3 RESULT AND DISCUSSION
This article reveals potential double-spending
vulnerabilities in the Bitcoin system by analyzing the
Vector76 attack and its key technology, selfish
mining. The Vector76 attack exploits the pre-mining
feature of the Bitcoin network, where attackers
secretly mine and broadcast blocks at appropriate
times to achieve double spending for the same
Bitcoin. The countermeasures summarized in the
research include security strategies and monitoring
techniques for double-spending attacks, as well as
detection and punishment mechanisms for selfish
mining attacks. These strategies theoretically provide
effective means of defending against Vector76 attack.
However, it may encounter some challenges in
practical applications.
Firstly, the effectiveness of security strategies
depends on users' correct understanding and
application of transaction confirmation numbers.
Users need to carefully choose the appropriate
number of confirmations to ensure both the security
and efficiency of transactions. This is a challenge for
some users. Secondly, although monitoring
technologies can increase the likelihood of detecting
double-spending attacks, they may increase the
communication burden on the network, especially
during high transaction volumes. In addition, the
effectiveness of monitoring technologies is also
limited by the degree of cooperation among network
nodes and the quality of implementation of
monitoring systems.
The concept of the truth state provides a method
for detecting and resisting attackers' secret mining
behavior as a countermeasure against selfish mining
attacks. However, this method requires an in-depth
analysis of each block in the blockchain, which may
increase the complexity and computational burden of
the system. The infiltration detection and punishment
mechanism punishes attackers by adjusting the profit
distribution of miners, but it still has shortcomings.
Firstly, this method assumes that all mining pools are
public, which may not apply to closed mining pools
that do not allow external miners to join. Secondly, if
attackers adopt anonymization strategies to hide the
identity of their infiltrating miners, the difficulty of
detecting the attack will increase. In addition, the
effectiveness of this method also depends on the
timely identification and response of mining pool
managers to attack behaviors. In addition to the above
issues, evaluating the security of Bitcoin protocol
variants such as Bitcoin- Next Generation (NG) and
Ethereum in the face of similar attacks is also an
important direction. Considering that different
cryptocurrencies may have different mining
mechanisms and characteristics; future work can
evaluate and adjust this method to make it applicable
to a wider range of cryptocurrency ecosystems. It is
also important to quantify the security of the above
measures, as this facilitates users and merchants to
more accurately evaluate the security of transactions.
In addition, the forms of the double-spending attack
and the selfish mining attack have become more
complex and diverse with the development of
blockchain technology. Therefore, this study also
suggests conducting more in-depth research on the
security model of Bitcoin, especially when
considering network latency and the diversity of
attacker strategies.
4 CONCLUSIONS
This study offers a comprehensive examination of the
Vector76 attack, a significant double spending threat
within the Bitcoin network, alongside its underlying
technology, selfish mining. The findings indicate that,
despite the formidable challenges posed by this
attack, strategic countermeasures can be effectively
employed to mitigate its impact. To counter double
spending attacks, implementing robust security
strategies is essential. This includes establishing
requirements for the number of transaction
confirmations and developing customized methods
tailored for lightweight clients. Furthermore,
integrating monitoring technologies, such as
ENHOBS, enhances the system's vigilance against
suspicious transactions, thereby providing users with
an additional layer of protection. The selfish mining
attack serves as a critical enabler of the Vector76
attack. In addressing these threats, the detection
methods and punitive measures outlined in this study
present proactive approaches for identifying selfish
mining activities and ensuring a fair distribution of
mining rewards. In conclusion, this research
underscores the necessity of continuously evaluating
and enhancing security measures within the Bitcoin
ecosystem. Future efforts should prioritize the
practical implementation of these strategies,
optimization across various blockchain platforms,
and the development of innovative solutions to
address the evolving landscape of cryptocurrency
security.