World’s first implementation of connections firewall & artificially intelligent attack detection in Bata (BTA) Cryptocurrency.
Bitcoin Firewall 1.1
Developed by Justin Percy — Bata Development
Why a firewall?
Bitcoin Firewall 1.1 uses a very unique method for detecting potential hard-fork attacks, coupled with dynamic block chain DDoS flooding. All connected nodes/peers are examined using a dynamic rule set. By quickly avoiding long-term acceptance of malicious commands and transactions, Bitcoin based developers of cryptocoins can easily mitigates risks involved with low network hash-rates, and the costs involved with attempting to maintain the majority of network hashing.
If rule set criteria are met, the connecting node is further examined to verify that their blockchain start height is within safe limits of the average among all peers connected. Range based dynamic blockchain checkpoints implementing averages instead of static heights, further enhance network security by limiting potential attacks known as “more than 51% of distributed hashing power”. Once a potential attack is detected: the connected node/peer is forcefully terminated and added to a session blacklist and immediately refused future connections. This can be considered a temporary session break, for safety.
>51% majority hash-power attack
Mining new coins requires consensus among all nodes on the network to agree upon validation of new blocks containing existing (spent) confirmed transactions. Mining pools compute new hash values and send the data to the network via the nodes, eventually showing up in a client wallet. This process is very complex and requires all peers to cooperate by confirming and transferring funds safely among all participants of the network efficiently. Attackers are modifying open source wallets with sophisticated changes. These can alter the performance of ALL nodes and peers, and thus the consensus among them as well. This could become detrimental enough, similar to a distributed denial of service attack; Possibly for a short period of time, enough to lower the security of all nodes and peers and successfully by-pass all check-sum algorithms for spending confirmed funds twice.
Sounds interesting? To read the full whitepaper download here.