Deanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2024)

Deanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2)

Advanced Search

ccs

research-article

  • Authors:
  • Alex Biryukov University of Luxembourg, Luxembourg, Luxembourg

    University of Luxembourg, Luxembourg, Luxembourg

    View Profile

    ,
  • Dmitry Khovratovich University of Luxembourg, Luxembourg, Luxembourg

    University of Luxembourg, Luxembourg, Luxembourg

    View Profile

    ,
  • Ivan Pustogarov University of Luxembourg, Luxembourg, Luxembourg

    University of Luxembourg, Luxembourg, Luxembourg

    View Profile

CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2014Pages 15–29https://doi.org/10.1145/2660267.2660379

Published:03 November 2014Publication HistoryDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (3)

  • 352citation
  • 3,134
  • Downloads

Metrics

Total Citations352Total Downloads3,134

Last 12 Months199

Last 6 weeks24

  • Get Access

CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security

Deanonymisation of Clients in Bitcoin P2P Network

Pages 15–29

PreviousChapterNextChapter

Deanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (5)

ABSTRACT

Bitcoin is a digital currency which relies on a distributed set of miners to mint coins and on a peer-to-peer network to broadcast transactions. The identities of Bitcoin users are hidden behind pseudonyms (public keys) which are recommended to be changed frequently in order to increase transaction unlinkability.

We present an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated. Our techniques work for the most common and the most challenging scenario when users are behind NATs or firewalls of their ISPs. They allow to link transactions of a user behind a NAT and to distinguish connections and transactions of different users behind the same NAT. We also show that a natural countermeasure of using Tor or other anonymity services can be cut-off by abusing anti-DoS countermeasures of the Bitcoin network. Our attacks require only a few machines and have been experimentally verified. The estimated success rate is between 11% and 60% depending on how stealthy an attacker wants to be. We propose several countermeasures to mitigate these new attacks.

References

  1. Best VPN's using Bitcoin. https://bitcointalk.org?topic=247212.0, 2014.Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (6)
  2. Bitcoin code project, v.0.8.6. https://github.com/bitcoin/bitcoin, 2014.Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (7)
  3. Bitcoin Wiki. https://en.bitcoin.it/wiki/, 2014.Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (8)
  4. Bitnodes. https://github.com/ayeowch/bitnodes, 2014.Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (9)
  5. BlockChain.info. https://blockchain.info/charts, 2014.Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (10)
  6. D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Proceedings on Advances in Cryptology (CRYPTO'88). Springer, 1988. Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (11)Digital Library
  7. R. Dingledine, N. Mathewson, and P. F. Syverson. Tor: The second-generation onion router. In Usenix Security Symposium (USENIX'04), 2004. Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (13)Digital Library
  8. C. M. Grinstead and J. L. Snell. Introduction to Probability. American Mathematical Society, 1997.Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (15)
  9. P. Koshy, D. Koshy, and P. McDaniel. An analysis of anonymity in bitcoin using P2P network traffic. In Proceedings of Financial Cryptography and Data Security (FC'14). Springer, 2014.Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (16)Cross Ref
  10. S. Lerner. New vulnerability: know your peer public addresses in 14 minutes. https://bitcointalk.org/?topic=135856, 2014.Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (18)
  11. S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M. Voelker, and S. Savage. A fistful of bitcoins: Characterizing payments among men with no names. In Proceedings of Conference on Internet Measurement Conference (IMC'13). ACM, 2013. Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (19)Digital Library
  12. S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2009. http://www.bitcoin.org/bitcoin.pdf.Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (21)
  13. OnionCat An Anonymous VPN-Adapter. https://www.onioncat.org/about-onioncat/, 2014.Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (22)
  14. F. Reid and M. Harrigan. An analysis of anonymity in the bitcoin system. In Security and Privacy in Social Networks. Springer, 2013.Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (23)Cross Ref
  15. D. Ron and A. Shamir. Quantitative analysis of the full bitcoin transaction graph. In Financial Cryptography and Data Security (FC'13). Springer, 2013.Google ScholarDeanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (25)

Cited By

View all

Deanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (26)

    Index Terms

    1. Deanonymisation of Clients in Bitcoin P2P Network
      1. Applied computing

        1. Electronic commerce

          1. Digital cash

        2. Security and privacy

          1. Network security

        Recommendations

        • Bitcoin over Tor isn't a Good Idea

          SP '15: Proceedings of the 2015 IEEE Symposium on Security and Privacy

          Bit coin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transactions are broadcasted via a peer-to-peer network. While Bit coin provides some level of anonymity (or rather pseudonymity) by ...

          Read More

        • Traversing Bitcoin's P2P network: insights into the structure of a decentralised currency

          Lots of existing work addresses the analysis of Bitcoin's publicly available transaction graph. There are evaluations of the user's anonymity and privacy, but no proper measurements of the underlying network. This paper presents novel insights about ...

          Read More

        • CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin

          Computer Security - ESORICS 2014

          Abstract

          The decentralized currency network Bitcoin is emerging as a potential new way of performing financial transactions across the globe. Its use of pseudonyms towards protecting users’ privacy has been an attractive feature to many of its adopters. ...

          Read More

        Reviews

        Subhankar Ray

        Detailed descriptions of some parts of the bitcoin code that are not documented well are contained in this paper. Those trying to understand how the bitcoin code works should read this paper to start their journey. However, I am concerned about the knowledge and "hacking" techniques described in the paper for deanonymization of clients. Because core developers are changing the code regularly and can make this paper obsolete quickly, even elegant stochastic processes to measure different limits and bounds may produce different results as the code base is changing. At the same time, I understand that the authors' goal is to make this paper obsolete as quickly as possible for the safety and security of bitcoin. This is a novel approach to deanonymize clients while they are behind firewalls or network address translation (NAT). This technique will be useful in other networks and applications. The attack also needs a limited amount of resources, and will also work if "bitcoin encrypts the connection." The techniques and probing used in this paper relate to the usage of the GETADDR, ADDR, and INVENTORY messages and that of the time stamps by the bitcoin protocol. The deanonymization process described in the paper has four steps. In step 1, it gets the list of bitcoin servers. In step 2, it composes the nodes it wants to deanonymize. In step 3, it maps clients to their entry nodes using some knowledge about the topology of the network. In step 4, transactions are mapped to entry nodes running in parallel to steps 1 to 3. This paper also describes "how to decrease block mining difficulty by creating an alternative blockchain." The attack described in the paper prohibits bitcoin servers from accepting connections via Tor or other similar services (section 3). This is not very practical, and parties looking to stay anonymous may stop using the system until they have access to such a service. Interestingly, once such a service is available, the proposed attack may not be able to deanonymize clients who are not using Tor or other similar services. Nevertheless, this paper is a good contribution toward making the bitcoin network more secure. Online Computing Reviews Service

        Deanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (27)Deanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (28)

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        Get this Publication

        • Information
        • Contributors
        • Published in

          Deanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (29)

          CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security

          November 2014

          1592 pages

          ISBN:9781450329576

          DOI:10.1145/2660267

          • General Chair:
          • Gail-Joon Ahn

            Arizona State University, USA

            ,
          • Program Chairs:
          • Moti Yung

            Google -- Columbia University, USA

            ,
          • Ninghui Li

            Purdue University, USA

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [emailprotected].

          Sponsors

            In-Cooperation

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 3 November 2014

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Deanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (33)

              Author Tags

              • anonymity
              • bitcoin
              • p2p
              • tor

              Qualifiers

              • research-article

              Conference

              Acceptance Rates

              CCS '14 Paper Acceptance Rate114of585submissions,19%Overall Acceptance Rate1,261of6,999submissions,18%

              More

              Upcoming Conference

              CCS '24

              • Sponsor:
              • sigsac

              ACM SIGSAC Conference on Computer and Communications Security

              October 14 - 18, 2024

              Salt Lake City , UT , USA

              Funding Sources

              • Deanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (34)

                Other Metrics

                View Article Metrics

              • Bibliometrics
              • Citations352
              • Article Metrics

                • 352

                  Total Citations

                  View Citations
                • 3,134

                  Total Downloads

                • Downloads (Last 12 months)199
                • Downloads (Last 6 weeks)24

                Other Metrics

                View Author Metrics

              • Cited By

                View all

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader

                Digital Edition

                View this article in digital edition.

                View Digital Edition

                • Figures
                • Other

                  Close Figure Viewer

                  Browse AllReturn

                  Caption

                  View Table of Contents

                  Export Citations

                    Your Search Results Download Request

                    We are preparing your search results for download ...

                    We will inform you here when the file is ready.

                    Download now!

                    Your Search Results Download Request

                    Your file of search results citations is now ready.

                    Download now!

                    Your Search Results Download Request

                    Your search export query has expired. Please try again.

                    Deanonymisation of Clients in Bitcoin P2P Network | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2024)

                    FAQs

                    What is the bitcoin P2P network and how are transactions processed in the bitcoin network? ›

                    The term peer-to-peer, or P2P, means that the computers that participate in the network are peers to each other, that they are all equal, that there are no "special" nodes, and that all nodes share the burden of providing network services.

                    What is the peer-to-peer network architecture in Bitcoin? ›

                    Peer-to-Peer Network Architecture

                    There is no server, no centralized service, and no hierarchy within the network. Nodes in a peer-to-peer network both provide and consume services at the same time with reciprocity acting as the incentive for participation.

                    What is a P2P network in blockchain? ›

                    Blockchain is a P2P network that acts as a decentralized ledger for one or more digital assets, which refers to a decentralized peer-to-peer system where each computer keeps a complete copy of the ledger and verifies its authenticity with other nodes to guarantee the data is accurate.

                    Why does blockchain need to rely on a P2P network? ›

                    Decentralization: P2P networks eliminate the need for central servers, distributing data across various nodes. This reduces the risk of single points of failure and enhances overall network resilience, a feature particularly valuable in blockchain development where decentralization is crucial.

                    What are the advantages and disadvantages of a peer-to-peer network? ›

                    The main advantages of P2P include reducing the load and cost of servers, increasing the availability and reliability of resources, and enhancing the privacy and anonymity of nodes. However, P2P can also be difficult to manage and secure due to varying capabilities, configurations, and trust levels among nodes.

                    What is the main characteristic of a peer-to-peer P2P network? ›

                    P2P networks are decentralized, meaning no central server or authority controls the network. Instead, each participant or peer has equal capabilities and responsibilities. Peers interact directly with each other, sharing resources and services without relying on a central point of control.

                    What is the difference between blockchain and peer-to-peer network? ›

                    As blockchain is a decentralized system of peer to peer network, it is highly available due to decentralization. Because of P2P networking capability, even if one peer gets down, the other peers are still present. Thus nobody can take down the blockchain.

                    What is the difference between client-server and peer-to-peer architecture? ›

                    The crux of the difference between a client-server and a peer-to-peer network lies in the fact that in a peer-to-peer network, each node can both request and provide services. On the other hand, in a client-server network, the client nodes request services and the server node provides them.

                    What is the difference between client-server architecture and peer-to-peer P2P architecture? ›

                    The primary difference between these two terms is that, in a peer-to-peer network, every node can ask for assistance and deliver services. While in a client-server network, the client nodes demand services and the server node answers with assistance.

                    What are the three types of P2P networks? ›

                    P2P networks ensure transparent, immutable, and secure transactions by connecting nodes worldwide, preventing forgery. There are three types of P2P networks: structured, unstructured, and hybrid, each varying in organization and efficiency levels.

                    What are the disadvantages of peer-to-peer networks? ›

                    The disadvantages of peer to peer network
                    • A computer can be accessed anytime.
                    • Network security has to be applied to each computer separately.
                    • Backup has to be performed on each computer separately.
                    • No centralized server is available to manage and control the access of data.

                    What is an example of a client-server network? ›

                    Example. When a bank customer accesses online banking services with a web browser (the client), the client initiates a request to the bank's web server. The customer's login credentials may be stored in a database, and the webserver accesses the database server as a client.

                    Are all blockchains peer-to-peer? ›

                    At its core, blockchain is a groundbreaking departure from traditional database structures. It is a decentralized, peer-to-peer network forming a communal chain of data. In this innovative work, information is organized into blocks linked to the previous one, creating an unalterable chain – the blockchain.

                    Why is client-server better than P2P? ›

                    This means that clients request and receive data from servers, which handle the processing and storage. Client-server networks are more efficient, reliable, and secure than peer-to-peer networks, as they can handle large amounts of data, distribute the workload, and implement security measures.

                    How are transactions processed in Bitcoin? ›

                    In broad terms, transactions get inserted into the blockchain by nodes when one party sends a Bitcoin to another. Miners run a unique software program to inscribe the blocks onto the Bitcoin (BSV) blockchain. Nodes are the base of the blockchain.

                    What is the transaction processing process of Bitcoin? ›

                    Creating a Transaction: When you send bitcoin, you create a transaction from your digital wallet. This transaction includes the sender's address (public key), the recipient's address (public key), the amount of Bitcoin to be sent, and a transaction fee that you're willing to pay to the miners.

                    How does a P2P network work? ›

                    In a peer-to-peer network, computers on the network are equal, with each workstation providing access to resources and data. This is a simple type of network where computers are able to communicate with one another and share what is on or attached to their computer with other users.

                    What is the P2P transfer process? ›

                    In all cases, the funds are transferred from the payer's account to the platform's account. The platform then transfers the funds to the payee's account. This process happens behind the scenes and is usually instant. Just enter the amount you want to send, the recipient's information, and hit send.

                    Top Articles
                    Latest Posts
                    Article information

                    Author: Domingo Moore

                    Last Updated:

                    Views: 5957

                    Rating: 4.2 / 5 (53 voted)

                    Reviews: 84% of readers found this page helpful

                    Author information

                    Name: Domingo Moore

                    Birthday: 1997-05-20

                    Address: 6485 Kohler Route, Antonioton, VT 77375-0299

                    Phone: +3213869077934

                    Job: Sales Analyst

                    Hobby: Kayaking, Roller skating, Cabaret, Rugby, Homebrewing, Creative writing, amateur radio

                    Introduction: My name is Domingo Moore, I am a attractive, gorgeous, funny, jolly, spotless, nice, fantastic person who loves writing and wants to share my knowledge and understanding with you.