Resistance to witch attacks and agent attacks
A witch attack, also known as a ”fake attack” or ”forgery attack”, is when an attacker forges or im- personates another user or system entity in order to gain unauthorized access or perform other ma- licious acts. For example, in e-commerce, a witch attacker can forge orders or transactions to gain unauthorized access to goods or services [33].
A proxy attack is the attack that an attacker uses a proxy or man-in-the-middle to deceive a system or user. The attacker uses a proxy to inter- cept, tamper with, or replay communication data to gain unauthorized access or for other malicious purposes. For example, in a network environment, an attacker tricks a router, gateway, or other inter- mediate node to intercept, tamper, or replay com- munication data to obtain sensitive information or perform other malicious acts [34].
Utility network employs multiple security mechanisms, such as strengthening authentication, ensuring multiple rounds of encrypted communica- tion, controlling access, etc. to effectively defend against witch attacks and proxy attacks. At the same time, by limiting the rights and behaviors of malicious miners and imposing severe penalties and sanctions, Utility network ensures the security and stability of the entire network.
Last updated