Whitepaper
  • Whitepaper
  • Terminology
  • Abstract
  • Introduction
  • Vision
  • Overview
    • Current Problems of Existing Blockchain Networks
      • Trilemma
      • Transaction Speed
      • User Experience
      • Software Development
      • Decentralization
    • Metatime Solution
  • MetaChain
    • An Overview for MetaChain
    • MetaAnthill
    • EVM to MVM
    • MetaChain Consensus Mechanism: PoM
    • Transaction Check Per Second (TCPS)
  • Proof of Meta Consensus Mechanism
    • MetaMiner (MPoS & MetaAnthill)
      • Fees and Rewards
    • MacroMiner (MPoH & MetaAnthill)
      • Archive Node
      • Full Node
      • Light Node
    • MicroMiner (MPoSW & MetaAnthill)
  • Scalability
    • Blockchain Network Structure
    • Energy Consumption
  • Smart Contract
    • Smart Contract Compatibility
    • Smart Contract Fees
  • Transaction
    • Transaction Fees
  • Attack Vectors & Security
    • Transaction Denial
    • Eclipse Attack
    • Double Spending
  • Native Token
    • Metatime Coin (MTC)
    • Token Burning
      • Transaction Fee Burning
      • Constant Burning
  • Experimental Results
  • Information
  • Audit
  • Solution and Conclusion
    • Focused on 'Human'
  • References
  • Disclaimer
Powered by GitBook
On this page
  1. Attack Vectors & Security

Transaction Denial

PreviousAttack Vectors & SecurityNextEclipse Attack

Last updated 1 year ago

Transaction denial is a type of attack in which the attacker aims to disrupt the functioning of the network structure by creating a density in the network. Attackers trying to unsynchronized the network structure via multiple operations in the MetaChain network get hooked on MetaAnthill technology.

If the transaction requests sent by the same user to the MetaChain network are of an unusual density and format, MetaAnthill directly rejects the requests and prevents them from being forwarded to the nodes. Thus, artificial processing density is prevented from the first step, and the synchronization problem and unnecessary traffic that the attacker attempts to create in the nodes is prevented.