2021
DOI: 10.3390/app11125685
|View full text |Cite
|
Sign up to set email alerts
|

Standalone Behaviour-Based Attack Detection Techniques for Distributed Software Systems via Blockchain

Abstract: With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them. Therefore, developing and improving attack detection techniques are prominent methods to defend against cyberattacks. One of the promising attack detection methods is behaviour-based attack detection methods. Practically, attack detection techniques are widely applied in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 32 publications
(44 reference statements)
0
1
0
Order By: Relevance
“…They have explored various implementation and security-related issues also that may affect the implementation of blockchain. A lot of secure mechanisms have also been explored by researchers to mitigate these issues [17][18][19][20][21][22][23][24][25][26][27]. To provide a secured blockchain infrastructure, in this section, a thorough analysis has been performed on the existing literature to identify the various security issues and their possible solutions.…”
Section: Literature Reviewmentioning
confidence: 99%
“…They have explored various implementation and security-related issues also that may affect the implementation of blockchain. A lot of secure mechanisms have also been explored by researchers to mitigate these issues [17][18][19][20][21][22][23][24][25][26][27]. To provide a secured blockchain infrastructure, in this section, a thorough analysis has been performed on the existing literature to identify the various security issues and their possible solutions.…”
Section: Literature Reviewmentioning
confidence: 99%