[1] |
NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[EB/OL]. [2024-06-05]..
|
[2] |
UNDERWOOD S. Blockchain beyond bitcoin[J]. Communications of the ACM, 2016, 59(11): 15-17.
|
[3] |
YUAN Y, WANG F Y. Blockchain and cryptocurrencies: model, techniques, and applications[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2018, 48(9): 1421-1428.
|
[4] |
ZHAO J L, FAN S, YAN J. Overview of business innovations and research opportunities in blockchain and introduction to the special issue[J]. Financial Innovation, 2016, 2: No.28.
|
[5] |
HEILMAN E, KENDLER A, ZOHAR A, et al. Eclipse attacks on bitcoin’s peer-to-peer network[C]// Proceedings of the 24th USENIX Security Symposium. Berkeley: USENIX Association, 2015: 129-144.
|
[6] |
ATZEI N, BARTOLETTI M, CIMOLI T. A survey of attacks on Ethereum smart contracts (SoK)[C]// Proceedings of the 2017 International Conference on Principles of Security and Trust, LNCS 10204. Berlin: Springer, 2017: 164-186.
|
[7] |
MUFLEH A. Bitcoin eclipse attack — statistic analysis on selfish mining and double-spending attack/submitted[D/OL]. [2024-06-05]..
|
[8] |
LIU Y, HEI Y, XU T, et al. An evaluation of uncle block mechanism effect on Ethereum selfish and stubborn mining combined with an eclipse attack[J]. IEEE Access, 2020, 8: 17489-17499.
|
[9] |
FEIST J, GRIECO G, GROCE A. Slither: a static analysis framework for smart contracts[C]// Proceedings of the IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain. Piscataway: IEEE, 2019: 8-15.
|
[10] |
ZHENG Z, XIE S, DAI H, et al. An overview of blockchain technology: architecture, consensus, and future trends[C]// Proceedings of the 2017 IEEE International Congress on Big Data. Piscataway: IEEE, 2017: 557-564.
|
[11] |
LeCUN Y, BENGIO Y, HINTON G. Deep learning[J]. Nature, 2015, 521(7553): 436-444.
|
[12] |
WU Z, PAN S, CHEN F, et al. A comprehensive survey on graph neural networks[J]. IEEE Transactions on Neural Networks and Learning Systems, 2021, 32(1): 4-24.
|
[13] |
VELIČKOVIĆ P, CUCURULL G, CASANOVA A, et al. Graph attention networks[EB/OL]. [2024-06-05]..
|
[14] |
ALANGOT B, REIJSBERGEN D, VENUGOPALAN S, et al. Decentralized and lightweight approach to detect eclipse attacks on proof of work blockchains[J]. IEEE Transactions on Network and Service Management, 2021, 18(2): 1659-1672.
|
[15] |
URDANETA G, PIERRE G, VAN STEEN M. A survey of DHT security techniques[J]. ACM Computing Surveys, 2011, 43(2): No.8.
|
[16] |
CASTRO M, DRUSCHEL P, GANESH A, et al. Secure routing for structured peer-to-peer overlay networks[J]. ACM SIGOPS Operating Systems Review, 2002, 36(SI): 299-314.
|
[17] |
SIT E, MORRIS R. Security considerations for peer-to-peer distributed hash tables[C]// Proceedings of the 2002 International Workshop on Peer-to-Peer Systems, LNCS 2429. Berlin: Springer, 2002: 261-269.
|
[18] |
SINGH A, NGAN T W, DRUSCHEL P, et al. Eclipse attacks on overlay networks: threats and defenses[C]// Proceedings of the 25th IEEE International Conference on Computer Communications. Piscataway: IEEE, 2006: 1-12.
|
[19] |
APOSTOLAKI M, ZOHAR A, VANBEVER L. Hijacking bitcoin: routing attacks on cryptocurrencies[C]// Proceedings of the 2017 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2017: 375-392.
|
[20] |
BIRYUKOV A, PUSTOGAROV I. Bitcoin over Tor isn’t a good idea[C]// Proceedings of the 2015 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2015: 122-134.
|
[21] |
WÜST K, GERVAIS A. Ethereum eclipse attacks[EB/OL]. [2024-06-05]..
|
[22] |
MARCUS Y, HEILMAN E, GOLDBERG S. Low-resource eclipse attacks on Ethereum’s peer-to-peer network[EB/OL]. [2024-06-05]..
|
[23] |
HENNINGSEN S, TEUNIS D, FLORIAN M, et al. Eclipsing Ethereum peers with false friends[EB/OL]. [2024-06-05]..
|
[24] |
TRAN M, CHOI I, MOON G J, et al. A stealthier partitioning attack against bitcoin peer-to-peer network[C]// Proceedings of the 2020 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2020: 894-909.
|
[25] |
卫孜钻,王鑫,于丹,等. 面向POW共识的日蚀攻击动态防御机制[J]. 计算机工程与应用, 2023, 59(8): 280-287.
|
|
WEI Z Z, WANG X, YU D, et al. Defense mechanism to solve eclipse attack of POW consensus[J]. Computer Engineering and Applications, 2023, 59(8) : 280-287.
|
[26] |
ROTTONDI C, PANZERI A, YAGNE C T, et al. Detection and mitigation of the eclipse attack in chord overlays[J]. International Journal of Computational Science and Engineering, 2016, 13(2): 111-121.
|
[27] |
FANTACCI R, MACCARI L, ROSI M, et al. Avoiding eclipse attacks on Kad/Kademlia: an identity based approach[C]// Proceedings of the 2009 IEEE International Conference on Communications. Piscataway: IEEE, 2009: 1-5.
|
[28] |
TRAN M, SHENOI A, KANG M S. On the routing-aware peering against network-eclipse attacks in bitcoin[C]// Proceedings of the 30th USENIX Security Symposium. Berkeley: USENIX Association, 2021: 1253-1270.
|
[29] |
CHICARINO V, ALBUQUERQUE C, JESUS E, et al. On the detection of selfish mining and stalker attacks in blockchain networks[J]. Annals of Telecommunications, 2020, 75(3/4): 143-152.
|
[30] |
ISMAIL H, GERMANUS D, SURI N. Detecting and mitigating P2P eclipse attacks[C]// Proceedings of the IEEE 21st International Conference on Parallel and Distributed Systems. Piscataway: IEEE, 2015: 224-231.
|
[31] |
XU G, GUO B, SU C, et al. Am I eclipsed? a smart detector of eclipse attacks for Ethereum[J]. Computers and Security, 2020, 88: No.101604.
|
[32] |
吕婧淑,杨培,陈文,等. 基于免疫的区块链eclipse攻击的异常检测[J]. 计算机科学, 2018, 45(2): 8-14.
|
|
LYU J S, YANG P, CHEN W, et al. Abnormal detection of eclipse attacks on blockchain based on immunity[J]. Computer Science, 2018, 45(2): 8-14.
|
[33] |
DAI Q, ZHANG B, DONG S. Eclipse attack detection for blockchain network layer based on deep feature extraction[J]. Wireless Communications and Mobile Computing, 2022, 2022: No.1451813.
|
[34] |
DECKER C, WATTENHOFER R. Information propagation in the bitcoin network[C]// Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing. Piscataway: IEEE, 2013: 1-10.
|
[35] |
CVE-2013- 5700: remote P2P crash via bloom filters[EB/OL]. [2024-06-05]..
|
[36] |
哈尔滨工程大学. 基于节点评估和动态更新的区块链网络脆弱性检测方法及系统: 202311355453.1[P]. 2024-01-16.
|
|
Harbin Engineering University. Vulnerability detection method and system of blockchain network based on node evaluation and dynamic update: 202311355453.1[P]. 2024-01-16.
|