The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1002/spe.2972
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain‐based Cyber Attack Detection Scheme for Decentralized Internet of Things using Software‐Defined Network

Abstract: Due to using less secured and movable devices in Internet of Things (IoT) platform, cyber‐attacks have been a major issue nowadays. Different researches have been conducted to detect the probable security attacks, but faced constraints like storage, computation cost, system failure and high latency. Existing systems require continuous monitoring, controlling, and collecting the data in entire network for delivering services with the maximum security and defense mechanism against cyber‐attacks. In this context,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 36 publications
0
15
0
Order By: Relevance
“…Immutability [27]- [38], [38]-[53] Traceability [29], [31]- [33], [36], [38], [38], [43], [46], [48], [49], [54], [55] Transparency [29], [31]- [33], [35]- [39], [52], [53], [55]-[58] Decentralization [27], [29]- [31], [34], [36], [38]- [49], [52]- [54],…”
Section: Bc Advantages Proposalsmentioning
confidence: 99%
See 1 more Smart Citation
“…Immutability [27]- [38], [38]-[53] Traceability [29], [31]- [33], [36], [38], [38], [43], [46], [48], [49], [54], [55] Transparency [29], [31]- [33], [35]- [39], [52], [53], [55]-[58] Decentralization [27], [29]- [31], [34], [36], [38]- [49], [52]- [54],…”
Section: Bc Advantages Proposalsmentioning
confidence: 99%
“…Several works employ deep learning approaches to train the network to discern between valid and attack data. [27] proposes a distributed attack detection system using an Ethereum BC for IoT networks. The method focuses on dynamic traffic flow control and addresses TCP and ICMP flooding and DDoS attacks.…”
Section: ) Attack Detection and Mitigationmentioning
confidence: 99%
“…Several SDN controllers deployed in the cloud and in the fog are connected through a private blockchain in [38] in order to detect cyber attacks applying deep learning techniques. More precisely, the blockchain is harnessed to enhance failure tolerance among cooperating SDN controllers and provide a decentralized attack identification scheme.…”
Section: State Of the Artmentioning
confidence: 99%
“…Data analysis methods were used extensively in the cyber security field, and the current diffusion of advanced machine learning (ML) methods has permitted to precisely detect cyber-attacks and identify threats [1], both in post-incident analysis and real-time. Both unsupervised and supervised ML techniques were successfully used for supporting prevention systems and intrusion detection (ID), along with identifying security breaches and system misuses [2,3].…”
Section: Introductionmentioning
confidence: 99%