Open In App

What is an Eclipse Attack?

An eclipse attack is a P2P (Peer to Peer) network-based attack. Eclipse attack can only be performed on nodes that accept incoming connections from other nodes, and not all nodes accept incoming connections.

In a bitcoin network, by default, there are a maximum of 117 incoming TCP connections and 8 outgoing TCP connections.



According to Gemini – In eclipse attack, the attacker attempts to redirect the target user’s inbound and outbound connections away from its legitimate neighboring nodes to attacker-controlled nodes, thereby sealing off the target in an environment that’s entirely separate from the actual network activity.

In other words, gaining control over node access to information in a P2P network is an Eclipse attack. The attacker positions itself in such a manner that all the incoming and outgoing connections of the target are attacker nodes.



Working of Eclipse Attack:

Eclipse attacks are possible because nodes within the network are unable to connect with all other nodes and can connect with a limited number of neighboring nodes. This limitation might make it seem convenient for attackers to isolate a node from the rest of the network, but it is not an easy task. Let’s now discuss how is it done.

Consequences of An Eclipse Attack:

During an Eclipse attack, the attacker hides the actual current state of the blockchain ledger from the target, by doing that the attacker can perform:

Prevention of Eclipse Attack:

Article Tags :