Security Issues and Challenges
Though game-theory-based consensus mechanisms and cryptographic puzzles make blockchain technology near unfeasible to hack, these techniques do not claim that security issues for blockchain are non-existent. Inherited security features of blockchain make it resistant to attacks but not immune to them [62, 63]. Table 6.1 lists some security issues and challenges in blockchain technology. In this section, we discuss security issues and challenges of blockchain technology.
- • 51% attacks: It is one of the most severe security issues in blockchain. It is an attack in which a group of miners take control of the more than 50% of the network’s mining hash rate or computing power. In this attack, attackers prevent new transactions from being confirmed and send them to a halt state. Apart from this, attackers are able to reverse the completed transactions of a block and thus are able to spend coins doubly. In the year 2018, several cryptocurrencies such as ZenCash, Gold, Verge, and Ethereum Classic suffered 51% attacks. Attackers have controlled the huge hash power of bitcoin Gold in such a way after increasing the exchange threshold values by bitcoin Gold, attackers were able to spend coins doubly for many days. Being keen eyed on mining pool, executing mining with a higher hash rate or continuously switching to different consensus algorithm can be viable options to deal with this issue.
- • Exchange hacks: Crypto exchange hacks are often nowadays. Crypto exchanges are the most vulnerable targets for the attackers. A crypto exchange is based on centralised single point failure mechanism which makes it more vulnerable to be targeted by attackers. Security problems for exchange hacks can be divided into two categories: client side and server side. In client side category,
6 • Emerging Solutions for DDoS Attack 113
TABLE 6.1 Security issues and challenges of blockchain
FEATURE |
DESCRIPTION |
Scalability |
|
Security management |
|
Standardisation |
|
Integration in existing infrastructure |
|
Real time |
|
Profitability |
|
(Continued)
114 Distributed Denial of Service (DDoS) Attacks
TABLE 6.1 Security issues and challenges of blockchain (Continued)
FEATURE |
DESCRIPTION |
Lack of awareness and understanding |
|
Productivity paradox |
|
Security and privacy challenges |
|
Environmental cost |
|
there exist many issues like cross site scripting attacks (XSS), open redirects which facilitate attacker in performing phishing-like attack, and issues related to SSL. An XSS attack injects malicious Java script into the web page that successfully extracts the wallet address. Attackers can redirect user to a seemingly legitimate crypto exchange link through open redirects. In this attack, a link with original exchange domain can make a user to download a malicious script unknowingly. In server side category, key-value injections, race conditions, and authentication issues are some of the challenges.
• Social engineering: Social engineering is also one of the major challenges that blockchain technology is currently facing. It comes in many forms but its main motive is always to steal private keys, login credentials, or cryptocurrencies. Phishing is the most common social engineering attack [64]. Some fake mails can be sent by
6 • Emerging Solutions for DDoS Attack 115
attackers with information like enhancing wallet security through two-factor authentication mechanisms. Users are convinced to send their login credentials through these kinds of mails.
- • Software flaws: Though blockchain technology has proved its worth by dealing with all types of attacks, the applications that utilise this technology are still prone to many bugs. In the previous year, the damage associated with software bugs in cryptowallets and decentralised apps was almost $24 million. It is very important that any software application that is built on top of the Distributed ledger technology (DLT) must undergo rigorous testing and verification. Testing process should include penetration testing, code reviews, and audits for smart contract. Before using any blockchain-based application, one must ensure that that it must undergo through a third-party scrutiny process.
- • Malware: It is the most common challenge to the security of any online process. In blockchain technology, it is related to malicious block-mining software, crypto-exchange hack codes, or any other code that can shut down the servers or steal cryptocurrencies from a user, for example, cryptojacking malware. It is the type of malware which exploits vulnerabilities of blockchain and cryptocurrencies. This malware helps attackers to have unauthorised access of a computer’s resources to mine cryptocurrencies. This malware does not steal currencies implicitly but induces performance issues like create backdoors for other types of malicious codes. Vigilance of users can help them dodging these types of malware.