The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.1016/j.patrec.2021.11.023
|View full text |Cite
|
Sign up to set email alerts
|

Design of Blockchain enabled intrusion detection model for detecting security attacks using deep learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Several studies [11][12][13][14][15][16] have suggested using blockchain technology to build a security testing mechanism and detect attacks, especially those targeting distributed software applications. The review starts with a survey conducted by Xie et al, comprising 56 studies [17].…”
Section: Related Workmentioning
confidence: 99%
“…Several studies [11][12][13][14][15][16] have suggested using blockchain technology to build a security testing mechanism and detect attacks, especially those targeting distributed software applications. The review starts with a survey conducted by Xie et al, comprising 56 studies [17].…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, the authors in [95] have identified a frequently used approach for developer teams of 'product negotiation', which advocates for the involvement of product managers and other stakeholders in security discussions. On the other hand, the studies in [96], [97], [98], [99], [100], [101] have proposed using blockchain technology to build a security testing mechanism [102] to detect attacks, more so those targeting distributed software applications.…”
Section: Techniques and Approaches To Software Securitymentioning
confidence: 99%
“…Some of the existing methods for securing the IoT network from DDoS attacks include the following. Saveetha et al (2022) claimed that the intruder needs to discover the mapping of a network and it is hard to track all the scanning processes due to large network implementations [16]. Consequently, the authors developed an intrusion detection system (IDS) integrated with blockchain to detect the intrusions.…”
Section: Proposed Defense Mechanisms For Securing Coap Against Ddos A...mentioning
confidence: 99%
“…The model is depicted in Figure 18. We used Google Colab platform [16] to perform the experiment and evaluated the performance for each model. Since our data were ~100,000 samples; therefore, processing We used Google Colab platform [16] to perform the experiment and evaluated the performance for each model.…”
Section: Model Trainingmentioning
confidence: 99%