메뉴 건너뛰기




Volumn 8438, Issue , 2014, Pages 72-86

Game-theoretic analysis of DDoS attacks against bitcoin mining pools

Author keywords

Bitcoin; DDoS; Game theory; Internet; Security

Indexed keywords

COMPUTATION THEORY; CRYPTOGRAPHY; ECONOMICS; GAME THEORY; INTERNET; LAKES; MINERS; NETWORK SECURITY; SECURITY OF DATA;

EID: 84910648996     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-44774-1_6     Document Type: Conference Paper
Times cited : (176)

References (26)
  • 2
    • 84929273746 scopus 로고
    • Untraceable electronic cash
    • Goldwasser, S. (ed.),,. Springer, Heidelberg
    • Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319-327. Springer, Heidelberg (1990).
    • (1990) CRYPTO 1988. LNCS , vol.403 , pp. 319-327
    • Chaum, D.1    Fiat, A.2    Naor, M.3
  • 3
    • 84865819620 scopus 로고    scopus 로고
    • Bitter to better-how to make Bitcoin a better currency
    • Keromytis, A.D. (ed.),,. Springer, Heidelberg
    • Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better-how to make Bitcoin a better currency. In: Keromytis, A. D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399-414. Springer, Heidelberg (2012).
    • (2012) FC 2012. LNCS , vol.7397 , pp. 399-414
    • Barber, S.1    Boyen, X.2    Shi, E.3    Uzun, E.4
  • 4
    • 0000544475 scopus 로고
    • Currency competition, network externalities and switching costs: Towards an alternative view of optimum currency areas
    • Dowd, K., Greenaway, D.: Currency competition, network externalities and switching costs: towards an alternative view of optimum currency areas. Econ. J. 103(420), 1180-1189 (1993).
    • (1993) Econ. J , vol.103 , Issue.420 , pp. 1180-1189
    • Dowd, K.1    Greenaway, D.2
  • 6
    • 84910624054 scopus 로고    scopus 로고
    • Empirical analysis of Denial-of-Service attacks in the Bitcoin ecosystem
    • Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.),,. Springer, Heidelberg
    • Vasek, M., Thornton, M., Moore, T.: Empirical analysis of Denial-of-Service attacks in the Bitcoin ecosystem. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 57-71. Springer, Heidelberg (2014).
    • (2014) FC 2014 Workshops. LNCS , vol.8438 , pp. 57-71
    • Vasek, M.1    Thornton, M.2    Moore, T.3
  • 7
    • 84883269768 scopus 로고    scopus 로고
    • Beware the middleman: Empirical analysis of Bitcoinexchange risk
    • Sadeghi, A.-R. (ed.),,. Springer, Heidelberg
    • Moore, T., Christin, N.: Beware the middleman: empirical analysis of Bitcoinexchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25-33. Springer, Heidelberg (2013).
    • (2013) FC 2013. LNCS , vol.7859 , pp. 25-33
    • Moore, T.1    Christin, N.2
  • 8
    • 70350389209 scopus 로고    scopus 로고
    • Blue versus red: Towards a model of distributed security attacks
    • Dingledine, R., Golle, P. (eds.),,. Springer, Heidelberg
    • Fultz, N., Grossklags, J.: Blue versus red: towards a model of distributed security attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167-183. Springer, Heidelberg (2009).
    • (2009) FC 2009. LNCS , vol.5628 , pp. 167-183
    • Fultz, N.1    Grossklags, J.2
  • 10
    • 77955321664 scopus 로고    scopus 로고
    • When information improves information security
    • Sion, R. (ed.),,. Springer, Heidelberg
    • Grossklags, J., Johnson, B., Christin, N.: When information improves information security. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 416-423. Springer, Heidelberg (2010).
    • (2010) FC 2010. LNCS , vol.6052 , pp. 416-423
    • Grossklags, J.1    Johnson, B.2    Christin, N.3
  • 11
    • 33750482906 scopus 로고    scopus 로고
    • System reliability and free riding
    • Camp, L., Lewis, S. (eds.),,. Kluwer, Dordrecht
    • Varian, H.: System reliability and free riding. In: Camp, L., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol. 12, pp. 1-15. Kluwer, Dordrecht (2004).
    • (2004) Economics of Information Security. Advances in Information Security , vol.12 , pp. 1-15
    • Varian, H.1
  • 12
    • 34248574143 scopus 로고    scopus 로고
    • Asymmetric conflict: Weakest link against best shot
    • Clark, D., Konrad, K.: Asymmetric conflict: weakest link against best shot. J. Conflict Resolut. 51(3), 457-469 (2007).
    • (2007) J. Conflict Resolut , vol.51 , Issue.3 , pp. 457-469
    • Clark, D.1    Konrad, K.2
  • 13
    • 66549093519 scopus 로고    scopus 로고
    • Decision-theoretic and game-theoretic approaches to IT security investment
    • Cavusoglu, H., Raghunathan, S., Yue, W.: Decision-theoretic and game-theoretic approaches to IT security investment. J. Manag. Inf. Syst. 25(2), 281-304 (2008).
    • (2008) J. Manag. Inf. Syst , vol.25 , Issue.2 , pp. 281-304
    • Cavusoglu, H.1    Raghunathan, S.2    Yue, W.3
  • 15
    • 35248853499 scopus 로고    scopus 로고
    • How much security is enough to stop a thief?
    • Wright, R.N. (ed.),,. Springer, Heidelberg
    • Schechter, S. E., Smith, M. D.: How much security is enough to stop a thief? In: Wright, R. N. (ed.) FC 2003. LNCS, vol. 2742, pp. 122-137. Springer, Heidelberg (2003).
    • (2003) FC 2003. LNCS , vol.2742 , pp. 122-137
    • Schechter, S.E.1    Smith, M.D.2
  • 16
    • 0000787258 scopus 로고
    • Crime and punishment: An economic approach
    • Becker, G.: Crime and punishment: an economic approach. J. Polit. Econ. 76(2), 169-217 (1968).
    • (1968) J. Polit. Econ , vol.76 , Issue.2 , pp. 169-217
    • Becker, G.1
  • 17
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • Anderson, R., Moore, T.: The economics of information security. Science 314(5799), 610-613 (2006).
    • (2006) Science , vol.314 , Issue.5799 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 18
    • 84910012094 scopus 로고    scopus 로고
    • Technical report CRYSYS-TR-2012-11-15, CrySyS Lab, Budapest University of Technology and Economics
    • Laszka, A., Felegyhazi, M., Buttyán, L.: A survey of interdependent security games. Technical report CRYSYS-TR-2012-11-15, CrySyS Lab, Budapest University of Technology and Economics (2012).
    • (2012) A survey of interdependent security games
    • Laszka, A.1    Felegyhazi, M.2    Buttyán, L.3
  • 20
    • 16644384919 scopus 로고    scopus 로고
    • Incentive-based modeling and inference of attacker intent, objectives, and strategies
    • Liu, P., Zang, W., Yu, M.: Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur. 8(1), 78-118 (2005).
    • (2005) ACM Trans. Inf. Syst. Secur , vol.8 , Issue.1 , pp. 78-118
    • Liu, P.1    Zang, W.2    Yu, M.3
  • 21


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.