Blockchain security is becoming increasingly relevant in today's cyberspace as it extends its influence in many industries. This paper focuses on protecting the lowest level layer in the blockchain, particularly the P2P network that allows the nodes to communicate and share information. The P2P network layer may be vulnerable to several families of attacks, such as Distributed Denial of Service (DDoS), eclipse attacks, or Sybil attacks. This layer is prone to threats inherited from traditional P2P networks, and it must be analyzed and understood by collecting data and extracting insights from the network behavior to reduce those risks. We introduce Tikuna, an open-source tool for monitoring and detecting potential attacks on the Ethereum bl...
Security in the blockchain has become a topic of concern because of the recent developments in the f...
Bitcoin is the first digital currency without a trusted third party. This revolutionary protocol all...
As the threat of cyber attack grows ever larger, new approaches to security are required. While ther...
International audiencePublic blockchains, like Ethereum, rely on an underlying peer-to-peer (P2P) ne...
This thesis aims to examine the security of a blockchain\u27s communication network. A blockchain re...
We present eclipse attacks on Ethereum nodes that exploit the peer-to-peer network used for neighbor...
Public blockchains, like Ethereum, rely on an underlying peer-to-peer (P2P) network to disseminate t...
Blockchain security has been drawing a tremendous attention from industry and academic due to its pr...
Over the past decade, blockchain technology has attracted a huge attention from both industry and ac...
Blockchain has been viewed as a breakthrough and an innovative technology due to its privacy, securi...
For data privacy, system reliability, and security, Blockchain technologies have become more popular...
This article aims to study intrusion attacks and then develop a novel cyberattack detection framewor...
Blockchain is a groundbreaking technology that is currently revolutionizing digital transactions, ho...
Background: This paper tackles the critical challenge of detecting fraudulent transactions within th...
Apart from its much-publicised use in crypto-currency, blockchain technology is used in a wide range...
Security in the blockchain has become a topic of concern because of the recent developments in the f...
Bitcoin is the first digital currency without a trusted third party. This revolutionary protocol all...
As the threat of cyber attack grows ever larger, new approaches to security are required. While ther...
International audiencePublic blockchains, like Ethereum, rely on an underlying peer-to-peer (P2P) ne...
This thesis aims to examine the security of a blockchain\u27s communication network. A blockchain re...
We present eclipse attacks on Ethereum nodes that exploit the peer-to-peer network used for neighbor...
Public blockchains, like Ethereum, rely on an underlying peer-to-peer (P2P) network to disseminate t...
Blockchain security has been drawing a tremendous attention from industry and academic due to its pr...
Over the past decade, blockchain technology has attracted a huge attention from both industry and ac...
Blockchain has been viewed as a breakthrough and an innovative technology due to its privacy, securi...
For data privacy, system reliability, and security, Blockchain technologies have become more popular...
This article aims to study intrusion attacks and then develop a novel cyberattack detection framewor...
Blockchain is a groundbreaking technology that is currently revolutionizing digital transactions, ho...
Background: This paper tackles the critical challenge of detecting fraudulent transactions within th...
Apart from its much-publicised use in crypto-currency, blockchain technology is used in a wide range...
Security in the blockchain has become a topic of concern because of the recent developments in the f...
Bitcoin is the first digital currency without a trusted third party. This revolutionary protocol all...
As the threat of cyber attack grows ever larger, new approaches to security are required. While ther...