%0 Conference Proceedings %T Digital Forensic Implications of Collusion Attacks on the Lightning Network %+ Norwegian University of Science and Technology [Trondheim] (NTNU) %A Piatkivskyi, Dmytro %A Axelsson, Stefan %A Nowostawski, Mariusz %Z Part 4: Threat Detection and Mitigation %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 13th IFIP International Conference on Digital Forensics (DigitalForensics) %C Orlando, FL, United States %Y Gilbert Peterson %Y Sujeet Shenoi %I Springer International Publishing %3 Advances in Digital Forensics XIII %V AICT-511 %P 133-147 %8 2017-01-30 %D 2017 %R 10.1007/978-3-319-67208-3_8 %K Bitcoin %K Lightning Network %K Audit trail %Z Computer Science [cs]Conference papers %X The limited size of a block in the Bitcoin blockchain produces a scaling bottleneck. The transaction scalability problem can be addressed by performing smaller transactions off-chain and periodically reporting the results to the Bitcoin blockchain. One such solution is the Lightning Network.Bitcoin is employed by lawful users and criminals. This requires crimes against lawful users as well as the use of Bitcoin for nefarious purposes to be investigated. However, unlike Bitcoin, the Lightning Network enables collusion attacks involving intermediate nodes and recipients. In such an attack, regardless of a sender’s actions, money is received by an intermediate node that colludes with a dishonest recipient. Since the dishonest recipient does not “actually” receive the money, it does not provide the goods/service to the sender. Thus, the sender pays for the unprovided goods/service, but the recipient can prove that the payment was not received.This chapter discusses the forensic implications of collusion attacks with regard to lawful users because no discernible traces of attacks remain, as well as for law enforcement, where the attacks can target parties as a form of forfeiture, analogous to law enforcement “sting” operations. This chapter also discusses the potential of the Lightning Network to be used for money laundering activities. %G English %Z TC 11 %Z WG 11.9 %2 https://inria.hal.science/hal-01716400/document %2 https://inria.hal.science/hal-01716400/file/456364_1_En_8_Chapter.pdf %L hal-01716400 %U https://inria.hal.science/hal-01716400 %~ IFIP-LNCS %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-DF %~ IFIP-WG11-9 %~ IFIP-AICT-511