The attacker now only needs to connect to every identified minerwith especially fast nodes. With judicious use of DoS attacks and low
latency .....
The correct, and rational, approach for a miner is to always mine to
extend the block that the majority of hashing power is trying to extend.
Mining strategy is now to mine to extend the first block you see, on the
assumption that the earlier one probably propagated to a large portion
of the total hashing power. But as you receive "near-blocks" that are
under the PoW target, use them to estimate the hashing power on each
fork, and if it looks like you are not on the majority side, switch.