An attacker creates thousands of pseudonymous nodes on a peer-to-peer network to gain a disproportionately large influence. By controlling a significant number of these fake identities, the attacker aims to out-vote honest participants or disrupt network operations. Which type of attack does this scenario describe?
-
A
Eclipse Attack
-
B
51% Attack
-
C
Sybil Attack
-
D
Timejacking Attack