Autonomi
LearnBuildWho we ArePublicationsGet ANTStart a Node
  • Learn
  • Node
  • ANT Token
  • Developers
  • Autonomi Docs
  • Introduction
    • What is Autonomi?
      • The Internet's Crowd Storage Layer
      • Everything's Encrypted
      • Lifetime Storage; One Time Fee
      • Built From Everyday Devices
      • Private by Design
      • Blockchainless Data
      • Secure & Efficient
    • Background
    • A Self-Organizing System
    • Fundamental Principles
    • Key Features
  • How It Works
    • Overview
    • Fully Autonomous Data Network
      • A Serverless Web
      • Nodes
      • Clients
    • Network Architecture
      • Building on Kademlia
      • libp2p
      • Content-Addressable Storage
    • Encryption and Authentication
      • Self-Encryption
      • Multilayered encryption
      • Self-Authentication
      • Multisig Credentials
    • Network Economics
      • Key Properties
      • Token Supply
      • Gas Fee
      • Quote Calculations
    • Consensus Not Required
      • Stigmergy
      • Conflict-free Replicated Data Types
    • Data types
      • Chunks
      • Registers
    • Defence Against Cyberattacks
      • Beating Common Threats
  • Learn More
    • Team
    • Autonomi Foundation
    • FAQs
    • Glossary
    • References
Powered by GitBook

Get Involved

  • Start a Node
  • Discord
  • Forum

Follow Us

  • X
  • Reddit
  • LinkedIn
On this page
  • Sybil attacks
  • Man in the Middle attacks
  • DDoS
  • Quantum computing
  • Phishing & Key-logging etc
  • Ransomware
Export as PDF
  1. How It Works
  2. Defence Against Cyberattacks

Beating Common Threats

Sybil attacks

Sybil attacks involve malicious actors generating multiple fake identities, known as Sybil nodes, in an attempt to control operations. With sufficient Sybil nodes controlling part of the address space, a malicious actor could block access to certain content, for example. Autonomi detects Sybil attacks by estimating the network size using a statistical method KL Divergence. This compares the real distribution of node IDs (i.e. their network addresses) with the theoretical one. A significant difference between the two could indicate a Sybil attack. At this point nodes looking for data at a certain address will broaden their search to include a wider range of peers than normal. Even if all nodes closest to a chunk of data are compromised, it may still be accessed via nodes that are further away.

Man in the Middle attacks

MitM attacks rely on data being unencrypted or the victim’s browser accepting the attacker's certificate instead of the website’s certificate. They will not work on Autonomi.

DDoS

Exceptionally difficult as there is no single point to attack. The Network will simply re-route around any nodes that are taken down.

Quantum computing

Self-Encrypted data is considered 'quantum secure’, meaning that it cannot currently be defeated by a brute force attack, even with a quantum computer. On top of that, the volume of encrypted packets means that there could only be targeted attempts at decryption, and decentralization makes such targeting difficult.

Phishing & Key-logging etc

While there is some feasibility to these attacks, as the Network cannot protect endpoints such as a device itself, such an attack would only compromise the user’s own data. Using such a compromise as a springboard for a wider attack on a database, or swaths of Network data, is just not possible, and would be of dubious value to an attacker outside of a highly targeted hack.

Ransomware

Files are stored in immutable data and cannot be changed, so ransomware cannot encrypt it, but it could potentially delete Data Maps or hide them, making data inaccessible.

PreviousDefence Against CyberattacksNextTeam

Last updated 1 year ago