2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS) 2019
DOI: 10.23919/apnoms.2019.8892947
|View full text |Cite
|
Sign up to set email alerts
|

A Collaborative DDoS Mitigation Solution Based on Ethereum Smart Contract and RNN-LSTM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…The proposed solutions for DDoS attacks detection mainly identifies the source IP address and use blockchain technology to store the transactions and share the IP address among the stakeholders to block/whitelist the IP address with trust and validation at the network level [71][72] [73] [74] [71] [67] [75] [65]. These solutions assume that the originating malicious IP addresses are not spoofed, and this condition is not always true.…”
Section: Spoofed Ip Ddos Attacks Detectionmentioning
confidence: 99%
“…The proposed solutions for DDoS attacks detection mainly identifies the source IP address and use blockchain technology to store the transactions and share the IP address among the stakeholders to block/whitelist the IP address with trust and validation at the network level [71][72] [73] [74] [71] [67] [75] [65]. These solutions assume that the originating malicious IP addresses are not spoofed, and this condition is not always true.…”
Section: Spoofed Ip Ddos Attacks Detectionmentioning
confidence: 99%
“…Liang et al 30 identified shortcomings in existing machine learning approaches and proposed an LSTM-based framework for DDoS detection and deep learning details. Essaid et al 31 proposed a blockchain technology to combat DDoS attacks by utilizing autonomous systems (Ass) capable of sharing hardware resources. This method only denies specific traffic that causes the attack using deep learning.…”
Section: Related Workmentioning
confidence: 99%
“…The request is granted based on the access control policy stored inside the blockchain, granting automatic permissions to edge devices for actions over the blockchain network. A similar conceptual model is presented in [20] using SDN, RNN-LSTM and smart contracts.…”
Section: Artificial Intelligencementioning
confidence: 99%
“…Different methods and technologies have been employed in previous years to tackle this severe resource drainer attack, such as machine learning [17][18][19], deep learning [20,21], reinforcement learning [22], SDN [23][24][25][26][27], protocol tuning [28,29], network traffic classifiers [30,31], network function virtualization [32][33][34], fog computing [35] and reputation scoring, among others. In addition to struggling with scalability, high computation and communication overhead, the aforementioned methods do not perform effectively in real world DDoS attacks.…”
Section: Introductionmentioning
confidence: 99%