Flooding based Distributed Denial of Service Attacks Prevention using Blockchain Technology
Keywords:
Flooding, DDoS Attacks, Blockchain Technology, Prevention, Markov ProcessAbstract
The threats of Distributed Denial of Service (DDoS) attacks are a significant concern for online services. In order to prevent genuine users from accessing the target servers or networks, these assaults entail flooding them with excessive amounts of traffic. Distributed Denial of Service (DDoS) attacks pose a significant threat to the availability and reliability of online services. Among the various types of DDoS attacks, flooding-based attacks, which overwhelm a target system with a high volume of traffic, are particularly challenging to mitigate. Blockchain technology has become a more viable option in recent years for enhancing the security and resilience of network infrastructures. This paper explores the potential of Blockchain technology in preventing flooding-based DDoS attacks. By leveraging the decentralized and immutable nature of Blockchain, along with its ability to enforce consensus and facilitate secure transactions, novel approaches for detecting and mitigating flooding-based DDoS attacks can be developed. This paper provides an overview of existing techniques for DDoS attack prevention using Blockchain technology, discusses their strengths and limitations, and proposes future research directions in this area.
Downloads
References
A. Carlin, M. Hammoudeh, and O. Aldabbas, “Defence for Distributed Denial of Service Attacks in Cloud Computing,” Procedia Computer Science, vol. 73, pp. 490–497, 2015, doi: 10.1016/j.procs.2015.12.037.
S. T.K and D. B, “Preventing Distributed Denial of Service Attacks in Cloud Environments,” International Journal of Information Technology, Control and Automation, vol. 6, no. 2, pp. 23–32, Apr. 2016, doi: 10.5121/ijitca.2016.6203.
H. Abusaimeh, “Distributed Denial of Service Attacks in Cloud Computing,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 6, 2020, doi: 10.14569/ijacsa.2020.0110621.
A. Bonguet and M. Bellaiche, “A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing,” Future Internet, vol. 9, no. 3, p. 43, Aug. 2017, doi: 10.3390/fi9030043.
A. O. Akinwumi, A. O. Akingbesote, O. O. Ajayi, and F. O. Aranuwa, “Detection of Distributed Denial of Service (DDoS) attacks using convolutional neural networks,” Nigerian Journal of Technology, vol. 41, no. 6, pp. 1017–1024, Mar. 2023, doi: 10.4314/njt.v41i6.12.
V. A. Koryakova, “Identifying Distributed Denial of Service Attacks,” Mathematical Methods in Technologies and Technics, no. 5, pp. 105–108, 2021, doi: 10.52348/2712-8873_mmtt_2021_5_105.
“Retracted: Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review,” Security and Communication Networks, vol. 2023, pp. 1–1, Dec. 2023, doi: 10.1155/2023/9805019.
A. Bonguet and M. Bellaiche, “A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing,” Future Internet, vol. 9, no. 3, p. 43, Aug. 2017, doi: 10.3390/fi9030043.
C. Vasan Sai Krishna, Y. Bhuvana, P. Pavan Kumar, and R. Murugan, “Reducing distributed denial of service (DDoS) attacks using client puzzle mechanism,” International Journal of Engineering & Technology, vol. 7, no. 1.1, p. 230, Dec. 2017, doi: 10.14419/ijet.v7i1.1.9473.
“Defending Distributed Denial Of Service (Ddos) Attacks: Classification And Art,” Elementary Education Online, vol. 20, no. 02, Jun. 2021, doi: 10.17051/ilkonline.2021.02.266.
S. SINGH, A. BHANDARI, K. K. SALUJA, and A. L. SANGAL, “Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks,” International Journal of Computer Networks and Communications Security, vol. 8, no. 1, pp. 1–9, Jan. 2020, doi: 10.47277/ijcncs/8(1)1.
A. Nurdin and I. Riadi, “Network Forensic on Distributed Denial of Service Attacks using National Institute of Standards and Technology Method,” International Journal of Computer Applications, vol. 183, no. 40, pp. 39–47, Dec. 2021, doi: 10.5120/ijca2021921799.
R. Singh, S. Tanwar, and T. P. Sharma, “Utilization of blockchain for mitigating the distributed denial of service attacks,” SECURITY AND PRIVACY, vol. 3, no. 3, Nov. 2019, doi: 10.1002/spy2.96.
P. Krishna Kishore, S. Ramamoorthy, and V. N. Rajavarman, “ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach,” International Journal of Intelligent Networks, vol. 4, pp. 38–45, 2023, doi: 10.1016/j.ijin.2022.12.001.
Z. Shah, I. Ullah, H. Li, A. Levula, and K. Khurshid, “Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey,” Sensors, vol. 22, no. 3, p. 1094, Jan. 2022, doi: 10.3390/s22031094.
“DETECTION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SDN USING MACHINE LEARNING TECHNIQUES,” International Research Journal of Modernization in Engineering Technology and Science, Mar. 2023, Published, doi: 10.56726/irjmets34739.
R. U and K. E, “Distributed Denial of Service Attacks Prevention, Detection and Mitigation – A Review,” SSRN Electronic Journal, 2021, Published, doi: 10.2139/ssrn.3852902.
O. Tinubu, A. Sodiya, and O. Ojesanmi, “A behavioral model for characterizing flooding distributed denial of service attacks,” International Journal of Information Technology, vol. 15, no. 2, pp. 955–964, Sep. 2022, doi: 10.1007/s41870-022-01097-3.
O. Tinubu, A. Sodiya, and O. Ojesanmi, “A behavioral model for characterizing flooding distributed denial of service attacks,” International Journal of Information Technology, vol. 15, no. 2, pp. 955–964, Sep. 2022, doi: 10.1007/s41870-022-01097-3.
G. Spathoulas, N. Giachoudis, G.-P. Damiris, and G. Theodoridis, “Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets,” Future Internet, vol. 11, no. 11, p. 226, Oct. 2019, doi: 10.3390/fi11110226.
D. Patel*, “Blockchain Technology towards the Mitigation of Distributed Denial of Service Attacks,” International Journal of Recent Technology and Engineering (IJRTE), vol. 8, no. 6, pp. 961–965, Mar. 2020, doi: 10.35940/ijrte.f7420.038620.
Dr. E. Punarselvam, “Blocking Distributed Denial of Service Flooding Attacks with Dynamic Path Detectors,” International Journal for Research in Applied Science and Engineering Technology, vol. 8, no. 6, pp. 1318–1322, Jun. 2020, doi: 10.22214/ijraset.2020.6212.
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.