Here is a good topic
[1] that discussed Eclipse Attack, it is the most detailed one I could find that contains relevant and recent information, like this article
[2] which talks about the implications of such an attack, many of which fixes has been implemented in subsequent versions of Bitcoin core
[3][1]
https://bitcointalk.org/index.php?topic=5468788.20Very interesting topic. The op used a good pictorial representation to make an explanation. But I observed that there seem to be contradiction, as few people couldn't agree that the quoted text below is part of what a supposed attacker can do. Any clarification on that?.
Broadcast fake transactions
I will go through this.
1. Anyone can become the target. But i expect there's more reason to attack node owned by miner/pool rather than random node.
Makes proper sense to me now.
3. while Sybil Attack is about attack where you gain influence/power by running node/create multiple fake identity. Although in case of Bitcoin, running lots of node doesn't let anyone perform Sybil attack.
Could this be possible on the Ethereum network?
And I also noticed this reply:
Mining pools can't accept the incoming connection of dozens of thousands of Bitcoin nodes, and neither should they. The network is peer-to-peer. That's why we have DNS seeds.
So, If I decide to run a full node, then my node will have to connect to other people's node who are within same geo-location(region) with me?, Rather than connecting to the pool directly?.