GithubHelp home page GithubHelp logo

Comments (4)

akshayeshenoi avatar akshayeshenoi commented on July 3, 2024

In this case, when RAP was enabled in l3-amzn.txt, the attack lasted longer - 260 days vs 219 days when RAP was disabled in l3-amzn copy.txt.

This shows that the RAP defense can help delay the attack success, but not completely prevent the attack (Section 5.3: How (in)effective is RAP?).

I looked at the code and found that if shadow_outbound_peer_cnt >= m_max_outbound the attack is successful, but now after enabling RAP and disabling all countermeasures shadow_outbound_peer_cnt is still equal to m_max_outbound.

shadow_outbound_peer_cnt will be equal to m_max_outbound if the attack is successful. This can happen even if RAP is enabled.

In your case, I can see that the only difference between the two runs was that RAP was enabled in one and not the other. You can toggle the other countermeasures as well in cfg.py (cfg.CounterMeasures).

Enabling them may help delay the attack success even further. If the emulation exceeds 381 days, we consider the attack to fail.

from bitcoin-emulator.

oisonan1999 avatar oisonan1999 commented on July 3, 2024

But when I turned on the flags in the cfg.py file, I noticed that the simulation time only lasted 30 days. In case of turning off RAP, the number of ShadowPeerCount is still smaller than OutboundPeerCount and AttackSucces: True. Why is that?. Can you help me explain? Thank you so much
image
image

from bitcoin-emulator.

akshayeshenoi avatar akshayeshenoi commented on July 3, 2024

I see, there seems to be a bug here. Countermeasure 3 increases the number of outgoing connections to make it harder for the adversary to occupy all connections. Specifically, we increase only the outbound block relay connections m_max_outbound_block_relay.

Unfortunately, m_max_outbound—which is the sum of full relay plus block relay connections—wasn't reflecting the increase causing the emulation to end prematurely.

It's a simple fix, I will push it shortly. Thank you for bringing it up.

from bitcoin-emulator.

akshayeshenoi avatar akshayeshenoi commented on July 3, 2024

FYI, I also noticed that you tweaked the victim_age param to 20 days. Note that this may make it easier for the attacker to succeed because the victim's database may have fewer tried connections.

from bitcoin-emulator.

Related Issues (6)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.