2022
DOI: 10.1007/978-3-031-06156-1_19
|View full text |Cite
|
Sign up to set email alerts
|

DoS Attacks on Blockchain Ecosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…Sayeed et al [116] describe malicious acts (for example, phishing), weak protocols, defrauding (i. e., fraudulent users), and application bugs (for example, code errors), which can happen at each layer. Raikwar and Gligoroski [46] outline various types of denial-of-service (DoS) or distributed DoS (DDoS) attacks, i. e., on wallets, on cryptocurrency exchange services, on memory/transaction pools, on mining pools, on layer-two blockchain protocols, on sharding protocols, which is underlined by Li et al [61], on commit-chain operators, on smart contracts, on mixing services, and on consensus participants. The authors describe the mitigation techniques of client puzzles, fee-based approaches, and DoS-resistant protocols.…”
Section: General Issuesmentioning
confidence: 99%
“…Sayeed et al [116] describe malicious acts (for example, phishing), weak protocols, defrauding (i. e., fraudulent users), and application bugs (for example, code errors), which can happen at each layer. Raikwar and Gligoroski [46] outline various types of denial-of-service (DoS) or distributed DoS (DDoS) attacks, i. e., on wallets, on cryptocurrency exchange services, on memory/transaction pools, on mining pools, on layer-two blockchain protocols, on sharding protocols, which is underlined by Li et al [61], on commit-chain operators, on smart contracts, on mixing services, and on consensus participants. The authors describe the mitigation techniques of client puzzles, fee-based approaches, and DoS-resistant protocols.…”
Section: General Issuesmentioning
confidence: 99%
“…[22] and this web-app wallet is written with the Flutter framework and can be used with the same interface on all devices and is excellent for obfuscation and security [23]. The proposed web-app wallet does not expose keys when changing wallets due to device changes and does not lose keys when the device is lost and defends against DDoS attacks [24] that are vulnerable to server-based wallet services by using the 3.5 DDoS protection module and protects against key loss by creating wallets using low-capacity keystores such as List 1 in the 3.2 Key management module and by storing secondary backup copies in the DB.…”
Section: Limitations Of Existing Solutionsmentioning
confidence: 99%