Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Security vulnerabilities of Digital Currencies and Countermeasures

Author : Navya Davis 1 Neethu Prabhakaran 2

Date of Publication :12th July 2019

Abstract: Crypto currency commonly defined as digital belongings that use cryptography to secure dealings without the need for a central banking authority is rising in popularity and being widely adopted across the globe. The market for crypto-currencies has been incredibly volatile and these peaks and troughs have made crypto currency value a popular media topic. Hackers, too, have taken notice. In a little under a decade, crypto currency has developed from an obscure experiment to one of the hottest topi cs in both the technology and finance fields. From the time when the emergence of Bitcoin as the first centralised crypto currency in 2009, the industry has exploded and there are more than 1,500 different currencies now existing. We have seen a new sharp ris e in crypto-jacking attacks, exploiting the power of victims' computers to mine crypto-currency and alternative currencies also play a major role in ransom ware attacks, being the payment method of choice. Phishing is a key element in these attacks and busines ses need to help their employees to spot phishing attacks. Credential theft is a serious driver of cybercrime today. The world over, different kinds of credentials are used by billions daily to authenticate themselves in their physical and digital lives. From physical keys, through tokens and cards, to digital private keys, session cookies, digital certificates, crypto-currency wallets, login and password combinations, all of these types of credentials are vulnerable to attack. This paper deals with the security vulnerabilities related to crypto currencies and the countermeasures to be taken by block chain to keep it safe.

Reference :

    1. Nicholas Roth, an Architectural Assessment of Bitcoin Using the Systems Modeling Language 2015 Conference on Systems Engineering Research, Procedia Computer Science 44 ( 2015 ) 527 – 536
    2. https://decryptionary.com/what-iscryptocurrency/introduction-to-cryptocurrency/
    3. https://blockgeeks.com/guides/what-iscryptocurrency/
    4. https://resources.infosecinstitute.com/futureinformation-security/
    5. https://blocksdecoded.com/cryptocurrency-hacks/ 6. https://www.liteforex.com/blog/forinvestors/cryptocurrency-attacks-types-ofvulnerabilities-risks-and-results/
    6. Yujin Kwon, Dohyun Kim, Yunmok Son,,Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin,CCS‘17, October 30- November 3, 2017, Dallas, TX, USA
    7. https://www.cloudflare.com/learning/ddos/cryptocurr ency-ddos-attacks/
    8. Christian Decker, Roger Wattenhofer,Information Propagation in the Bitcoin Network,13-th IEEE International Conference on Peer-to-Peer Computing
    9. Aaron Zimba, Zhaoshun Wang & Mwenge Mulenga (2019) Crypto jacking injection: A paradigm shift to crypto currency-based web-centric internet attacks, Journal of Organizational Computing and Electronic Commerce, 29:1, 40-59
    10. Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, Neeraj Kumar,A Survey on Privacy Protection in Blockchain System,Journal of Network and Computer Applications (2018)
    11. Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, M. Ali Babar, Awais Rashid,Data Exfiltration: A Review of External Attack Vectors and Countermeasures, Journal of Network and Computer Applications
    12. https://www.csoonline.com/article/3253572/what-iscryptojacking-how-to-prevent-detect-and-recoverfrom-it.html
    13. Maria Apostolaki,Aviv Zohar,Laurent VanbeverHijacking Bitcoin: Routing Attacks on Cryptocurrencies,Security and Privacy (SP), 2017 IEEE Symposium

Recent Article