Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins
Liu Xin , Zhou Rui , Shimizu Shohei , Chong Rui , Zhou Qingguo , Zhou Xiaokang
›› 2025, Vol. 11 ›› Issue (1) : 256 -267.
Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins
As smart contracts, represented by Solidity, become deeply integrated into the manufacturing industry, blockchain-based Digital Twins (DT) has gained momentum in recent years. Most of the blockchain infrastructures in widespread use today are based on the Proof-of-Work (PoW) mechanism, and the process of creating blocks is known as “mining”. Mining becomes increasingly difficult as the blockchain grows in size and the number of on-chain business systems increases. To lower the threshold of participation in the mining process, “mining pools” have been created. Miners can cooperate and share the mining rewards according to the hashrate they contributed to the pool. Stratum is the most widely used communication protocol between miners and mining pools. Its security is essential for the participants. In this paper, we propose two novel Man-In-The-Middle (MITM) attack schemes against Stratum, which allow attackers to steal miners' hashrate to any mining pool using hijacked TCP connections. Compared with existing attacks, our work is more secretive, more suitable for the real-world environment, and more harmful. The Proof-of-Concept (PoC) shows that our schemes work perfectly on most mining softwares and pools. Furthermore, we present a lightweight AI-driven approach based on protocol-level feature analysis to detect Stratum MITM for blockchain-based DTs. Its detection model consists of three layers: feature extraction layer, vectorization layer, and detection layer. Experiments prove that our detection approach can effectively detect Stratum MITM traffic with 98% accuracy. Our work alerts the communities and provides possible mitigation against these more hidden and profitable attack schemes.
Digital twins / MITM / Blockchain / Stratum / Anomaly detection
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
|
| [9] |
|
| [10] |
Braiins, Stratum v. 1 docs, https://braiins.com/stratum-v1/docs. (Accessed 1 Octo-ber 2023). |
| [11] |
|
| [12] |
|
| [13] |
Domain name server (DNS) hijacking, https://www.imperva.com/learn/application-security/dns-hijacking-redirection/, 2023. (Accessed 1 October 2023). |
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
|
| [18] |
|
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
|
| [23] |
|
| [24] |
|
| [25] |
|
| [26] |
|
| [27] |
|
| [28] |
|
| [29] |
Ethereum smart contract call injection attack, https://blog.csdn.net/u011721501/article/details/80757811, 2018. (Accessed 1 October 2023). |
| [30] |
|
| [31] |
|
| [32] |
|
| [33] |
|
| [34] |
|
| [35] |
|
| [36] |
|
| [37] |
|
| [38] |
|
| [39] |
|
| [40] |
|
| [41] |
|
| [42] |
|
| [43] |
|
| [44] |
J. R. W. Group,Json-rpc 2.0 specification, https://www.jsonrpc.org/specification, 2007. (Accessed 1 October 2023). |
| [45] |
|
| [46] |
|
| [47] |
|
| [48] |
|
| [49] |
|
| [50] |
|
| [51] |
|
| [52] |
|
| [53] |
Ccminer, October 2023). |
| [54] |
Btcpool, https://github.com/btccom/btcpool, 2020. (Accessed 1 October 2023). |
| [55] |
|
| [56] |
|
/
| 〈 |
|
〉 |