Blockchain Amplification Attack

Taro Tsuchiya,Liyi Zhou,Kaihua Qin,Arthur Gervais,Nicolas Christin
2024-09-20
Abstract:Strategies related to the blockchain concept of Extractable Value (MEV/BEV), such as arbitrage, front- or backrunning create an economic incentive for network nodes to reduce latency. A modified node, that minimizes transaction validation time and neglects to filter invalid transactions in the Ethereum P2P network, introduces a novel attack vector -- Blockchain Amplification Attack. An attacker exploits those modified nodes to amplify an invalid transaction thousands of times, posing a threat to the entire network. To illustrate attack feasibility and practicality in the current mainnet, we 1) identify thousands of similar attacks in the wild, 2) mathematically model propagation mechanism, 3) empirically measure model parameters from our two monitoring nodes, and 4) compare performance with existing Denial-of-Service attacks through local simulation. We show that an attacker can amplify network traffic at modified nodes by a factor of 3,600, and cause economic damages 13,800 times greater than the amount needed to carry out the attack. Despite these risks, aggressive latency reduction may still be profitable enough to justify the existence of modified nodes. To assess this tradeoff, we 1) simulate the transaction validation process in the local network and 2) empirically measure the latency reduction by deploying our modified node in the Ethereum testnet. We conclude with a cost-benefit analysis of skipping validation and provide mitigation strategies against this attack.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is a new type of attack introduced in the blockchain network due to nodes skipping the transaction verification process in order to reduce latency - the Blockchain Amplification Attack. Specifically, this attack takes advantage of modified nodes (these nodes reduce latency by minimizing transaction verification time but ignore filtering invalid transactions), enabling attackers to amplify an invalid transaction thousands of times in the Ethereum P2P network, posing a threat to the entire network. The goals of the paper are: 1. **Define the Blockchain Amplification Attack**: Define this attack through a mathematical model and demonstrate its feasibility. 2. **Analyze actual attack cases**: Identify similar attack instances in the real world, and analyze their cost, scale, and intensity. 3. **Evaluate network impacts**: Infer the Ethereum P2P network topology by designing and deploying custom - monitoring nodes, and quantify the impact of the attack. 4. **Simulate attack effects**: Conduct attack simulations on the local P2P network to confirm that the proposed attack is superior to existing Denial - of - Service (DoS) attacks. 5. **Quantify the latency reduction in transaction verification**: Measure the amount of latency reduction brought by skipping transaction verification through experiments. 6. **Conduct a cost - benefit analysis**: Analyze the cost and benefit of modifying nodes based on the conversion of time and money, and propose three possible mitigation strategies. Through the above research, this paper aims to reveal the potential threats of the Blockchain Amplification Attack and provide countermeasures to protect the security and stability of the blockchain network.