Flooding based Distributed Denial of Service Attacks Prevention using Blockchain Technology

Authors

  • Himanshu Shukla, Ajay Pratap, Harsh Dev

Keywords:

Flooding, DDoS Attacks, Blockchain Technology, Prevention, Markov Process

Abstract

The threats of Distributed Denial of Service (DDoS) attacks are a significant concern for online services. In order to prevent genuine users from accessing the target servers or networks, these assaults entail flooding them with excessive amounts of traffic. Distributed Denial of Service (DDoS) attacks pose a significant threat to the availability and reliability of online services. Among the various types of DDoS attacks, flooding-based attacks, which overwhelm a target system with a high volume of traffic, are particularly challenging to mitigate. Blockchain technology has become a more viable option in recent years for enhancing the security and resilience of network infrastructures. This paper explores the potential of Blockchain technology in preventing flooding-based DDoS attacks. By leveraging the decentralized and immutable nature of Blockchain, along with its ability to enforce consensus and facilitate secure transactions, novel approaches for detecting and mitigating flooding-based DDoS attacks can be developed. This paper provides an overview of existing techniques for DDoS attack prevention using Blockchain technology, discusses their strengths and limitations, and proposes future research directions in this area.

Downloads

Download data is not yet available.

References

A. Carlin, M. Hammoudeh, and O. Aldabbas, “Defence for Distributed Denial of Service Attacks in Cloud Computing,” Procedia Computer Science, vol. 73, pp. 490–497, 2015, doi: 10.1016/j.procs.2015.12.037.

S. T.K and D. B, “Preventing Distributed Denial of Service Attacks in Cloud Environments,” International Journal of Information Technology, Control and Automation, vol. 6, no. 2, pp. 23–32, Apr. 2016, doi: 10.5121/ijitca.2016.6203.

H. Abusaimeh, “Distributed Denial of Service Attacks in Cloud Computing,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 6, 2020, doi: 10.14569/ijacsa.2020.0110621.

A. Bonguet and M. Bellaiche, “A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing,” Future Internet, vol. 9, no. 3, p. 43, Aug. 2017, doi: 10.3390/fi9030043.

A. O. Akinwumi, A. O. Akingbesote, O. O. Ajayi, and F. O. Aranuwa, “Detection of Distributed Denial of Service (DDoS) attacks using convolutional neural networks,” Nigerian Journal of Technology, vol. 41, no. 6, pp. 1017–1024, Mar. 2023, doi: 10.4314/njt.v41i6.12.

V. A. Koryakova, “Identifying Distributed Denial of Service Attacks,” Mathematical Methods in Technologies and Technics, no. 5, pp. 105–108, 2021, doi: 10.52348/2712-8873_mmtt_2021_5_105.

“Retracted: Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review,” Security and Communication Networks, vol. 2023, pp. 1–1, Dec. 2023, doi: 10.1155/2023/9805019.

A. Bonguet and M. Bellaiche, “A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing,” Future Internet, vol. 9, no. 3, p. 43, Aug. 2017, doi: 10.3390/fi9030043.

C. Vasan Sai Krishna, Y. Bhuvana, P. Pavan Kumar, and R. Murugan, “Reducing distributed denial of service (DDoS) attacks using client puzzle mechanism,” International Journal of Engineering & Technology, vol. 7, no. 1.1, p. 230, Dec. 2017, doi: 10.14419/ijet.v7i1.1.9473.

“Defending Distributed Denial Of Service (Ddos) Attacks: Classification And Art,” Elementary Education Online, vol. 20, no. 02, Jun. 2021, doi: 10.17051/ilkonline.2021.02.266.

S. SINGH, A. BHANDARI, K. K. SALUJA, and A. L. SANGAL, “Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks,” International Journal of Computer Networks and Communications Security, vol. 8, no. 1, pp. 1–9, Jan. 2020, doi: 10.47277/ijcncs/8(1)1.

A. Nurdin and I. Riadi, “Network Forensic on Distributed Denial of Service Attacks using National Institute of Standards and Technology Method,” International Journal of Computer Applications, vol. 183, no. 40, pp. 39–47, Dec. 2021, doi: 10.5120/ijca2021921799.

R. Singh, S. Tanwar, and T. P. Sharma, “Utilization of blockchain for mitigating the distributed denial of service attacks,” SECURITY AND PRIVACY, vol. 3, no. 3, Nov. 2019, doi: 10.1002/spy2.96.

P. Krishna Kishore, S. Ramamoorthy, and V. N. Rajavarman, “ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach,” International Journal of Intelligent Networks, vol. 4, pp. 38–45, 2023, doi: 10.1016/j.ijin.2022.12.001.

Z. Shah, I. Ullah, H. Li, A. Levula, and K. Khurshid, “Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey,” Sensors, vol. 22, no. 3, p. 1094, Jan. 2022, doi: 10.3390/s22031094.

“DETECTION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SDN USING MACHINE LEARNING TECHNIQUES,” International Research Journal of Modernization in Engineering Technology and Science, Mar. 2023, Published, doi: 10.56726/irjmets34739.

R. U and K. E, “Distributed Denial of Service Attacks Prevention, Detection and Mitigation – A Review,” SSRN Electronic Journal, 2021, Published, doi: 10.2139/ssrn.3852902.

O. Tinubu, A. Sodiya, and O. Ojesanmi, “A behavioral model for characterizing flooding distributed denial of service attacks,” International Journal of Information Technology, vol. 15, no. 2, pp. 955–964, Sep. 2022, doi: 10.1007/s41870-022-01097-3.

O. Tinubu, A. Sodiya, and O. Ojesanmi, “A behavioral model for characterizing flooding distributed denial of service attacks,” International Journal of Information Technology, vol. 15, no. 2, pp. 955–964, Sep. 2022, doi: 10.1007/s41870-022-01097-3.

G. Spathoulas, N. Giachoudis, G.-P. Damiris, and G. Theodoridis, “Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets,” Future Internet, vol. 11, no. 11, p. 226, Oct. 2019, doi: 10.3390/fi11110226.

D. Patel*, “Blockchain Technology towards the Mitigation of Distributed Denial of Service Attacks,” International Journal of Recent Technology and Engineering (IJRTE), vol. 8, no. 6, pp. 961–965, Mar. 2020, doi: 10.35940/ijrte.f7420.038620.

Dr. E. Punarselvam, “Blocking Distributed Denial of Service Flooding Attacks with Dynamic Path Detectors,” International Journal for Research in Applied Science and Engineering Technology, vol. 8, no. 6, pp. 1318–1322, Jun. 2020, doi: 10.22214/ijraset.2020.6212.

Downloads

Published

02.06.2024

How to Cite

Himanshu Shukla. (2024). Flooding based Distributed Denial of Service Attacks Prevention using Blockchain Technology. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 4153–4160. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6119

Issue

Section

Research Article