| [1] | NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[EB/OL]. [2024-06-05].. | 
																													
																						| [2] | UNDERWOOD S. Blockchain beyond bitcoin[J]. Communications of the ACM, 2016, 59(11): 15-17. | 
																													
																						| [3] | YUAN Y, WANG F Y. Blockchain and cryptocurrencies: model, techniques, and applications[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2018, 48(9): 1421-1428. | 
																													
																						| [4] | ZHAO J L, FAN S, YAN J. Overview of business innovations and research opportunities in blockchain and introduction to the special issue[J]. Financial Innovation, 2016, 2: No.28. | 
																													
																						| [5] | HEILMAN E, KENDLER A, ZOHAR A, et al. Eclipse attacks on bitcoin’s peer-to-peer network[C]// Proceedings of the 24th USENIX Security Symposium. Berkeley: USENIX Association, 2015: 129-144. | 
																													
																						| [6] | ATZEI N, BARTOLETTI M, CIMOLI T. A survey of attacks on Ethereum smart contracts (SoK)[C]// Proceedings of the 2017 International Conference on Principles of Security and Trust, LNCS 10204. Berlin: Springer, 2017: 164-186. | 
																													
																						| [7] | MUFLEH A. Bitcoin eclipse attack — statistic analysis on selfish mining and double-spending attack/submitted[D/OL]. [2024-06-05].. | 
																													
																						| [8] | LIU Y, HEI Y, XU T, et al. An evaluation of uncle block mechanism effect on Ethereum selfish and stubborn mining combined with an eclipse attack[J]. IEEE Access, 2020, 8: 17489-17499. | 
																													
																						| [9] | FEIST J, GRIECO G, GROCE A. Slither: a static analysis framework for smart contracts[C]// Proceedings of the IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain. Piscataway: IEEE, 2019: 8-15. | 
																													
																						| [10] | ZHENG Z, XIE S, DAI H, et al. An overview of blockchain technology: architecture, consensus, and future trends[C]// Proceedings of the 2017 IEEE International Congress on Big Data. Piscataway: IEEE, 2017: 557-564. | 
																													
																						| [11] | LeCUN Y, BENGIO Y, HINTON G. Deep learning[J]. Nature, 2015, 521(7553): 436-444. | 
																													
																						| [12] | WU Z, PAN S, CHEN F, et al. A comprehensive survey on graph neural networks[J]. IEEE Transactions on Neural Networks and Learning Systems, 2021, 32(1): 4-24. | 
																													
																						| [13] | VELIČKOVIĆ P, CUCURULL G, CASANOVA A, et al. Graph attention networks[EB/OL]. [2024-06-05].. | 
																													
																						| [14] | ALANGOT B, REIJSBERGEN D, VENUGOPALAN S, et al. Decentralized and lightweight approach to detect eclipse attacks on proof of work blockchains[J]. IEEE Transactions on Network and Service Management, 2021, 18(2): 1659-1672. | 
																													
																						| [15] | URDANETA G, PIERRE G, VAN STEEN M. A survey of DHT security techniques[J]. ACM Computing Surveys, 2011, 43(2): No.8. | 
																													
																						| [16] | CASTRO M, DRUSCHEL P, GANESH A, et al. Secure routing for structured peer-to-peer overlay networks[J]. ACM SIGOPS Operating Systems Review, 2002, 36(SI): 299-314. | 
																													
																						| [17] | SIT E, MORRIS R. Security considerations for peer-to-peer distributed hash tables[C]// Proceedings of the 2002 International Workshop on Peer-to-Peer Systems, LNCS 2429. Berlin: Springer, 2002: 261-269. | 
																													
																						| [18] | SINGH A, NGAN T W, DRUSCHEL P, et al. Eclipse attacks on overlay networks: threats and defenses[C]// Proceedings of the 25th IEEE International Conference on Computer Communications. Piscataway: IEEE, 2006: 1-12. | 
																													
																						| [19] | APOSTOLAKI M, ZOHAR A, VANBEVER L. Hijacking bitcoin: routing attacks on cryptocurrencies[C]// Proceedings of the 2017 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2017: 375-392. | 
																													
																						| [20] | BIRYUKOV A, PUSTOGAROV I. Bitcoin over Tor isn’t a good idea[C]// Proceedings of the 2015 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2015: 122-134. | 
																													
																						| [21] | WÜST K, GERVAIS A. Ethereum eclipse attacks[EB/OL]. [2024-06-05].. | 
																													
																						| [22] | MARCUS Y, HEILMAN E, GOLDBERG S. Low-resource eclipse attacks on Ethereum’s peer-to-peer network[EB/OL]. [2024-06-05].. | 
																													
																						| [23] | HENNINGSEN S, TEUNIS D, FLORIAN M, et al. Eclipsing Ethereum peers with false friends[EB/OL]. [2024-06-05].. | 
																													
																						| [24] | TRAN M, CHOI I, MOON G J, et al. A stealthier partitioning attack against bitcoin peer-to-peer network[C]// Proceedings of the 2020 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2020: 894-909. | 
																													
																						| [25] | 卫孜钻,王鑫,于丹,等. 面向POW共识的日蚀攻击动态防御机制[J]. 计算机工程与应用, 2023, 59(8): 280-287. | 
																													
																						|  | WEI Z Z, WANG X, YU D, et al. Defense mechanism to solve eclipse attack of POW consensus[J]. Computer Engineering and Applications, 2023, 59(8) : 280-287. | 
																													
																						| [26] | ROTTONDI C, PANZERI A, YAGNE C T, et al. Detection and mitigation of the eclipse attack in chord overlays[J]. International Journal of Computational Science and Engineering, 2016, 13(2): 111-121. | 
																													
																						| [27] | FANTACCI R, MACCARI L, ROSI M, et al. Avoiding eclipse attacks on Kad/Kademlia: an identity based approach[C]// Proceedings of the 2009 IEEE International Conference on Communications. Piscataway: IEEE, 2009: 1-5. | 
																													
																						| [28] | TRAN M, SHENOI A, KANG M S. On the routing-aware peering against network-eclipse attacks in bitcoin[C]// Proceedings of the 30th USENIX Security Symposium. Berkeley: USENIX Association, 2021: 1253-1270. | 
																													
																						| [29] | CHICARINO V, ALBUQUERQUE C, JESUS E, et al. On the detection of selfish mining and stalker attacks in blockchain networks[J]. Annals of Telecommunications, 2020, 75(3/4): 143-152. | 
																													
																						| [30] | ISMAIL H, GERMANUS D, SURI N. Detecting and mitigating P2P eclipse attacks[C]// Proceedings of the IEEE 21st International Conference on Parallel and Distributed Systems. Piscataway: IEEE, 2015: 224-231. | 
																													
																						| [31] | XU G, GUO B, SU C, et al. Am I eclipsed? a smart detector of eclipse attacks for Ethereum[J]. Computers and Security, 2020, 88: No.101604. | 
																													
																						| [32] | 吕婧淑,杨培,陈文,等. 基于免疫的区块链eclipse攻击的异常检测[J]. 计算机科学, 2018, 45(2): 8-14. | 
																													
																						|  | LYU J S, YANG P, CHEN W, et al. Abnormal detection of eclipse attacks on blockchain based on immunity[J]. Computer Science, 2018, 45(2): 8-14. | 
																													
																						| [33] | DAI Q, ZHANG B, DONG S. Eclipse attack detection for blockchain network layer based on deep feature extraction[J]. Wireless Communications and Mobile Computing, 2022, 2022: No.1451813. | 
																													
																						| [34] | DECKER C, WATTENHOFER R. Information propagation in the bitcoin network[C]// Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing. Piscataway: IEEE, 2013: 1-10. | 
																													
																						| [35] | CVE-2013- 5700: remote P2P crash via bloom filters[EB/OL]. [2024-06-05].. | 
																													
																						| [36] | 哈尔滨工程大学. 基于节点评估和动态更新的区块链网络脆弱性检测方法及系统: 202311355453.1[P]. 2024-01-16. | 
																													
																						|  | Harbin Engineering University. Vulnerability detection method and system of blockchain network based on node evaluation and dynamic update: 202311355453.1[P]. 2024-01-16. |