A Two-Stage Deanonymization Attack Towards Bitcoin Hidden Service Nodes

2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)(2021)

引用 0|浏览17
暂无评分
摘要
With the increasing popularity of Bitcoin, considerable attention has been paid to its privacy and anonymity. To protect users' privacy better from the P2P network perspective, Bitcoin encourages users to connect to the network through the anonymity network Tor. In this paper, we manage to prove that the combining of Bitcoin and Tor is easier to be exploited to deanonymize Bitcoin users. Specifically, we propose a two-stage deanonymization attack towards Bitcoin hidden service nodes, intending to reveal the IP addresses of the Bitcoin hidden services and identify their transactions. The experiments show that the node-level adversary and the gateway-level adversary both can correlate the IP address and the onion address of Bitcoin hidden services by shaping the traffic. On the premise of successful location deanonymization, the adversaries can identify the transactions from the target Bitcoin hidden service by delaying the packets. We also provide the theoretical analysis of the success probability and the countermeasures to mitigate this kind of attack.
更多
查看译文
关键词
Bitcoin,Tor,Hidden Service,Deanonymization
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要