limiting the number of new connections a node can
make.
Enabling double-spending without the control of
the significant portion of the network, the Finney
attack exploits the vulnerability of unconfirmed
transactions in Bitcoin. The advantages of this attack
make the attack a relatively low-cost attack compared
to others. However, the Finney attack is limited in the
scope. Its effectiveness is highly dependent on the
ability to pre-mine blocks and control transaction
timing, making it less reliable. As a result, it is less
likely to be widely effective in the network which
owns high transaction volume or fast confirmation
times. Additionally, requiring multiple confirmations
for transactions effectively nullifies this attack, as it
is only viable for transactions that are accepted after
zero confirmations.
Combining aspects of the Finney attack with a
race attack, the Vector76 attack is a more
sophisticated method of double-spending. Its strength
lies in its ability to exploit the timing differences
between transaction broadcasting and block
propagation. By broadcasting a transaction to a
portion of the network while mining an alternate
block that excludes this transaction, the attacker can
reverse the original transaction when the alternate
block is propagated. Nevertheless, because the
Vector76 attack requires precise control over the
transaction timing and the block propagation which
makes it difficult to execute consistently, the
complexity of the Vector76 attack is the weakness of
itself. Furthermore, improvements in the network
synchronization can significantly reduce the chances
of success. Solutions such as reducing block
propagation delay and requiring multiple
confirmations reduce the effectiveness of this attack.
4 CONCLUSIONS
This research focused on analyzing three common
Bitcoin attack methods: Sybil, Finney, and Vector76.
Through a comprehensive approach, this study
evaluated these attack vectors by examining their
underlying mechanisms, success rates, and associated
defensive measures. The analysis combined
theoretical models with practical simulations to
reveal the operational characteristics and real-world
impacts of these attacks on blockchain networks. The
experiments demonstrated both the vulnerabilities
these attacks exploit and the limitations of current
defense strategies. Moving forward, network
synchronization will be a key area of research to
enhance blockchain security. Future studies will
emphasize improving block propagation speeds and
developing real-time detection systems to more
effectively counter these attack vectors. At the same
time, efforts will focus on maintaining scalability and
system performance, ensuring that increased security
does not compromise the efficiency or robustness of
blockchain networks. This research underscores the
need for continuous advancements in both attack
mitigation and system optimization to keep pace with
evolving threats in the cryptocurrency ecosystem.
REFERENCES
Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.
A., & Felten, E.W. 2015. Sok: Research perspectives
and challenges for bitcoin and cryptocurrencies. In
IEEE symposium on security and privacy, 104-121.
Decker, C., & Wattenhofer, R. 2014. Bitcoin transaction
malleability and MtGox. In Computer Security-
ESORICS European Symposium on Research in
Computer Security, 313-326.
Douceur, J.R. 2002. The sybil attack. In International
workshop on peer-to-peer systems, 251-260.
Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V.,
Ritzdorf, H., & Capkun, S. 2016. On the security and
performance of proof of work blockchains. In
Proceedings of the ACM SIGSAC conference on
computer and communications security, 3-16.
Hamdi, A., Fourati, L., & Ayed, S. 2024. Vulnerabilities
and attacks assessments in blockchain 1.0, 2.0 and 3.0:
tools, analysis and countermeasures. International
Journal of Information Security, 23(2), 713-757.
Heilman, E., Kendler, A., Zohar, A., & Goldberg, S. 2015.
Eclipse attacks on Bitcoin’s peer-to-peer network. In
USENIX security symposium, 129-144.
Karame, G.O., Androulaki, E., & Capkun, S. 2012. Double-
spending fast payments in bitcoin. In Proceedings of the
ACM conference on Computer and communications
security, 906-917.
Nakamoto, S. 2008. Bitcoin: A peer-to-peer electronic cash
system. Satoshi Nakamoto.
Rosenfeld, M. 2014. Analysis of hashrate-based double
spending. arXiv preprint:1402.2009.
Wen, Y., Lu, F., Liu, Y., & Huang, X. 2021. Attacks and
countermeasures on blockchains: A survey from
layering perspective. Computer Networks, 191, 107978.