Abstract
Ethereum is an open source public blockchain platform with smart contract functions and a model of blockchain 2.0. Its market value ranks second in the world of encrypted electronic currencies, second only to Bitcoin. Ethereum uses the underlying blockchain network to implement decentralized distributed data computing and storage. This decentralized mechanism can effectively protect the security and privacy of data. We combed through the existing work on Ethereum, launched an ISP-level passive measurement against Ethereum’s underlying network, and collected the largest Ethereum connection data to date. In this article, we collect a 40GB data set containing tens of millions of nodes, provide the latest statistics of the four types of node discovery protocols as of May 2020, and reveal the basic connection properties of the underlying P2P network. And the node activity degree and corresponding relationship of the entire network are described and analyzed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (SoK). In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 164–186. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54455-6_8
Bartoletti, M., Pompianu, L., et al.: An empirical analysis of smart contracts: platforms, applications, and design patterns. In: Brenner, M. (ed.) FC 2017. LNCS, vol. 10323, pp. 494–509. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70278-0_31
Craig Partridge, M.A.: Ethical considerations in network measurement papers (2016). https://dl.acm.org/doi/fullHtml/10.1145/2896816
Donet Donet, J.A., Pérez-Solà , C., Herrera-JoancomartÃ, J.: The bitcoin P2P network. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 87–102. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44774-1_7
Ekparinya, P., Gramoli, V., Jourjon, G.: Impact of man-in-the-middle attacks on ethereum. In: 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), pp. 11–20. IEEE (2018)
Hildenbrandt, E., et al.: Kevm: a complete formal semantics of the ethereum virtual machine. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF). pp. 204–217. IEEE (2018)
Hirai, Y.: Defining the ethereum virtual machine for interactive theorem provers. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 520–535. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70278-0_33
Touch, J., Lear, E., Mankin, A., et al.: Service Name and Transport Protocol Port Number Registry (2020). https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml
Kiffer, L., Levin, D., Mislove, A.: Stick a fork in it: Analyzing the ethereum network partition. In: Proceedings of the 16th ACM Workshop on Hot Topics in Networks, pp. 94–100 (2017)
Kiffer, L., Levin, D., Mislove, A.: Analyzing ethereum’s contract topology. In: Proceedings of the Internet Measurement Conference 2018, pp. 494–499 (2018)
Kim, S.K., Ma, Z., Murali, S., Mason, J., Miller, A., Bailey, M.: Measuring ethereum network peers. In: Proceedings of the Internet Measurement Conference 2018, pp. 91–104 (2018)
Li, Z., Hou, J., Wang, H., Wang, C., Kang, C., Fu, P.: Ethereum behavior analysis with netflow data. In: 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1–6. IEEE (2019)
Li, Z., Xia, W., Cui, M., Fu, P., Gou, G., Xiong, G.: Mining the characteristics of the ethereum p2p network. In: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 20–30 (2020)
Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254–269 (2016)
Nakamoto, S., Bitcoin, A.: A peer-to-peer electronic cash system. Bitcoin (2008). https://bitcoin.org/bitcoin.pdf 4
Pappalardo, G., Di Matteo, T., Caldarelli, G., Aste, T.: Blockchain inefficiency in the bitcoin peers network. EPJ Data Sci. 7, 1–13 (2018)
Shen, M., Zhang, J., Zhu, L., Xu, K., Du, X., Liu, Y.: Encrypted traffic classification of decentralized applications on ethereum using feature fusion. In: 2019 IEEE/ACM 27th International Symposium on Quality of Service (IWQoS), pp. 1–10. IEEE (2019)
Acknowledgments
This work is supported by The National Key Research and Development Program of China (No. 2020YFB1006100, No. 2020YFE0200500 and No. 2018YFB1800200) and Key research and Development Program for Guangdong Province under grant No. 2019B010137003.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xia, W., Li, Z., Li, Z., Xiong, G., Gou, G. (2021). EthSniffer: A Global Passive Perspective on Ethereum. In: Dai, HN., Liu, X., Luo, D.X., Xiao, J., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2021. Communications in Computer and Information Science, vol 1490. Springer, Singapore. https://doi.org/10.1007/978-981-16-7993-3_6
Download citation
DOI: https://doi.org/10.1007/978-981-16-7993-3_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-7992-6
Online ISBN: 978-981-16-7993-3
eBook Packages: Computer ScienceComputer Science (R0)