You are currently viewing a new version of our website. To view the old version click .
Information
  • Article
  • Open Access

2 December 2025

Liveness over Fairness (Part I): A Statistically Grounded Framework for Detecting and Mitigating PoW Wave Attacks

Institute of Computing Science, Poznan University of Technology, 60-965 Poznań, Poland
This article belongs to the Special Issue Blockchain and AI: Innovations and Applications in ICT

Abstract

Blockchain networks face a critical but understudied threat: wave attacks that exploit difficulty adjustment algorithms through strategic mining participation. Adversaries cyclically withdraw and re-enter mining to create oscillations that degrade network liveness and destabilize honest miners’ revenue. We present the first production-ready framework that maintains network responsiveness while enabling robust, post hoc threat detection. The framework employs a statistically rigorous pipeline featuring controller-aligned anomaly detection, transitive collusion grouping via union-find, and Benjamini–Hochberg False Discovery Rate control. We formally prove the economic viability of this architecture: when penalties on unvested rewards are enabled by governance, wave attacks become asymptotically unprofitable for rational adversaries. Evaluated on a 128-node distributed testbed simulating Bitcoin, Ethereum Classic, and Monacoin networks over 30 independent runs, our framework achieves 92.7% F1-score in detecting attacks, significantly outperforming baseline methods (74.7%). This work provides a complete, theoretically-grounded solution for securing proof-of-work blockchains against difficulty manipulation, forming the foundation for the adaptive AI-driven enhancements presented in our companion paper (Part II).

1. Introduction

Proof-of-work (PoW) blockchains rely on a difficulty adjustment algorithm (DAA) to maintain a target block interval by dynamically adjusting the mining difficulty. An emerging adversarial pattern, known as a wave attack, exploits this feedback controller by cyclically withdrawing and re-entering mining capacity. Figure 1 illustrates the attack mechanism: during the withdrawal phase (periods A and C), the diminished hash rate causes the DAA to gradually lower the difficulty; when the attacker resumes mining (periods B and D), the reduced difficulty target is harvested for disproportionate profit. The attack timing is strategically synchronized with DAA window boundaries to maximize difficulty suppression. Such oscillations undermine network liveness—the ability to produce blocks at a predictable cadence—and degrade the revenue of honest miners. Unlike classical selfish or stubborn mining strategies [1,2], which manipulate publication strategies, wave attacks target the control plane itself by inducing non-stationary block intervals.
Figure 1. Wave attack pattern: adversaries cyclically withdraw mining capacity (periods A, C) to suppress difficulty, and then harvest profits during re-entry (periods B, D). The attack is synchronized with DAA window boundaries to maximize exploitation.
This research emerged from extensive operational experience deploying GRIDNET OS [3,4,5], a decentralized operating system with blockchain-based coordination mechanisms. During deployment, we encountered various attack categories including PoW wave attacks, distributed denial-of-service attacks, and difficulty bomb attempts. This paper focuses specifically on PoW wave attacks, for which the existing literature on detection and mitigation remains remarkably sparse.

1.1. Novel Contributions Beyond Existing Work

While prior research has addressed selfish mining [1,6], timestamp manipulation [7], and statistical detection of mining anomalies [8], no existing work provides a complete, production-ready framework for wave attack detection with formal economic deterrence guarantees. Our framework is the first to include the following:
  • Separation of liveness from enforcement: Dual-phase architecture that accepts blocks optimistically while performing rigorous forensic analysis asynchronously.
  • Controller-aligned detection: Detection windows synchronized to DAA boundaries with physics-informed anomaly statistics.
  • Transitive collusion grouping: Union-find algorithm that identifies coordinated attacks through temporal overlap analysis.
  • FDR control: Benjamini–Hochberg procedure to bound false positives while maintaining high detection power.
  • Economic deterrence with formal proofs: Theorem proving that penalties on unvested rewards make attacks asymptotically unprofitable for rational adversaries.

1.2. Design Philosophy: Prioritizing Liveness over Premature Rejection

A critical design choice distinguishes our framework from prior work: we prioritize network liveness over premature block rejection. In the context of this framework, we define “liveness” operationally as the maintenance of the protocol’s target block production cadence and transaction throughput. This distinguishes our focus from the classical distributed systems definition of liveness (eventual consensus). Our priority is to prevent aggressive security filters from causing latency spikes or stalling consensus through false positive block rejections.
Traditional security approaches enforce strict validation at block arrival, risking false rejections that stall consensus. Our dual-phase architecture (Figure 2) accepts blocks optimistically during the proactive phase with minimal checks, and then performs rigorous forensic analysis asynchronously in the reactive phase. This separation ensures that even if detection is imperfect, the network continues producing blocks. Penalties are applied post hoc to unvested rewards when attacks are confirmed, creating economic deterrence without compromising liveness. This philosophy aligns with the principle that it is better to accept and later penalize than to falsely reject and halt progress.
Figure 2. Framework philosophy: proactive phase accepts blocks optimistically to preserve liveness; reactive phase performs comprehensive forensic analysis asynchronously, flagging attacks for post hoc penalties without disrupting consensus.

1.3. Contributions

1.
Production-ready framework: Complete dual-phase architecture with detailed description of algorithms and deployment experience that can be validated online (‘chain -sec’ command in GRIDNET OS).
2.
Controller-aligned detection: Novel detection methodology synchronized with DAA dynamics for improved accuracy.
3.
Transitive collusion grouping: Union-find based algorithm that identifies coordinated attacks through temporal overlap.
4.
Formal economic deterrence: Theorems proving that penalties on unvested rewards make rational attacks unprofitable.
5.
Comprehensive evaluation: 30-run experiments on 128-node testbed across three blockchain networks.
6.
Limitations analysis: We discuss limitations of static models against adaptive adversaries, motivating the AI-driven enhancements presented in Part II of this series.

1.4. Paper Organization

The remainder of this paper is organized as follows. Section 2 surveys related work on blockchain security and mining attacks. Section 3 formalizes the system model, threat assumptions, and design objectives. Section 4 presents the notation and nomenclature. Section 5 presents our dual-phase framework architecture, detailing both proactive validation (Section 5.1) and reactive detection mechanisms (Section 5.2). Section 6 describes the implementation and experimental setup. Section 7 presents evaluation results including detection performance, ablation studies, and sensitivity analyses. Section 8 provides the theoretical validation through formal economic analysis with proofs of asymptotic deterrence. Section 9 discusses security properties and limitations. Section 10 concludes and outlines future directions, including the adaptive defenses in Part II.

3. System Model and Threat Assumptions

3.1. Blockchain Model

We consider a PoW blockchain with target block interval T (e.g., T = 600 s for Bitcoin). The DAA adjusts difficulty D based on the average inter-block time t ¯ over a window W of recent blocks (e.g., W = 2016 for Bitcoin, W = 144 for our testbed). The adjustment rule is
D n e w = D o l d · t ¯ T
Miners produce blocks via a Poisson process with rate λ = H / D , where H is the network hashrate. Rewards R per block are distributed proportionally to contributed hashrate. Rewards vest over V blocks (e.g., V = 100 for Bitcoin coinbase maturity).

3.2. Adversary Model

Threat: An adversary controlling fraction β of total hashrate (e.g., β = 0.25 ) executes a wave attack:
  • Withdrawal phase ( τ o f f ): Adversary reduces mining to negligible level (≈ 10 % of β H ).
  • Harvest phase ( τ o n ): Adversary deploys full capacity ( β H ).
  • Timing: Phases synchronized to DAA window boundaries to maximize difficulty suppression.
Goal: Maximize profit by harvesting more blocks during reduced-difficulty periods than would be earned through honest mining.
Assumptions:
  • A1 (Rational): Adversary seeks to maximize expected profit over long time horizons.
  • A2 (Observable): All block headers and timestamps are public.
  • A3 (Unvested penalties): Governance can forfeit unvested rewards upon detection.
  • A4 (Detection lag): Detection occurs within D < V blocks.
While decentralized networks may experience intermittent chaotic states (forks), the consensus mechanism inevitably converges toward a common history of events. Our analytic mechanics rely on traversing this single, finalized path. The detection window is defined as a precise number of blocks containing valid proof-of-work. Consequently, the penalty logic is not applied to rejected forks but is enforced on the universally accepted history. This ensures that rewards are released only if the system’s consensus-level analytics have not flagged the prior sequence of confirmed events as malicious.

3.3. Design Objectives

1.
Liveness: Maintain block production rate; avoid false rejections that stall consensus.
2.
Detection accuracy: Achieve high true positive rate (TPR) while controlling false positive rate (FPR < 0.05 ).
3.
Economic deterrence: Ensure expected attacker payoff is negative: E [ Δ Payoff ] < 0
4.
Fairness: Bound probability of falsely penalizing honest miners via FDR control.
Having established the system model, threat assumptions, and design objectives, we now present the notation used throughout this paper, followed by the dual-phase architecture. Section 5.1 introduces the proactive phase (real-time checks), and Section 5.2 presents the reactive phase (forensic analysis).

4. Notation and Nomenclature

Table 1 provides a comprehensive reference for all mathematical symbols, system parameters, and notation used throughout this paper. Symbols are organized by category for quick reference.
Table 1. Nomenclature and notation.

5. Framework Architecture

Our framework operates in two phases:
1.
Phase 1 (Proactive): Real-time block validation with minimal checks to preserve liveness.
2.
Phase 2 (Reactive): Asynchronous forensic analysis with comprehensive attack detection.

5.1. Phase 1: Proactive Block Validation

Phase 1 applies local checks at block arrival without stalling consensus.

5.1.1. Timestamp Verification

Blocks must satisfy timestamp bounds to prevent trivial manipulation. However, strict enforcement risks false rejections due to clock skew and network delays. Algorithm 1 provides the complete timestamp verification logic, including checkpoint override mechanisms.
Algorithm 1 Proactive Timestamp Validation
Require: 
block b, parent p, network time t n e t
  1:
maxFutureWindow 90 s
  2:
maxPastDrift 7200 s
  3:
if  b . t s > t n e t + maxFutureWindow then
  4:
   if not isCheckpointBlock(b) then
  5:
      return Reject
  6:
   end if
  7:
end if
  8:
if  b . t s < p . t s   then
  9:
     return Reject
10:
end if
11:
if  b . t s < t n e t maxPastDrift   then
12:
   addWarning(b, “PastDrift”)
13:
end if
14:
return Accept

5.1.2. PoW and Difficulty Verification

We verify that block difficulty meets the protocol-specified target with tolerance. Algorithm 2 details the complete PoW and difficulty verification procedure.
Algorithm 2 Proactive PoW Difficulty Validation
Require: 
block b, parent p, current difficulty D c u r
  1:
hash ← SHA256(SHA256(b.header))
  2:
if hash D c u r  then
  3:
   return Reject
  4:
end if
  5:
expectedDiff ← computeExpectedDifficulty(p, DAA_params)
  6:
tolerance 1.3
  7:
if  b . d i f f i c u l t y > tolerance × expectedDiff   then
  8:
   return Reject
  9:
end if
10:
if b . d i f f i c u l t y < expectedDiff / tolerance then
11:
   addWarning(b, “DifficultyDeviation”)
12:
end if
13:
return Accept

5.2. Phase 2: Reactive Chain Analysis

Phase 2 operates asynchronously with full chain history, performing controller-aligned detection. This phase is critical for identifying coordinated wave patterns that are invisible to local checks.

5.2.1. Controller-Aligned Window Maintenance

Detection windows are aligned to DAA adjustment boundaries to ensure consistency with the control loop. Algorithm 3 describes the window maintenance and anomaly detection procedure.
Algorithm 3 Detection Window Maintenance
Require: 
new block b, window size W, target interval T
  1:
window.append(b)
  2:
if window.size > W  then
  3:
   window.popFront()
  4:
end if
  5:
if window.size = = W AND window.lastBlock.height mod W = = 0  then
  6:
   intervals ← computeIntervals(window)
  7:
    μ mean(intervals), σ std(intervals)
  8:
   for each operator o in window do
  9:
      z o computeZScore(o.intervals, μ , σ )
10:
    if  | z o | > 2.5  then
11:
        flagOperator(o, window.id)
12:
     end if
13:
   end for
14:
end if

5.2.2. Difficulty-Phase Concentration Detection

Wave attackers harvest blocks during suppressed-difficulty phases. We detect operators whose block production is concentrated in low-difficulty periods. Algorithm 4 implements difficulty-phase concentration detection.
Algorithm 4 Difficulty Phase Concentration Detection
Require: 
window W with blocks { b i } , operator o
  1:
D m e d median( { b i . d i f f i c u l t y } )
  2:
blocksLowPhase 0 , blocksTotal 0
  3:
for  b W where operator(b) = = o  do
  4:
   blocksTotal++
  5:
   if  b . d i f f i c u l t y < D m e d  then
  6:
     blocksLowPhase++
  7:
   end if
  8:
end for
  9:
concentration ← blocksLowPhase/blocksTotal
10:
if concentration > 0.7 AND blocksTotal > 5  then
11:
   flagOperator(o, “DifficultyConcentration”)
12:
end if

5.2.3. Temporal Overlap Grouping

Colluding attackers coordinate their withdrawal and harvest phases. We group operators exhibiting temporal overlap in suspicious activity. Algorithm 5 presents the overlap grouping and group activity analysis. Parameter selection ( Δ t = 120 s overlap threshold, β G > 0.15 hash fraction threshold) is informed by sensitivity analysis presented in Figure 3.
Algorithm 5 Temporal Overlap Grouping (Union-Find)
Require: 
flagged operators { o i } with time ranges [ t s t a r t i , t e n d i ]
  1:
UnionFind UF
  2:
for each pair ( o i , o j ) where i < j  do
  3:
   overlap ← computeOverlap( [ t s t a r t i , t e n d i ] , [ t s t a r t j , t e n d j ] )
  4:
   if overlap > 120 s then
  5:
     UF.union( o i , o j )
  6:
   end if
  7:
end for
  8:
groups ← UF.getGroups()
  9:
for each group G do
10:
    β G sum of hashrate fractions in G
11:
   if  β G > 0.15  then
12:
     reportCollusionGroup(G)
13:
   end if
14:
end for
Figure 3. Sensitivity analysis for collusion grouping. (a) ROC curves for temporal overlap window: the dashed diagonal line represents random classifier performance; Δ t = 120 s achieves optimal trade-off (TPR = 0.88, FPR = 0.07). (b) F1-score vs share threshold: dashed vertical lines mark clump bounds [20%, 50%] that maximize detection while controlling false positives.

5.2.4. Main Analysis Pipeline

Algorithm 6 provides the high-level structure of the main chain analysis procedure.
Algorithm 6 Chain Window Analysis
Require: 
chain window W, target interval T, FDR threshold α
  1:
{Step 1: Compute window-level statistics}
  2:
intervals ← computeIntervals(W)
  3:
μ mean(intervals), σ std(intervals)
  4:
{Step 2: Per-operator anomaly scoring}
  5:
operatorScores ← empty map
  6:
for each operator o active in W do
  7:
    z o computeZScore(o.intervals, μ , σ )
  8:
   operatorScores[o] z o
  9:
end for
10:
{Step 3: Difficulty-phase analysis}
11:
for each operator o do
12:
   concentration ← difficultyPhaseConcentration(o, W)
13:
   if concentration > 0.7  then
14:
     operatorScores[o] += penaltyForConcentration
15:
   end if
16:
end for
17:
{Step 4–5: Temporal grouping}
18:
flaggedOps ← operators where operatorScores[o] > threshold
19:
groups ← groupByTemporalOverlap(flaggedOps)
20:
{Step 6–7: Group activity analysis}
21:
for each group G do
22:
    β G sum of hashrates in G
23:
   ratioG β G /totalNetworkHashrate
24:
   if ratioG > dynamicGroupThreshold() then
25:
     for op G  do
26:
        op.groupParticipation++
27:
        op.powWaveCount++
28:
        report ( G )
29:
     end for
30:
   end if
31:
end for
32:
{Step 8: Generate P-Values from Anomaly Scores}
33:
p_values ← empty list
34:
for each operator o with anomaly score z o  do
35:
    p o 2 · ( 1 Φ ( | z o | ) ) {Two-tailed z-test}
36:
   p_values.append( p o )
37:
end for
38:
{Step 9: Apply Benjamini-Hochberg FDR Control}
39:
Sort p_values: p ( 1 ) p ( 2 ) p ( m )
40:
k * max { k : p ( k ) ( k / m ) · α }
41:
final_flags ← operators corresponding to { p ( 1 ) , , p ( k * ) }
42:
commitFlagsToSecurityState(final_flags)

5.2.5. Timestamp Manipulation Forensics

Beyond inter-block timing, we detect timestamp manipulation where confirmed block timestamps deviate significantly from transaction timestamps. Algorithm 7 implements timestamp manipulation forensics.
Algorithm 7 Block Timestamp Manipulation Analysis
Require: 
block b with transactions { t x }
  1:
minor, major, critical 0
  2:
for tx in b do
  3:
    Δ | t x . confirmedTs t x . unconfirmedTs |
  4:
   if  Δ > 12 h then
  5:
     critical++
  6:
   else if  Δ > 6 h then
  7:
     major++
  8:
   else if  Δ > 3 h then
  9:
     minor++
10:
  end if
11:
end for
12:
if (minor+major+critical) > 0  then
13:
   weighted ← minor + 2 · major + 4 · critical
14:
   op ← operator ( b )
15:
   op.tsManipulationCount += weighted
16:
   addDetailedTsReport(op, h, minor, major, critical, weighted)
17:
end if
Having detailed the dual-phase architecture and detection mechanisms, we now proceed to the implementation and empirical evaluation of the framework.

6. Implementation and Evaluation

6.1. Experimental Setup

We implemented the framework in GRIDNET OS and deployed it on a 128-node testbed spanning four data centers simulating Bitcoin, Ethereum Classic (ETC), and Monacoin networks. Each experiment ran for 30 days with target T = 600 s and window W = 144  blocks.
Attack Configuration: Standard wave attack with the following:
  • Withdrawal phase: Duration τ o f f = 2 W (288 blocks). Adversaries reduce mining to 10% capacity.
  • Harvest phase: Duration τ o n = W (144 blocks). Adversaries deploy full 100% capacity.
  • Cycle period:  τ c y c l e = 3 W = 432 blocks ≈ 72 h.
Adversaries controlled β { 0.15 , 0.25 , 0.35 } of network hashrate, starting attacks at uniformly random offsets.
Statistical Methodology: All experiments were repeated N = 30 times with different random seeds. We report mean ± standard deviation and compute 95% confidence intervals using bias-corrected bootstrap resampling (10,000 iterations). The “±” notation denotes standard deviation (SD) across the 30 runs. Statistical significance was assessed using paired t-tests with Bonferroni correction ( α = 0.05 / 3 = 0.0167 ). Effect sizes were computed using Hedges’ g to quantify practical significance beyond statistical significance.
Baseline Detector: Simple variance-based detector that flags operators whose mined blocks exhibit inter-block time variance exceeding μ h i s t + 3 σ , without collusion grouping, difficulty-phase analysis, or cooldown windows.

6.2. Evaluation Metrics

  • Detection performance: Precision, Recall, F1-score, false positive rate (FPR), Area Under Curve (AUC) for ROC analysis
  • Adversary profit (%): We define profit percentage relative to honest baseline as
    Profit ( % ) = 100 × Attacker ROI Honest ROI | Honest ROI |
    where ROI (return on investment) is the ratio of rewards earned to expected rewards under proportional mining. A negative profit indicates the attacker loses more than they would earn through honest mining. For example, 150 % means the attacker’s losses are 1.5 times their expected honest revenue.
  • Profit suppression: Reduction in adversary’s profit relative to honest miner baseline.
  • Latency: Average time between attack onset and detection.

7. Results

7.1. Detection Performance

Table 2 summarizes results across 30 independent runs. All values are mean (±SD) with 95% confidence intervals computed via bias-corrected bootstrap.
Table 2. Detection performance across networks (30 runs).
Our framework achieves 92.7% F1-score (95% CI: [91.2, 94.1]) for Bitcoin, significantly outperforming baseline (74.7%, 95% CI: [71.5, 77.8]; p < 0.001 , paired t-test; Hedges’ g = 7.84 , large effect). Average adversary profit was reduced from 145% (baseline) to 65% (our framework), representing a suppression of 80 percentage points (55.2% relative reduction). Average detection latency: 2.8 h.

7.2. Ablation Study

Table 3 quantifies component contributions. All comparisons use paired t-tests with Bonferroni correction.
Table 3. Ablation study: component contributions.
Removing union-find grouping causes the largest drop (−14.7 F1, Hedges’ g = 6.21 ), demonstrating its critical role in identifying transitive collusion. Disabling cooldown increases false positives by 10.9 percentage points while reducing F1 by 9.6 points. Disabling difficulty-phase features drops recall by 20 points. The FDR control mechanism reduces false positive rate (FPR) from 18.0% to 3.4%. We clarify the distinction: FDR (False Discovery Rate) is the expected proportion of false discoveries among all discoveries, while FPR (false positive rate) is the proportion of honest miners incorrectly flagged. Our framework achieves target FDR α = 0.05 with empirical FDR of 4.1% ± 0.8% and FPR of 3.4% ± 0.8%, both comfortably below the 5% threshold.

7.3. Sensitivity Analysis

Economic Deterrence Sensitivity: Figure 4 presents the minimum penalty-vesting product ϖ v required for deterrence across varying detection probability p 0 and difficulty suppression ratio r s . The analysis reveals the following:
Figure 4. Sensitivity of minimum penalty-vesting product ( ϖ v ) to detection probability ( p 0 ) and difficulty suppression ratio ( r s ). Lower r s (deeper suppression) and higher p 0 reduce deterrence threshold. Operating point ( p 0 = 0.18 , ϖ v = 2.0 , r s = 0.7 ) provides safety margin across parameter regimes.
  • Deeper difficulty suppression ( r s 0.5 ): requires higher ϖ v to maintain deterrence due to increased attack profitability.
  • Higher detection probability ( p 0 0.8 ): significantly reduces required ϖ v , improving capital efficiency.
  • Operating point ( p 0 = 0.18 , ϖ v = 2.0 ): a conservative choice providing robustness against parameter uncertainty.
Having demonstrated strong empirical performance, we now establish the formal economic foundations that validate why our framework provides effective deterrence. We prove that when penalties are levied on unvested rewards, rational adversaries cannot sustain profitable wave attacks.

8. Theoretical Validation: Formal Economic Deterrence

Key Insight: Wave attacks succeed by harvesting blocks during suppressed-difficulty phases. However, if detection occurs before rewards vest, and governance penalizes unvested rewards, the expected forfeited rewards exceed the attack profit. We formalize this intuition below.

8.1. Symbol Definitions for Economic Analysis

  • G ( D ¯ , T ) : Expected gain function quantifying profit from reduced difficulty, where D ¯ a t t a c k is mean difficulty during attack and D ¯ h o n e s t during honest mining.
  • n a b s : Number of blocks abstained during withdrawal phase.
  • β d r i f t : Fraction of adversarial hashrate temporarily offline during difficulty suppression.
  • ϖ : Penalty multiplier on unvested rewards (governance parameter, ϖ 1 ).
  • v: Fraction of rewards unvested at detection time ( v [ 0 , 1 ] ).
  • R: Per-block reward (protocol-specified).
  • γ : Minimum fraction of DAA window exhibiting anomalous behavior for detection ( γ [ 0 , 1 ] ).
  • p 0 : Lower bound on detection probability per cycle.
  • r s = D ¯ a t t a c k / D ¯ h o n e s t : Difficulty suppression ratio.

8.2. Main Theorem

Intuition: Consider a wave attacker who gains extra blocks through difficulty manipulation (benefit) but faces penalty on unvested rewards when detected (cost). The key insight is that if detection probability p 0 is high enough and penalty ϖ is large enough, the expected cost exceeds the benefit. Theorem 1 quantifies the exact threshold where attacks become unprofitable. The proof establishes three key results: (1) detection probability increases with difficulty suppression depth, (2) expected penalties scale with flagged blocks, and (3) rational attackers face negative expected payoff when ϖ v > ( 1 / p 0 ) · ( 1 r s ) .
Theorem 1
(Negative Drift Under Armed Analytics). Under Assumptions A1–A4, assume: (i) controller-aligned detection yields p f l a g p 0 > 0 for strategies driving average interval below ( 1 θ ) T for γ W blocks; (ii) expected lost reward per cycle is L = v ϖ · E [ flagged blocks ] .
Then attacker’s net expected payoff satisfies
E [ Δ Payoff ] β · G ( D ¯ , T ) p 0 L ( 1 β d r i f t ) β R · n a b s < 0
for ϖ v > ( 1 / p 0 ) · ( 1 D ¯ a t t a c k / D ¯ h o n e s t ) , where the expected gain function is
G ( D ¯ , T ) = R · W · β · D ¯ h o n e s t D ¯ a t t a c k 1
representing the profit from mining at reduced difficulty relative to honest baseline.
Proof. 
(1) Detection Probability Lower Bound. Using the Non-Homogeneous Poisson Process (NHPP) model with explicit dependency on attack scheduling parameters, during the harvest phase with instantaneous rate λ a t t a c k = H / D l o w , where D l o w = r s · D h o n e s t , the probability a single block interval falls below ( 1 θ ) T is
δ = P ( Δ t < ( 1 θ ) T ) = 1 exp 1 θ r s
where r s = D l o w / D h o n e s t is the difficulty suppression ratio. This dependency is critical: lower r s (deeper difficulty suppression) yields higher δ (stronger detection signal). For typical parameters r s 0.7 , θ = 0.5 : δ 0.51 .
Across γ W blocks exhibiting anomalous timing (where γ W represents the minimum contiguous suspicious window), the probability of flagging at least one block is
p f l a g = 1 ( 1 δ ) γ W
Under a weak dependence assumption, treating these events as independent Bernoulli trials provides a conservative lower bound. For typical attack parameters with γ = 0.4 , W = 144 : p f l a g 1 ( 0.49 ) 57.6 > 0.999999 , representing strong attack signatures with sustained anomalous behavior across 40% of the detection window.
However, sophisticated adversaries may employ minimal attack signatures to evade detection by carefully modulating attack intensity. To establish a conservative lower bound that ensures economic deterrence even against highly evasive adversaries, we consider worst-case scenarios where only γ W 20 blocks exhibit detectable anomalies (rather than 57.6). This corresponds to adversaries who strategically limit their exploitation to brief bursts synchronized with DAA boundaries. For this minimal signature,
p 0 = 1 ( 1 δ ) 20 = 1 ( 0.49 ) 20 0.18
This conservative bound captures the detection probability floor for stealthy attacks. For reference, intermediate attack intensities yield the following: γ W = 30 p 0 0.37 ; γ W = 40 p 0 0.61 ; γ W = 50 p 0 0.82 . By using p 0 = 0.18 throughout our economic analysis, we ensure deterrence guarantees hold even for adversaries who minimize their detection footprint.
(2) Expected Loss Calculation. When armed with penalty factor ϖ on unvested fraction v, flagged blocks forfeit ϖ v R per block, the expected loss per cycle is
L = ϖ v R · E [ # flagged   blocks ] = ϖ v R · β W · ( D ¯ h o n e s t / D ¯ a t t a c k ) · p f l a g
The term β W · ( D ¯ h o n e s t / D ¯ a t t a c k ) represents expected blocks mined during harvest given difficulty suppression.
(3) Net Payoff Analysis. For negative expected payoff, we require
β · G ( D ¯ , T ) p 0 L ( 1 β d r i f t ) β R · n a b s < 0
Solving for minimum penalty-vesting product,
ϖ v > 1 p 0 · G ( D ¯ , T ) ( 1 β d r i f t ) R · n a b s R · W · ( D ¯ h o n e s t / D ¯ a t t a c k ) 1 p 0 · 1 D ¯ a t t a c k D ¯ h o n e s t
For concrete parameters, p 0 0.18 , D ¯ a t t a c k / D ¯ h o n e s t 0.7 implies ϖ v ( 1 / 0.18 ) · 0.3 1.67 .
Safety Margin Justification: Setting ϖ v 2.0 provides a 20% safety margin ( 2.0 / 1.67 1.20 ) above the theoretical minimum, ensuring robust deterrence across parameter uncertainty. This margin accounts for multiple sources of estimation error and network variability:
  • Detection probability variance: Actual p f l a g varies with specific attack patterns; using point estimate p 0 = 0.18 introduces conservative bias.
  • Difficulty suppression estimation: Ratio D ¯ a t t a c k / D ¯ h o n e s t computed from finite samples with ± 10 % standard error.
  • Network dynamics: Transient hashrate fluctuations can temporarily reduce effective detection probability by 5–15%.
  • Governance feasibility: Value ϖ v = 2.0 represents practical compromise between deterrence strength and community acceptability.
Sensitivity analysis (Figure 4) confirms this 20% margin maintains strictly negative expected attacker payoff even under combined 15% parameter estimation errors, providing robustness guarantees essential for production deployment.    □
Dimensional Analysis: We verify dimensional consistency explicitly:
  • Gain function: G ( D ¯ , T ) = R · W · β · ( D ¯ h o n e s t / D ¯ a t t a c k 1 ) has units [reward/block] × [blocks] × [dimensionless] × [dimensionless] = [reward] per cycle. ✓
  • Expected loss: L = ϖ v R · β W · ( D ¯ h o n e s t / D ¯ a t t a c k ) · p f l a g has units [dimensionless] × [dimensionless] × [reward/block] × [dimensionless] × [blocks] × [dimensionless] × [dimensionless] = [reward] per cycle. ✓
  • Abstention cost: n a b s R has units [blocks] × [reward/block] = [reward] per cycle. ✓
All terms in the expected payoff equation are denominated in [reward] per cycle, confirming dimensional consistency.
With the theoretical economic deterrence validated, we now discuss the security properties and inherent limitations of our static framework. Section 9.1 examines robustness guarantees, while Section 9.2 addresses fundamental limitations that motivate the adaptive mechanisms in Part II.

9. Security Analysis and Limitations

9.1. Robustness

Union-find grouping effectively identifies colluding operators through transitive closure over temporal overlaps. Dynamic cooldown windows mitigate bursty false positives by requiring sustained anomalous behavior across multiple DAA windows. FDR control via the Benjamini–Hochberg procedure ensures that honest miners are penalized with probability at most α (empirical FDR: 4.1% ± 0.8%, confirming the target of 5%).
The controller-aligned detection achieves strong theoretical guarantees: when ϖ v 2.0 and p 0 0.18 , Theorem 1 proves that rational attackers face negative expected payoff. This deterrence holds across a range of difficulty suppression ratios ( r s [ 0.5 , 0.9 ] ) as shown in Figure 4.

9.2. Limitations and Future Work

While our framework demonstrates strong performance against standard wave attacks (92.7% F1-score, 95% CI: [91.2, 94.1]), several fundamental limitations arise from its static, rule-based architecture:

9.2.1. Feasibility of Penalty Enforcement

A critical question regarding the proposed framework is the mechanism of enforcement. We distinguish between autonomous enforcement and social consensus. Autonomous enforcement, implemented directly into the Layer 1 software of any compatible blockchain (e.g., GRIDNET Core version 1.8.8 in our deployment), via smart contracts or native protocol logic, is the preferred approach for the proposed framework.
In a healthy proof-of-work system, the majority of nodes maintain a coherent view of the global system state. Therefore, heuristics applied to the history of events will produce identical security analyses across all honest nodes. For example, in GRIDNET OS, executing the chain-sec command on independent nodes
Conversely, “social consensus” (manual voting on penalties) is ill-suited for this framework due to latency issues. It is difficult to ensure that human voters can react fast enough to enforce penalties before rewards are withdrawn. Furthermore, relying on voting introduces the risk of Sybil attacks on the judicial process itself. Therefore, we advocate for autonomous enforcement with parameters that are governable but algorithmically executed.

9.2.2. Parameter Selection and Governance Challenges

Our framework requires governance to set the penalty factor ϖ . In practice, this faces significant challenges:
1.
Community resistance: High penalties may be perceived as authoritarian, creating political friction within decentralized communities. Blockchain governance often prioritizes minimizing intervention, making aggressive penalty regimes difficult to implement.
2.
Optimal parameter uncertainty: The required ϖ depends on detection probability p 0 , which varies with attack characteristics. Setting ϖ too low fails to deter attacks; setting it too high risks over-penalizing honest miners during false positives, eroding trust in the system.
3.
Consensus requirement: Parameter updates require community consensus, which can take months or years. Adversaries can exploit this inertia by adapting faster than governance can respond.
4.
Capital efficiency trade-offs: Longer vesting periods V improve detection window coverage but reduce capital efficiency for honest miners who must wait longer to access rewards. This creates tension between security and economic competitiveness.

9.2.3. Adaptive Adversaries and the Arms Race

The most critical limitation is vulnerability to intelligent, adaptive adversaries. Our static framework relies on fixed thresholds (e.g., z-score cutoffs, temporal overlap windows, difficulty concentration bounds). Sophisticated attackers can carry out the following:
1.
Gradual intensity reduction: Slowly decrease attack amplitude over time to stay below detection thresholds while still earning modest excess profits. For example, reducing difficulty suppression from r s = 0.7 to r s = 0.85 may halve the detection probability while retaining 30% of attack profits.
2.
Randomized attack patterns: Introduce stochastic variation in withdrawal/harvest phase durations to break temporal correlations that union-find grouping relies on. By decorrelating attack phases across cycles, adversaries can fragment their signature across multiple detection windows.
3.
Threshold probing: Conduct exploratory attacks at varying intensities to map out detection boundaries, then operate just below the threshold. This is analogous to adversarial machine learning attacks where adversaries probe model decision boundaries.
4.
Multi-timescale attacks: Operate across multiple timescales (e.g., mixing short 1-week cycles with long 3-month cycles) to exploit different detection window sizes and confuse statistical aggregators.
5.
Exploiting parameter knowledge: If detection thresholds become public knowledge (as required for transparency in open blockchain governance), adversaries can reverse-engineer optimal attack strategies that maximize profit while minimizing detection risk.
Empirical evidence of adaptation: In our extended experiments (not shown due to space constraints), we simulated an “intelligent adversary” that gradually reduced attack intensity based on historical detection outcomes. After initial detection events, the adversary learned to operate at 60% intensity (targeting r s = 0.85 instead of r s = 0.7 ), recovering 35% profitability while reducing the detection rate from 92.7% to 58%. This demonstrates that static defenses, while highly effective initially, can be circumvented through adaptive learning.

9.2.4. Detection Latency and Vesting Window Constraints

Detection latency depends on DAA window size W. For Bitcoin’s W = 2016 blocks (≈2 weeks), detection may require multiple cycles to accumulate sufficient evidence. This necessitates long vesting periods ( V 100 blocks for Bitcoin), constraining capital velocity and potentially disadvantaging honest miners economically.

9.2.5. False Positive Impact on Network Stability

While FDR control bounds the probability of falsely penalizing honest miners (≤ 5 % ), even low false positive rates can erode trust if penalties are severe. A single false penalty event may trigger community backlash, reducing the willingness to deploy deterrence mechanisms. This creates a social acceptability constraint beyond the mathematical guarantees.

9.2.6. Motivating Part II: The Need for Adaptive Defenses

These limitations highlight a fundamental challenge: security is not a one-time design problem but an ongoing co-evolutionary arms race. Static rules, no matter how sophisticated, eventually become obsolete as adversaries adapt. This observation motivates the development of a dynamic, AI-driven defense mechanism capable of engaging in this arms race—a topic we address comprehensively in Part II [14].
Part II introduces a deep reinforcement learning (DRL) framework that
  • Continuously adapts detection thresholds based on observed attack patterns;
  • Learns optimal penalty schedules dynamically without requiring governance intervention for every adjustment;
  • Engages in game-theoretic co-evolution with adaptive adversaries;
  • Maintains provable convergence properties while offering superior empirical performance against intelligent attackers.
Together, the static framework (Part I) and adaptive DRL defenses (Part II) provide a comprehensive, multi-layered solution for securing PoW blockchains against wave attacks. The static framework establishes a robust baseline with formal guarantees, while the adaptive layer ensures long-term resilience against evolving threats.

10. Conclusions

Summary of Contributions: This paper introduced the first production-ready framework for detecting and mitigating PoW wave attacks with formal economic guarantees. Our dual-phase architecture achieves a 92.7% F1-score while maintaining network liveness, significantly outperforming existing approaches ( p < 0.001 , large effect size: Hedges’ g = 7.84 ).
We presented a statistically grounded framework that separates proactive validity checks from reactive, controller-aligned forensic analysis. This architectural separation is critical: it preserves liveness by accepting blocks optimistically while enabling comprehensive forensic analysis with full historical context. The system delivers rigorous detection through controller-aligned anomaly statistics, transitive union-find grouping, dynamic cooldown windows, and Benjamini–Hochberg FDR control.
Our formal economic proofs establish that under vesting-aware penalties, rational attackers cannot sustain profitable wave strategies. When the penalty-vesting product ϖ v 2.0 and detection probability p 0 0.18 , Theorem 1 proves that expected attacker payoff becomes strictly negative while honest mining remains profitable. Implementation on a 128-node distributed testbed across Bitcoin, Ethereum Classic, and Monacoin networks validates these theoretical guarantees with strong empirical performance.
The dual-phase architecture achieves three critical objectives: (1) liveness preservation through optimistic block acceptance with minimal real-time checks, (2) robust detection via controller-aligned forensic analysis with FDR control, and (3) economic deterrence through formal proofs that penalties on unvested rewards make attacks asymptotically unprofitable.
While highly effective against non-adaptive attackers, fixed parameters limit long-term efficacy against intelligent adversaries who can gradually reduce attack intensity or randomize patterns to evade detection. This inherent limitation of static defenses motivates the development of adaptive mechanisms. Our companion paper (Part II) [14] addresses this challenge through deep reinforcement learning, creating a dynamic defense capable of engaging in co-evolutionary arms races with adaptive adversaries. Together, these papers provide a comprehensive solution for securing PoW blockchains across the full threat spectrum: from standard attacks (Part I) to intelligent, evolving adversaries (Part II).
Finally, we acknowledge that static detection thresholds may eventually be circumvented by adaptive adversaries. As a direct continuation of this work, Part II of this series will evaluate the application of artificial intelligence and deep reinforcement learning to this domain. Future work will focus on comparing the static, deterministic methodologies presented herein against non-deterministic, AI-driven detection agents to establish a comprehensive defense-in-depth strategy.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data and code supporting the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The author declares no conflicts of interest.

References

  1. Eyal, I.; Sirer, E.G. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 2018, 61, 95–102. [Google Scholar] [CrossRef]
  2. Nayak, K.; Kumar, S.; Miller, A.; Shi, E. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In Proceedings of the 2016 IEEE European Symposium on Security and Privacy, Saarbrücken, Germany, 21–24 March 2016; pp. 305–320. [Google Scholar]
  3. Skowroński, R. The open blockchain-aided multi-agent symbiotic cyber–physical systems. Future Gener. Comput. Syst. 2019, 94, 430–443. [Google Scholar] [CrossRef]
  4. Skowroński, R.; Brzeziński, J. UI dApps meet decentralized operating systems. Electronics 2022, 11, 3004. [Google Scholar] [CrossRef]
  5. Skowroński, R.; Brzeziński, J. SPIDE: Sybil-proof, incentivized data exchange. Cluster Comput. 2022, 25, 2241–2270. [Google Scholar] [CrossRef]
  6. Bar-Zur, R.; Eyal, I.; Tamar, A. Undetectable Selfish Mining. arXiv 2023, arXiv:2309.06847. [Google Scholar]
  7. Hu, J.; Duan, S. Timestamp Manipulation: Timestamp-Based Nakamoto-Style Blockchains are Vulnerable. arXiv 2024, arXiv:2405.05328. [Google Scholar]
  8. Li, S.N.; Campajola, C.; Tessone, C.J. Statistical detection of selfish mining in proof-of-work blockchain systems. Sci. Rep. 2024, 14, 6251. [Google Scholar] [CrossRef] [PubMed]
  9. Sapirshtein, A.; Sompolinsky, Y.; Zohar, A. Optimal selfish mining strategies in Bitcoin. In Proceedings of the 19th International Conference on Financial Cryptography and Data Security, San Juan, Puerto Rico, 26–30 January 2015; pp. 515–532. [Google Scholar]
  10. Meshkov, D.; Chepurnoy, A.; Jansen, M. Short Paper: Revisiting Difficulty Control for Blockchain Systems. In Proceedings of the International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, Barcelona, Spain, 7 September 2017; pp. 429–436. [Google Scholar]
  11. Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance. In Proceedings of the 3rd Symposium on Operating Systems Design and Implementation, New Orleans, LA, USA, 22–25 February 1999; pp. 173–186. [Google Scholar]
  12. Buterin, V.; Hernandez, D.; Kamphefner, T.; Pham, K.; Qiao, Z.; Ryan, D.; Sin, J.; Wang, Y.; Zhang, Y.X. Combining GHOST and Casper. arXiv 2020, arXiv:2003.03052. [Google Scholar] [CrossRef]
  13. Kiayias, A.; Koutsoupias, E.; Kyropoulou, M.; Tselekounis, Y. Blockchain mining games. In Proceedings of the 2016 ACM Conference on Economics and Computation, Maastricht, The Netherlands, 24–28 July 2016; pp. 365–382. [Google Scholar]
  14. Skowroński, R. Adaptive threat mitigation in PoW blockchains (Part II): A Deep Reinforcement Learning Approach to Countering Evasive Adversaries. Poznan University of Technology: Poznań, Poland, 2025; manuscript in preparation. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.