Research Article

Detectable, Traceable, and Manageable Blockchain Technologies BHE: An Attack Scheme against Bitcoin P2P Network

Algorithm 1

Modify the IPs in the addr message to malicious IPs to prevent the victim node from learning a good IP.
Input: S=[pkt1…]: hijacked network packets. M: the set of malicious IPs. dp: the ip of victim node
1: for pkt ∈ S do
2:  if pkt.ipDst=dp and pkt.ipSrc not in M and pkt.payload=Addr then
3:   for index in len(pkt.payload) do
4:   pkt.payload[index].ip = M[index]
5:   end for
6:  end if
7:  send(pkt)
8: end for