Research Article
Detectable, Traceable, and Manageable Blockchain Technologies BHE: An Attack Scheme against Bitcoin P2P Network
Algorithm 1
Modify the IPs in the addr message to malicious IPs to prevent the victim node from learning a good IP.
| Input: S=[pkt1…]: hijacked network packets. M: the set of malicious IPs. dp: the ip of victim node | | 1: for pkt ∈ S do | | 2: if pkt.ipDst=dp and pkt.ipSrc not in M and pkt.payload=Addr then | | 3: for index in len(pkt.payload) do | | 4: pkt.payload[index].ip = M[index] | | 5: end for | | 6: end if | | 7: send(pkt) | | 8: end for |
|