laszka and Jens Grossklags and Marie Vasek and T. Moore},
  booktitle={Financial Cryptography Workshops},
  • B. Johnson, Aron Laszka, +2 authors T. Moore
  • Published in
    Financial Cryptography…
  • Computer Science
  • One of the unique features of the digital currency Bitcoin is that new cash is introduced by so-called miners carrying out resource-intensive proof-of-work operations. To increase their chances of obtaining freshly minted bitcoins, miners typically join pools to collaborate on the computations. However, intense competition among mining pools has recently manifested in two ways. Miners may invest in additional computing resources to increase the likelihood of winning the next mining race. But… CONTINUE READING
    132 Citations

    Figures, Tables, and Topics from this paper

    Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools
    • 5
    • Highly Influenced
    On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining
    • 112
    • PDF
    Bitcoin -- The Miner's Dilemma
    • 3
    • PDF
    Discouraging Pool Block Withholding Attacks in Bitcoins
    • PDF
    Block withholding game among bitcoin mining pools
    • 10
    The Miner's Dilemma
    • Ittay Eyal
    • Computer Science
    • 2015 IEEE Symposium on Security and Privacy
    • 2015
    • 288
    • PDF
    An Eye for an Eye: Economics of Retaliation in Mining Pools
    • 2
    • PDF
    Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin
    • Ren Zhang
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2015
    • 4
    • PDF


    The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries
    • 417
    • PDF
    Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem
    • 152
    • PDF
    A game theoretic defence framework against DoS/DDoS cyber attacks
    • 67
    On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks
    • 58
    • PDF
    Secure or insure?: a game-theoretic analysis of information security games
    • 243
    • PDF
    Botnet Economics: Uncertainty Matters
    • 78
    • PDF
    Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment
    • 172
    Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk
    • 272
    • PDF
    Case study of the Miner Botnet
    • 54
    • PDF
    Incentive-based modeling and inference of attacker intent, objectives, and strategies
    • 209
    • PDF