Blockchain tutorial : Part 3 (2024)

Blockchain Networks

The blockchain is designed to store a trusted, shared distributed ledger. This ledger represents the history of the blockchain network, so the network level is an important one when discussing the blockchain ecosystem.

In the previous post, we discussed the nodes and how they each maintain their own copy of the distributed ledger. Since the blockchain is designed to be trustless, no other node is going to implicitly trust any other node’s copy. They need a way to agree on the state of the ledger (consensus), and, for that, they need a way to communicate: the network.

The Blockchain Peer-to-Peer Network

Blockchains use a different network architecture than most of the web services that we’re used to. These services use a client-server architecture, where the server acts as a single source of ground truth, and the clients connect directly to it to upload or download application data. For example, when you use a webmail client like Gmail, your email doesn’t go directly from your computer to the recipient’s. Instead, you upload it to the Gmail servers and the recipient downloads it from a Gmail server to read.

This system is simple and effective, yet it relies on the Gmail server to be a trusted middleman in the process. Blockchain isn’t big on trusted middlemen, so it uses a peer-to-peer network, where each node in the network communicates directly with other nodes. Most blockchain networks use a broadcast system where, if a node has five peers, every message that is received from one is sent to the other four. This way, messages percolate across the network over many paths, and no one has complete control over communications.

The main implication of the peer-to-peer model for blockchain networking is that the underlying network needs to be able to support it. Since every peer needs to be capable of connecting to every other peer, you can’t effectively have a blockchain network distributed across a network with varying trust levels without compromising either blockchain or network security.Also, the “broadcast” communication style of the blockchain means that it requires a large amount of bandwidth to function properly. The inability to support this can have negative impacts on blockchain security and effectiveness.

GhostVolt Solo

Rock Solid File Encryption for Everyone

Protect against data theft and easily lock any file with automated encryption, organise with file tagging and securely share your files with anyone.

Blockchain tutorial : Part 3 (1)

TRY IT FOR FREE



Attacking the Blockchain Network

Many of the best-known attacks against blockchain systems are at the network level. Many people know that private key management is a problem and that smart contract vulnerabilities exist, but they’d be hard-pressed to even name the top ten most common smart contract vulnerabilities. On the other hand, Sybil attacks and 51% attacks are commonly mentioned in blockchain security-related posts.

In this section, we’ll discuss three network-level attacks on the blockchain: Denial of Service (DoS), Eclipse, and Sybil attacks. A 51% attack can also be considered a network-level attack, but we’ll talk about it in the next post since it’s most closely related to consensus.

Denial of Service Attacks

Blockchains are distributed, decentralized networks, so it seems like Denial of Service (DoS) attacks should be impossible. DoS attacks target a single point of failure (like a webserver) or a bottleneck in a system and attempt to overwhelm it in order to degrade the operations of the system. Since blockchain (theoretically) has no single points of failure, DoS attacks shouldn’t be an issue. In practice, DoS attacks against the blockchain exist, but they attack temporary single points of failure or system bottlenecks.

One such bottleneck is the transaction capacity of the blockchain. Most blockchains create blocks with a fixed maximum size at a fixed rate. An attacker can create a large number of spam transactions and transmit them to the network (similar to a DoS attack on a webserver). If the network can’t reliably identify them as spam transactions and ignore them, they’ll be added to the blockchain, taking up space that could have been used by legitimate transactions. Worse, blockchains are “forever”, so these spam transactions that make it onto the blockchain can take up storage space on nodes for the life of the blockchain.

An example of a temporary single point of failure is the creator of a given block. Different blockchains have different methods of choosing this person, but in the end, one node puts a block together, signs it, and transmits it to the network. In some schemes (like Proof of Stake), if a block creator misses their “slot” for creating a block, they forfeit it. If you can force someone to forfeit a block (i.e. by a traditional DoS attack), that block is never created and the network loses some of its potential capacity.

Eclipse/Routing Attacks

Blockchain tutorial : Part 3 (2)

Eclipse and Routing attacks are two names for essentially the same attack. In an Eclipse attack, an attacker isolates a single node from the rest of the network by controlling all of its peer connections. In a Routing attack, the network is split up into two or more isolated groups. Both attacks can be used to facilitate a double-spend attack (by sending a different transaction to each isolated individual/group) or a 51% attack (by filtering the victim’s view of the network state so that they mine a version of history that’s in the attacker’s favor).

Eclipse and routing attacks can be performed by a variety of different means. External to the blockchain ecosystem, an attacker can control a node’s connection to the network using malware or any other traditional means of performing a Man-in-the-Middle (MitM) attack. A study found that Bitcoin is especially vulnerable to BGP routing attacks, where the attacker convinces computers that the best route from A to B is through them.

Internal to the blockchain ecosystem, an attacker can perform these attacks by controlling all of a node’s connections to their peers. Since blockchain networks are not fully connected (nodes only connect to a small number of other nodes), it’s possible that a node can only be connected to peers controlled by an attacker.

It doesn’t matter how the attacker controls the node’s connection to the blockchain network as long as control is absolute. If this is true, the attacker may be able to selectively drop packets from other users or send mutually exclusive versions of transactions from their own addresses to drive the isolated groups’ versions of history apart. When the attack is completed, the longest block rule means that whichever version of the blockchain is shorter will be discarded (which is perfect for a double-spend attack).

Sybil Attacks

Blockchain tutorial : Part 3 (3)

A Sybil attack is a simple network-level attack used to facilitate other attacks. In a Sybil attack, the attacker creates and maintains a large number of accounts on the blockchain network. This can be useful when performing an Eclipse/Routing attack since, if the attacker controls most of the nodes accepting connections when a node is looking for one, there is a high probability that the node will only choose attacker-controlled connections.

Up Next: Consensus

Up to this point, we’ve talked about the fundamentals of the blockchain protocol and how it works and is attacked at a node and network level. In the next post, we’ll be discussing consensus: the way that these distributed and decentralized networks of nodes agree on their shared history.

Read part 4 - Consensus


Guest author Howard Poston is a cybersecurity and blockchain security consultant and trainer. You can reach Howard at howard.poston@gmail.com

Blockchain tutorial : Part 3 (2024)

FAQs

What are the 3 most important components for a blockchain? ›

In summary, the three key components of blockchain networks are cryptography, consensus algorithms, and peer-to-peer network hash codes.

Why is blockchain 3.0 popular? ›

Blockchain 3.0 also fosters greater interoperability between chains. Cross-chain functionality is considered a crucial development because it supports the wider spread of distributed apps and allows for greater interaction between financial entities, businesses, government agencies and other participants.

What is blockchain in 3 words? ›

Blockchain technology is an advanced database mechanism that allows transparent information sharing within a business network. A blockchain database stores data in blocks that are linked together in a chain.

What are the three problems with blockchain? ›

Blockchains must maintain the elements of decentralization, security, and scalability. Improving one of these areas often results in sacrificing another. Creating this balance has been a challenge for developers for as long as blockchain technology has existed, and is often referred to as the blockchain trilemma.

What are the three basic types of blockchain? ›

It explains four major types of blockchains: Public, Private, Federated, and Hybrid, each with its advantages and disadvantages. These types cater to varied needs, such as transparency, scalability, and speed, and are used in industries including finance, supply chain management, and voting.

What are the three key principles of a blockchain? ›

The key blockchain design principles are transparency, security, and decentralization. Transparency is a critical aspect of network security. It ensures users have complete transparency into all activities on the network, assuring them a degree of trustworthiness.

Which is the most actively used blockchain? ›

The most actively used blockchain is Ethereum.

What is the easiest way to explain blockchain? ›

Blockchain technology is a decentralized, distributed ledger that stores the record of ownership of digital assets. Any data stored on blockchain is unable to be modified, making the technology a legitimate disruptor for industries like payments, cybersecurity and healthcare.

What is a real life example of a blockchain? ›

Healthcare

Blockchain can have a big impact on healthcare using smart contracts and healthcare is one of the biggest applications of blockchain. These smart contracts mean that a contract is made between 2 parties without needing any intermediary.

What is the basics of blockchain? ›

Blockchain is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. asset can be tangible (a house, car, cash, land) or intangible (intellectual property, patents, copyrights, branding).

Why is blockchain failing? ›

Insufficient Budget and Resources. While blockchain can potentially reduce operational costs, the initial implementation can be quite resource-intensive, as the failed We. trade project proved. A lack of adequate budget and resources—both human and computational—can be a significant roadblock.

Why are people against blockchain? ›

Environmental Concerns. Another major source of criticism is the environmental impact of NFTs minted on proof-of-work blockchains like Ethereum. The computational power required for crypto mining and transactions is energy intensive. To many, this seems extraordinarily wasteful.

What is the biggest problem in blockchain? ›

Scalability Issues

One of the key technological challenges of blockchain is the network's technical scalability, which might lack of interest adoption, especially for public blockchains. The ability to process thousands of transactions per second is a hallmark of legacy transaction networks.

What type of transaction cannot be stored in blocks on a blockchain? ›

A transaction that assigns copyright ownership to a song cannot be stored in blocks on block chain.

How does blockchain work step by step? ›

An authorized participant inputs a transaction, which must be authenticated by the technology. That action creates a block that represents that specific transaction or data. The block is sent to every computer node in the network. Authorized nodes validate transactions and add the block to the existing blockchain.

Is Bitcoin a blockchain? ›

Bitcoin. The key thing to understand is that Bitcoin uses blockchain as a means to transparently record a ledger of payments or other transactions between parties.

What are the three words for blockchain? ›

Blockchain is a combination of three leading technologies:
  • Cryptographic keys.
  • A peer-to-peer network containing a shared ledger.
  • A means of computing, to store the transactions and records of the network.
Oct 18, 2023

How to learn blockchain? ›

A career in blockchain technology may begin after completing a bachelor's or master's degree program in computer science, data science, or other relevant field. A coding, data science, or financial technology boot camp can also prepare learners for the field.

What is the blockchain in simple terms? ›

A blockchain is a decentralized, distributed and public digital ledger that is used to record transactions across many computers so that the record cannot be altered retroactively without the alteration of all subsequent blocks and the consensus of the network.

What are the three points of blockchain? ›

At its core, blockchain is structured around three pillars: decentralization, scalability, and immutability.
  • Decentralization. In a decentralized system there is no central authority. ...
  • Scalability. Scalability is essential for any technology that plans to be widely adopted. ...
  • Immutability.
Apr 21, 2022

What are the three primary components of a block in a blockchain? ›

A block comprises three main parts: the header, the transaction data, and the nonce. The header contains metadata such as the block's hash, a timestamp, and the previous block's hash. This metadata is crucial for linking blocks together securely.

What are the three main blockchain protocols? ›

However, five major protocols are most significant, so an overview of the main protocols that are often used in Blockchain development services is detailed below.
  • Hyperledger. ...
  • Multichain. ...
  • Enterprise Ethereum. ...
  • Corda. ...
  • Quorum.

What are the three main properties of blockchain technology? ›

There are three key components to blockchain technology: The distributed ledger, the consensus mechanism, and the smart contracts. The distributed ledger is a database that is spread across a network of computers. The consensus mechanism is what allows the network of computers to agree on the state of the ledger.

Top Articles
8 Easy Store Credit Cards
The Best and Worst Performing UK Funds of 2023
Dainty Rascal Io
Top 11 Best Bloxburg House Ideas in Roblox - NeuralGamer
CLI Book 3: Cisco Secure Firewall ASA VPN CLI Configuration Guide, 9.22 - General VPN Parameters [Cisco Secure Firewall ASA]
Blairsville Online Yard Sale
Samsung 9C8
Achivr Visb Verizon
Top Golf 3000 Clubs
Autozone Locations Near Me
Gina's Pizza Port Charlotte Fl
Unit 1 Lesson 5 Practice Problems Answer Key
What is the difference between a T-bill and a T note?
Hijab Hookup Trendy
Hca Florida Middleburg Emergency Reviews
Wicked Local Plymouth Police Log 2022
8664751911
Publix Super Market At Rainbow Square Shopping Center Dunnellon Photos
Aol News Weather Entertainment Local Lifestyle
Brbl Barber Shop
F45 Training O'fallon Il Photos
Hctc Speed Test
Kuttymovies. Com
The Procurement Acronyms And Abbreviations That You Need To Know Short Forms Used In Procurement
Things to do in Pearl City: Honolulu, HI Travel Guide by 10Best
Play It Again Sports Forsyth Photos
Dailymotion
Kiddie Jungle Parma
100 Million Naira In Dollars
Citibank Branch Locations In Orlando Florida
Japanese Pokémon Cards vs English Pokémon Cards
Cars And Trucks Facebook
Goodwill Thrift Store & Donation Center Marietta Photos
Atlantic Broadband Email Login Pronto
State Legislatures Icivics Answer Key
Myql Loan Login
Cheetah Pitbull For Sale
Gifford Christmas Craft Show 2022
Aurora Il Back Pages
Best Restaurants West Bend
Walmart Car Service Near Me
Hovia reveals top 4 feel-good wallpaper trends for 2024
6576771660
National Weather Service Richmond Va
Breaking down the Stafford trade
VerTRIO Comfort MHR 1800 - 3 Standen Elektrische Kachel - Hoog Capaciteit Carbon... | bol
New Zero Turn Mowers For Sale Near Me
Tyrone Unblocked Games Bitlife
How To Win The Race In Sneaky Sasquatch
28 Mm Zwart Spaanplaat Gemelamineerd (U999 ST9 Matte | RAL9005) Op Maat | Zagen Op Mm + ABS Kantenband
Bob Wright Yukon Accident
Wayward Carbuncle Location
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 6334

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.