2019
DOI: 10.1002/spy2.96
|View full text |Cite
|
Sign up to set email alerts
|

Utilization of blockchain for mitigating the distributed denial of service attacks

Abstract: Distributed Denial of Service (DDoS) attacks cause devastating effects on the web services and hence harm the digital availability. The DDoS attackers use vulnerabilities exposed through new networking technologies like wireless, mobile, IoT, and associated protocol weaknesses for bringing down the networks and servers.Owing to availability of easily available tools and botnet armies, the DDoS attack incidences in the internet world are increasing day by day. Several techniques have been proposed by the resear… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0
2

Year Published

2020
2020
2021
2021

Publication Types

Select...
8

Relationship

5
3

Authors

Journals

citations
Cited by 67 publications
(31 citation statements)
references
References 13 publications
0
29
0
2
Order By: Relevance
“…The SDN helps in filtering and authenticating the legitimate users and it also helps in creating flag based authentication approach to secure the network from intra-domain attacks while the Ethereum smart contract is used for providing a trust list, which can be trusted to provide access to the mother server. 15 The smart contract in the Blockchain is designed in such a way that it uses Blockchain consensus mechanism and provides a trust list based information about which device should have the access to the mother server. The SDN controller protocols work in such a way that they filter and authenticate as well as do the flag distribution across the routers for securing the network from both inside and outside attacks.…”
Section: Discussion On Future Research and Challengesmentioning
confidence: 99%
“…The SDN helps in filtering and authenticating the legitimate users and it also helps in creating flag based authentication approach to secure the network from intra-domain attacks while the Ethereum smart contract is used for providing a trust list, which can be trusted to provide access to the mother server. 15 The smart contract in the Blockchain is designed in such a way that it uses Blockchain consensus mechanism and provides a trust list based information about which device should have the access to the mother server. The SDN controller protocols work in such a way that they filter and authenticate as well as do the flag distribution across the routers for securing the network from both inside and outside attacks.…”
Section: Discussion On Future Research and Challengesmentioning
confidence: 99%
“…Azzi et al [71] discussed that PoW requires more computational power and has very expensive mining process. It works against the DoS attack and Sybil attack [80].…”
Section: Consensus For Scmmentioning
confidence: 99%
“…101 The changes that occurred in the API can be noticeable and also ensures how the data can be integrating. 102 The performance features (e.g., safety, privacy, scalability, and sustainability) and the system upheld by assessing the blockchain as a software connector for establishing the structural factors that are explicitly essential and as an addition, incorporating blockchain as a software connector along with performance attribute development trade-offs. 103…”
Section: Blockchain Architecturementioning
confidence: 99%