{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T22:18:10Z","timestamp":1771366690106,"version":"3.50.1"},"reference-count":148,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"AEI\/FEDER, UE","award":["RTI2018-102112-B-I00"],"award-info":[{"award-number":["RTI2018-102112-B-I00"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3204387","type":"journal-article","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:05:37Z","timestamp":1662408337000},"page":"94924-94962","source":"Crossref","is-referenced-by-count":12,"title":["SoK: Network-Level Attacks on the Bitcoin P2P Network"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6697-5431","authenticated-orcid":false,"given":"Federico","family":"Franzoni","sequence":"first","affiliation":[{"name":"QPQ, Zug, Switzerland"}]},{"given":"Vanesa","family":"Daza","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Technologies, Pompeu Fabra University, Barcelona, Spain"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Total Cryptocurrency Market Cap","year":"2021"},{"key":"ref2","volume-title":"Bitcoin Price Today, Market Cap and Chart","year":"2021"},{"key":"ref3","volume-title":"Bitnodes Global Bitcoin Nodes Distribution","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.08.029"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMPTELIX.2017.8003959"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2975999"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107978"},{"issue":"1","key":"ref11","first-page":"1","article-title":"A systematic literature review on the security and privacy of the blockchain and cryptocurrency","volume":"2","author":"Hassan","year":"2020","journal-title":"OIC-CERT J. Cyber Secur."},{"key":"ref12","first-page":"10","article-title":"Security concerns and issues for bitcoin","author":"Vyas","year":"2014","journal-title":"Int. J. Comput. Appl."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2019.8697996"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"ref15","volume-title":"Revisiting Network-Level Attacks on Blockchain Network","author":"Cao","year":"2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2020\/v13i07\/149691"},{"key":"ref17","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008","journal-title":"Decentralized Bus. Rev."},{"key":"ref18","volume-title":"Clients","author":"Wiki","year":"2022"},{"key":"ref19","volume-title":"Fibre Fast Internet BItcoin Relay Engine","year":"2019"},{"key":"ref20","volume-title":"Falcon\u2014A Fast BItcoin Backbone","year":"2016"},{"key":"ref21","volume-title":"Tor Project Anonymity Online","year":"2021"},{"key":"ref22","volume-title":"I2p Anonymous Network","year":"2022"},{"key":"ref23","volume-title":"The Number of Bitcoin Network Nodes Has Reached an All-Time High","year":"2022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2663"},{"key":"ref25","article-title":"Towards better understanding of bitcoin unreachable peers","author":"Wang","year":"2017","journal-title":"arXiv:1709.06837"},{"key":"ref26","volume-title":"Discovering Bitcoin\u2019s Public Topology and Influential Nodes","author":"Miller","year":"2015"},{"key":"ref27","article-title":"TxProbe: Discovering bitcoin\u2019s network topology using orphan transactions","author":"Delgado-Segura","year":"2018","journal-title":"arXiv:1812.00942"},{"key":"ref28","volume-title":"Bitcoin Wiki Protocol Documentation","year":"2019"},{"key":"ref29","volume-title":"Mastering Bitcoin: Unlocking Digital Cryptocurrencies","author":"Antonopoulos","year":"2014"},{"key":"ref30","volume-title":"Bitcoin Core Integration\/Staging Tree","year":"2022"},{"key":"ref31","volume-title":"Pr 15759: Add 2 Outbound Block-Relay-Only Connections","author":"Daftuar","year":"2019"},{"key":"ref32","volume-title":"Pr 17428: Try to Preserve Outbound Block-Relay-Only Connections During Restart","author":"Stepanov","year":"2019"},{"key":"ref33","volume-title":"Pr 6374: Connection Slot Exhaustion Dos Mitigation","author":"Strateman","year":"2015"},{"key":"ref34","volume-title":"Pr 18991: Cache Responses to Getaddr to Prevent Topology Leaks","author":"Naumenko","year":"2020"},{"key":"ref35","volume-title":"Pr 14929: Allow Connections From Misbehavior Banned Peers","author":"Maxwell","year":"2019"},{"key":"ref36","volume-title":"Poisson Distribution","year":"2020"},{"key":"ref37","volume-title":"Pr 7125: Replace Global Trickle Node With Random Delays","author":"Wuille","year":"2015"},{"key":"ref38","volume-title":"Bip141: Segregated Witness (Consensus Layer)","author":"Lombrozo","year":"2015"},{"key":"ref39","volume-title":"Pr 7910: Segregated Witness","author":"Wuille","year":"2016"},{"key":"ref40","volume-title":"Bip130: Sendheaders Message","author":"Daftuar","year":"2016"},{"key":"ref41","volume-title":"Pr 6494: Allow Block Announcements With Headers","author":"Daftuar","year":"2015"},{"key":"ref42","volume-title":"Bip152: Compact Block Relay","author":"Corallo","year":"2016"},{"key":"ref43","volume-title":"Pr 8068: Compact blocks","author":"Corallo","year":"2016"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751476"},{"key":"ref45","first-page":"1364","article-title":"Deanonymization in the bitcoin P2P network","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Fanti"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.002"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_18"},{"key":"ref48","volume-title":"Bip62: Dealing With Malleability","author":"Wuille","year":"2014"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_1"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00195"},{"key":"ref51","volume-title":"Bip151: Peer-to-Peer Communication Encryption","author":"Schnelli","year":"2016"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.1996.493637"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6528"},{"key":"ref54","first-page":"1","article-title":"DNS and BIND security issues","volume-title":"Proc. Usenix Secur. Symp.","author":"Vixie"},{"key":"ref55","volume-title":"Issue 19714: Enable DNSSEC on All Bitcoin DNS Seed Domain Names","year":"2020"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1654"},{"key":"ref57","first-page":"12","article-title":"Stealing the internet: An internet-scale man in the middle attack","volume-title":"Proc. NANOG","author":"Pilosov"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00119"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.15"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2852480"},{"key":"ref64","volume-title":"Pr 23306: Make Addrman Support Multiple Ports Per IP","author":"Wuille","year":"2021"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01201-7"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"ref68","volume-title":"Exploiting Bitcoin\u2019s Topology for Double-Spend Attacks","author":"Lei","year":"2015"},{"key":"ref69","volume-title":"Guessing Bitcoin\u2019s P2P Connections","author":"Nick","year":"2015"},{"key":"ref70","article-title":"Anonymity properties of the bitcoin P2P network","author":"Fanti","year":"2017","journal-title":"arXiv:1703.08761"},{"key":"ref71","volume-title":"Pr 5860: Reduce Fingerprinting Through Timestamps in \u2019Addr\u2019 Messages","author":"Wuille","year":"2015"},{"key":"ref72","volume-title":"Pr 8661: Do Not Set an Addr Time Penalty When a Peer Advertises Itself","author":"Maxwell","year":"2016"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58820-8_9"},{"key":"ref75","volume-title":"Pr 14626: Select Orphan Transaction Uniformly for Eviction","author":"Wuille","year":"2018"},{"key":"ref76","volume-title":"Pr 14897: Randomize Getdata(tx) Request Order and Introduce Bias Toward Outbound","author":"Naumenko","year":"2019"},{"key":"ref77","volume-title":"Pr 19988: Overhaul Transaction Request Logic","author":"Wuille","year":"2020"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"ref79","first-page":"129","article-title":"Eclipse attacks on Bitcoin\u2019s peer-to-peer network","volume-title":"Proc. 24th USENIX Secur. Symp. (USENIX Secur.)","author":"Heilman"},{"key":"ref80","volume-title":"Pr 5941: Countermeasures Against Eclipse Attacks","author":"Wuille","year":"2015"},{"key":"ref81","volume-title":"Pr 8282: Feeler Connections to Increase Online Addrs in the Tried Table","author":"Heilman","year":"2016"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"ref83","volume-title":"Pr 16702: Supplying and Using Asmap to Improve IP Bucketing in Addrman","author":"Naumenko","year":"2019"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140490"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813655"},{"key":"ref86","volume-title":"Timejacking & Bitcoin","author":"Boverman","year":"2011"},{"key":"ref87","volume-title":"Issue 279: Time Adjustment Limit Should be Reduced to 40","year":"2011"},{"key":"ref88","volume-title":"Pr 7573: Add Maxtimeadjustment Command Line Option","year":"2016"},{"key":"ref89","volume-title":"Pr 23631: Don\u2019t Use Timestamps From Inbound Peers for Adjusted Time","author":"Zumsande","year":"2021"},{"key":"ref90","volume-title":"Pr 7079: Prevent Peer Flooding INV Request Queue (Redux) (Redux)","author":"Maxwell","year":"2015"},{"key":"ref91","volume-title":"Pr 7832: Reduce Block Timeout to 10 Minutes","year":"2016"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00010"},{"key":"ref93","volume-title":"Pr 22147: Protect Last Outbound HB Compact Block Peer","author":"Daftuar","year":"2021"},{"key":"ref94","volume-title":"Issue 2757: Fingerprint Via Weak-Chain Block Submission","author":"Garzig","year":"2013"},{"key":"ref95","volume-title":"Pr 2910: Don\u2019t Store or Send Blocks Forked Before Last Checkpoint","author":"Holman","year":"2014"},{"key":"ref96","volume-title":"Pr 5820: Better Fingerprinting Protection for Non-Main-Chain Getdatas","author":"Wuille","year":"2015"},{"key":"ref97","volume-title":"Pr 5918: Use Equivalent Pow for Non-Main-Chain Requests","author":"Wuille","year":"2015"},{"key":"ref98","volume-title":"Pr 11113: Ignore Getheaders Requests for Very Old Side Blocks","author":"Posen","year":"2017"},{"key":"ref99","volume-title":"Pr 5442: Ignore Getaddr Messages on Outbound Connections","author":"Pustogarov","year":"2014"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02641-7_13"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"ref102","volume-title":"CVE-2018-17145: Bitcoin Inventory Out-of-Memory Denial-of-Service Attack","author":"Fuller","year":"2018"},{"key":"ref103","volume-title":"CVE-2018-17144 Full Disclosure","author":"Core","year":"2022"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_1"},{"key":"ref105","volume-title":"Bitcoin Under Denial of Service Attack","author":"Huffman","year":"2015"},{"key":"ref106","volume-title":"80,000 Unconfirmed Transactions Right Now","year":"2015"},{"key":"ref107","volume-title":"Wikileaks is Now a Target in the Massive Spam Attack on Bitcoin","author":"Pearson","year":"2015"},{"key":"ref108","volume-title":"14 Hours Without Confirmation","year":"2015"},{"key":"ref109","volume-title":"The Mystery Behind the Biggest Bitcoin Transaction Ever Made","author":"Pearson","year":"2015"},{"key":"ref110","volume-title":"Pr 6793: Bump Minrelaytxfee Default","year":"2015"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58820-8_6"},{"key":"ref112","volume-title":"With a 1GB Mempool, 1000 Nodes are Now Down (Compared to Yesterday)","year":"2015"},{"key":"ref113","volume-title":"700 Million Stuck in 115,000 Unconfirmed Bitcoin Transactions","author":"Memoria","year":"2017"},{"key":"ref114","volume-title":"New Transaction Malleability Attack Wave? Another Stresstest","year":"2015"},{"key":"ref115","volume-title":"Transactions Per Second","author":"Visuals","year":"2021"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3201584"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102971"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/2732196"},{"key":"ref120","volume-title":"Bitcoin Average Confirmation Time","year":"2021"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"ref122","volume-title":"Pr 3883: Relay and Alert User to Double Spends","author":"Harding","year":"2014"},{"key":"ref123","volume-title":"Issue 4550: Reverted Double Spend Relaying (for Now)","author":"Garzig","year":"2014"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688717"},{"key":"ref125","volume-title":"Re: Best Practice for Fast Transaction Acceptance\u2014How High is the Risk","author":"Finney","year":"2011"},{"key":"ref126","volume-title":"Re: Fake Bitcoins","year":"2011"},{"key":"ref127","volume-title":"Vector76 Double Spend Attack","year":"2014"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.44"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2921566"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_8"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"ref132","volume-title":"Black OPS of TCP\/IP","author":"Kaminsky","year":"2011"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/2254756.2254782"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_30"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_9"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/3084459"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3224424"},{"key":"ref138","volume-title":"Bip156: Dandelion Privacy Enhancing Routing","author":"Denby","year":"2017"},{"key":"ref139","volume-title":"What is the Tradeoff Between Privacy and Implementation Complexity of Dandelion (BIP156)","year":"2022"},{"key":"ref140","volume-title":"Pr 4723: Add Rotation of Outbound Connections","author":"Pustogarov","year":"2014"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_7"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.13"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_30"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv6mtff5.9"},{"key":"ref146","volume-title":"Theoretical bitcoin attacks with less than half of the computational power (draft)","author":"Bahack","year":"2013"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69084-1_25"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_16"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09877811.pdf?arnumber=9877811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T06:26:58Z","timestamp":1709360818000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9877811\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":148,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3204387","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}