Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems 2018
DOI: 10.1145/3211933.3211946
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating loT Device based DDoS Attacks using Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 77 publications
(38 citation statements)
references
References 10 publications
0
37
0
1
Order By: Relevance
“…It mainly uses white and black lists of IPs as a security mechanism against DDoS attacks. Another similar approach [27] introduces blockchain as a defense mechanism against DDoS attacks launched by rogue physical devices. Authors propose the integration of communication between IoT devices and servers with an Ethereum blockchain instance and they suggest that such attacks can be prevented by utilizing the gas limit feature of Ethereum.…”
Section: Blockchain and Ddos Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…It mainly uses white and black lists of IPs as a security mechanism against DDoS attacks. Another similar approach [27] introduces blockchain as a defense mechanism against DDoS attacks launched by rogue physical devices. Authors propose the integration of communication between IoT devices and servers with an Ethereum blockchain instance and they suggest that such attacks can be prevented by utilizing the gas limit feature of Ethereum.…”
Section: Blockchain and Ddos Detectionmentioning
confidence: 99%
“…Rodrigues et al [28] Javaid et al [27] Rodrigues et al [26] François et al [35] Chen et al [36] Chin et al [37] Patil et al [38] Sagirlar et al [39] Our approach…”
Section: Responsiveness Scalabilitymentioning
confidence: 99%
“…This information may include the IP addresses of the attackers that performed DDoS, the IP addresses of the victims of these attacks, as well as whitelisted IP addresses. In addition to those, [27] proposes making the IoT devices and the server with which they communicate members of an Ethereum network in order to prevent DDoS. For a device to send data to the server, it must generate a transaction containing these data and submit it to the blockchain.…”
Section: Related Workmentioning
confidence: 99%
“…This is done to protect the server from DDoS attacks in case the devices become bots. However, [27] does not consider using delays the mining process causes as an additional way to mitigate DDoS attacks, something we do to mitigate CDoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…This enables several applications, ranging from the exchange of cryptocurrencies, to financial applications, storing and management of tokens and digital assets, notary systems, identity management, voting systems, and up to those application that require the traceability of resources and assets . Several works find many application domains in healthcare, supply chain, Internet of Things, etc …”
Section: Introductionmentioning
confidence: 99%