2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA) 2020
DOI: 10.1109/icirca48905.2020.9183092
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Based DDoS Mitigation Using Machine Learning Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(18 citation statements)
references
References 11 publications
0
18
0
Order By: Relevance
“…In the papers [81] [73], the machine learning algorithms such as K-nearest neighbors (KNN), decision tree and random forest as well as deep learning technique long short-term memory (LSTM) are applied to the network traffic to determine the DDoS attack and considered blockchain technology to whitelist/blocklist the IP addresses at the autonomous system level of the network. But, the machine learning application on the network traffic requires infrastructure and computation capabilities, and ownership responsibility to allocate the resources need to be addressed.…”
Section: Rodrigues Et Al [75] [64]mentioning
confidence: 99%
“…In the papers [81] [73], the machine learning algorithms such as K-nearest neighbors (KNN), decision tree and random forest as well as deep learning technique long short-term memory (LSTM) are applied to the network traffic to determine the DDoS attack and considered blockchain technology to whitelist/blocklist the IP addresses at the autonomous system level of the network. But, the machine learning application on the network traffic requires infrastructure and computation capabilities, and ownership responsibility to allocate the resources need to be addressed.…”
Section: Rodrigues Et Al [75] [64]mentioning
confidence: 99%
“…The metrics presented in this work are comparable with those demonstrated in the previous studies that used ML/DL models to detect attacks and that used the CICDDoS2019 dataset. The authors in [43] applied KNN, Decision Tree (DT), and RF and achieved accuracy levels less than 95.19%. The combined LSTM-Fuzzy method presented in [21] achieved an accuracy of 99.74% and FPR of 0.25%.…”
Section: ) Comparison With Previous Workmentioning
confidence: 99%
“…The latest state-of-the-art research has been conducted in the field of cyber-security mitigating DDoS attacks [11][12][13][14][15][16][17][18][19]. Table 1 summarizes research on different approaches to detecting, defending, and mitigating DDOS attacks.…”
Section: Related Workmentioning
confidence: 99%