NON-TAYLOR DIFFERENTIAL GAMING PATTERN ECLIPSE ATTACK ON BLOCKCHAIN NODE
Main Article Content
Abstract
Relevance. Information technologies of the 21st century have profoundly reshaped the global economy. As financial processes become increasingly digitalized, the role of traditional banking institutions as intermediaries is gradually diminishing. In this evolving landscape, blockchain technologies and cryptocurrencies have emerged as revolutionary tools, offering decentralized and secure alternatives to conventional financial systems. Cryptocurrencies, built on blockchain foundations, combine high reliability with robust protection against cyberattacks. However, both individual hackers and organized cybercriminal groups continue to target blockchain infrastructures – focusing not only on isolated nodes but also on entire networks and cryptocurrency wallets. Ensuring the resilience of blockchain technologies against such threats is therefore critical to safeguarding users’ digital assets. Eclipse Attacks involve isolating a node to gain control over its information flows, posing a serious threat to network integrity. The object of research. This study introduces a differential game-theoretic model of Eclipse Attacks on blockchain nodes, formulated within a Markov chain framework. The subject of the research. The proposed model employs non-Taylor differential transformations developed by Academician G. Pukhov, enabling a more flexible analytical representation of attack dynamics. The purpose of this paper. The framework captures the strategic interaction between attacker and defender, offering a basis for assessing node security under adversarial conditions. Research results. As a result, the study provides a practical analytical toolkit for developing effective countermeasures against Eclipse Attacks and contributes to the broader discourse on cybersecurity in decentralized systems.
Article Details
References
(2024), The Global Risks Report 2024, World Economic Forum, СН-1223, Cologny/Geneva, Switzerland, 124 p., available at: https://www.weforum.org/publications/global-risks-report-2024
Essien, N.P. and Okon, I.U. (2024), “Economic implications of cryptocurrency adoption: challenges and prospects”,
Asia-Africa Journal of Academic Research and Review, vol. 4, no. 1, pp. 100–118, available at: https://www.journals.iapaar.com/index.php/AAJARR/article/view/189
(2024), Report: $2.2 billion stolen from crypto platforms in 2024, but hacked volumes stagnate toward year-end as DPRK slows activity post-July, Chainalysis, available at: https://www.chainalysis.com/blog/crypto-hacking-stolen-funds-2025
Barj, S. and Youjil, A. (2024), “Blockchain and cryptocurrency security from a new layered perspective and a novel MITRE ATT&CK based approach for understanding cyberattacks and mitigating their impacts”, International Journal of Engineering Trends and Technology, vol. 72, no. 4, pp. 1–14, doi: https://doi.org/10.14445/22315381/IJETT-V72I4P101
Hassija, V., Zeadally, S., Jain, I., Tahiliani, A., Chamola, V. and Gupta, S. (2021), “Framework for determining the suitability of blockchain: criteria and issues to consider”, Transactions on Emerging Telecommunications Technologies, vol. 32, is. 10, e4334, doi: https://doi.org/10.1002/ett.4334
Aggarwal, S. and Kumar, N. (2021), “Attacks on blockchain”, Advances in Computers, vol. 121, pp. 399–410, doi: https://doi.org/10.1016/bs.adcom.2020.08.020
Alachkar, K. and Gaastra, D. (2018), “Blockchain-based Sybil attack mitigation: a case study of the I2P network”, Semantic Scholar, Corpus ID: 51696041, 22, pp.1–13, available at: https://www.os3.nl/_media/2017-2018/courses/rp2/p97_report.pdf
Chaganti, R., Boppana, R.V., Ravi, V. Munir, K., Almutairi, M. Rustam, F., Lee, E. and Ashraf, I. (2022), “A comprehensive review of denial of service attacks in blockchain ecosystem and open challenges” IEEE Access, vol. 10, 96538–55, doi: https://doi.org/10.1109/ACCESS.2022.3205019
Aghili, S. (2024), Leveraging Blockchain Technology, CRC Press, Boca Raton, doi: https://doi.org/10.1201/9781003462033
Heilman, E., Kendler, A., Zohar, A. and Goldberg S. (2015), “Eclipse attacks on bitcoin’s peer-to-peer network”, 24th USENIX Security Symposium, Washington, DC, USA, pp. 129–144, available at: https://dl.acm.org/doi/10.5555/2831143.2831152
Rico-Pena, J.J., Arguedas-Sanz, R. and Lopez-Martin, C. (2023), “Models used to characterise blockchain features: a systematic literature review and bibliometric analysis”, Technovation, doi: https://doi.org/10.1016/j.technovation.2023.102711
Kumar, K.S,. Rajeswari, R., Vidyadhari, Ch. and Kumar, B.S. (2020), “Mathematical modeling approaches for blockchain technology”, IOP Conf. Ser. Mater. Sci. Eng., vol. 981(2), pp. 1–8, doi: https://doi.org/10.1088/1757-899X/981/2/022001
Ahmad, R., Alsmadi, I., Alhamdani, W. and Tawalbeh, L. (2023), ”Zero-day attack detection: a systematic literature review”, Artificial Intelligence Review, vol. 56, pp. 10733–10811, doi: https://doi.org/10.1007/s10462-023-10437-z
Hryshchuk, R.V. (2010), Teoretychni osnovy modeliuvannia protsesiv napadu na informatsyiu metodamy teoryi dyferentsialnykh ihor ta dyferentsialnykh peretvoren (Ukrainian), Ruta, Zhytomyr, available at: https://surl.li/helyjo
Hryshchuk, R. (2021), “Example of differential transformations application in cybersecurity” III Int. Sci. Pract. Conf. “Information Security and Information Technologies”, Odesa, Ukraine, pp. 223–227, available at: https://ceur-ws.org/Vol-3200/paper31.pdf
Mufleh, A. (2019), Bitcoin Eclipse Attack-Statistic Analysis on Selfish Mining and Double-Spending Attack, Master Thesis. Johannes Kepler University Linz, Austria, 2019, available at: https://epub.jku.at/obvulihs/content/structure/3853668
Huang, K. (2023), “Chain security: nodes, algorithm, and network”, A Comprehensive Guide for Web3 Security, Springer, pp. 31–60, doi: https://doi.org/10.1007/978-3-031-39288-7_2
Dholey, M.K. and Ganguly, A. (2022), “Major challenges and threats of blockchain technology”, Artificial Intelligence, vol. 1695, pp. 96–108, doi: https://doi.org/10.1007/978-3-031-22485-0_10
Myerson, R.B. (1991), Game Theory: Analysis of Conflict.: Harvard University Press, Cambridge, MA, doi: https://doi.org/10.1002/MDE.4090130412
Gramoli, V. (2020), “From blockchain consensus back to Byzantine consensus”, Future Generation Computer Systems , vol. 107, pp. 760–769, doi: https://doi.org/10.1016/j.future.2017.09.023
Liu, Z., Luong, N.C., Wang, W., Niyato, D., Wang, P., Liang, Y.-C. and Kim, D. I. (2019), “A survey on blockchain: a game theoretical perspective”, IEEE Access, vol. 7, pp. 47615–47643, doi: https://doi.org/10.1109/ACCESS.2019.2909924
Zhang, P.Y., Li, C.X. and Zhou, M.C. (2020), “Game-theoretic modeling and stability analysis of blockchain channels”, 2020 IEEE Int Conf Syst Man Cybern., IEEE Inc., pp. 836–840, doi: https://doi.org/10.1109/SMC42975.2020.9282820
Tran, C.H., Le, D.T. and Huynh, T.H. (2021), “Game theory application resources management and distribution in blockchain network”, Int. J. of Network Security & Its Appl., vol. 13, no. 1, pp. 65–78, available at: https://ssrn.com/abstract=3791860
Udokwu, C. (2024), “Formalizing and simulating the token aspects of blockchain-based research collaboration platform using game theory”, Mathematics, vol. 12, no. 10, pp. 1–19, doi: https://doi.org/10.20944/preprints202409.1808.v1
Zappalà, P., Belotti, M., Potop-Butucaru, M. and Secci, S. (2020), ”Game theoretical framework for analyzing blockchains robustness”, Proc 34th Int.l Symp. on Distr. Comp., LIPIcs, vol. 49, pp. 1–3, doi: https://doi.org/10.4230/LIPIcs.DISC.2020.49
Pavloff, U. (2024), A Game-Theoretic Approach to the Study of Blockchain’s Robustness, PhD Thesis, Paris-Saclay University, available at: https://pavloffulysse.com/manuscript-UlyssePavloff-EN.pdf
Bhudia, A., Cartwright, A., Hurley-Smith, D., Hurley-Smith, D. and Hernandez-Castro, J. (2023), “Game theoretic modelling of a ransom and extortion attack on Ethereum validators”, ARES’23: Proc 18th Int Conf Availability Reliability Security, pp. 1–11, doi: https://doi.org/10.48550/arXiv.2308.00590
Liang, Y., Wang, X., Wu, Y.C., Fu, H. and Zhou, M. (2023), “Study on blockchain sandwich attack strategies based on mechanism design game theory”, Electronics, vol. 12(4417), pp. 1–12, doi: https://doi.org/10.3390/electronics12214417
Zhang, Z. (2025), “Engineering token economy with system modeling”, arXiv, doi; https://doi.org/10.48550/arXiv.1907.00899
Zhang, Z., Zargham, M. and Preciado, V.M. (2020), “On modeling blockchain-enabled economic networks as stochastic dynamical systems”, Applied Networks Science, vol. 5, 19, pp. 1–24, doi: https://doi.org/10.1007/s41109-020-0254-9
Wang, H. and An, J. (2023), “Dynamic stochastic game-based security of edge computing based on blockchain”, Journal of Supercomputing, vol. 79, pp. 15894–15926, doi: https://doi.org/10.1007/s11227-023-05289-x
Bazarnyi, S., Husak, Y., Voitko, T., Aliew, F. and Yevseiev, S. (2025), “Mathematical model of multi-domain interaction based on game theory”, Advanced Information Systems, vol. 9, no. 3, pp. 22–31, doi: https://doi.org/10.20998/2522-9052.2025.3.03
Zhiyong, L., Shuyi, W., Weiwei, S., Jiahui, L. and Jianming, W. (2023), “Research on security situation awareness algorithm of Markov differential game blockchain model”, Journal of China Universities of Posts and Telecommunications, vol. 30, no. 4, pp. 105–120, doi: https://doi.org/10.19682/j.cnki.1005-8885.2023.2020
Zhou, C., Xing, L., Liu, Q. and Wang, H. (2021), “Semi-Markov based dependability modeling of Bitcoin nodes under eclipse attacks and state-dependent mitigation”, Mathematical, Engineering and Management Sciences, vol. 6, no. 2, pp. 480–92, doi: https://doi.org/10.33889/IJMEMS.2021.6.2.029
Zhou, C., Xing, L., Guo, J. and Liu, Q. (2022), “Bitcoin selfish mining dependability analysis”, International Journal of Mathematical, Engineering and Management Sciences, vol. 7, no. 1, pp. 16–27, doi: https://doi.org/10.33889/IJMEMS.2022.7.1.002
Zhou, C., Xing, L., Liu, Q. and Li, Y. (2023), “System-level dependability analysis of Bitcoin under eclipse and 51% attack”, International Journal of Mathematical, Engineering and Management Sciences, vol. 8, no. 4, pp. 547–59, doi: https://doi.org/10.33889/IJMEMS.2023.8.4.031
Zhou, C., Xing, L., Liu, Q. and Wang, H. (2023), “Effective selfish mining defense strategies to improve Bitcoin dependability”, Applied Sciences, vol. 13(422), pp. 1–11, doi: https://doi.org/10.3390/app13010422
Pukhov, G.E. (1978), “Computational structure for solving differential equations by Taylor transformations”, Cybernetic and Systems Analysis, vol. 14, pp. 383–390, doi: https://doi.org/10.1007/BF01074670
Pukhov, G.E. (1961), “Expansion formulas for differential transforms”, Cybernetic and Systems Analysis, vol. 17, pp. 460–464, doi: https://doi.org/10.1007/BF01082476