4.7 Review

A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions

Related references

Note: Only part of the references are listed.
Review Chemistry, Analytical

Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey

Zawar Shah et al.

Summary: Internet of Things (IoT) devices are vulnerable to Distributed Denial of Service (DDoS) attacks due to their limited resources. Blockchain-based solutions are potential to mitigate DDoS attacks in IoT. This survey provides a detailed analysis and evaluation of existing Blockchain-based solutions and identifies future research directions.

SENSORS (2022)

Article Computer Science, Information Systems

BSD-Guard: A Collaborative Blockchain-Based Approach for Detection and Mitigation of SDN-Targeted DDoS Attacks

Shanqing Jiang et al.

Summary: The translated content provides a brief overview of the blockchain-based SDN-targeted DDoS defense framework (BSD-Guard). This framework utilizes a secure middle plane and smart contracts to provide cooperative detection and mitigation mechanisms, effectively protecting SDN controllers from DDoS attacks. Experimental results demonstrate that the framework can accurately detect attacks and issue precise defensive strategies near the attack source.

SECURITY AND COMMUNICATION NETWORKS (2022)

Article

Detection and Blockchain-Based Collaborative Mitigation of Internet of Things Botnets

Syed Muhammad Sajjad et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system

Vinayakumar Ravi et al.

Summary: This work proposes an end-to-end model for network attack detection and classification using deep learning-based recurrent models. The model extracts features from the hidden layers of recurrent models and uses a feature selection approach to identify optimal features. Experimental results show that the proposed method outperforms existing methods and commonly used machine learning models.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Business

ML-DDoS: A Blockchain-Based Multilevel DDoS Mitigation Mechanism for IoT Environments

Rana Faisal Hayat et al.

Summary: Distributed denial of service (DDoS) attacks and botnet-based attacks are critical security vulnerabilities in IoT environments. This article proposes a multilevel DDoS mitigation approach using blockchain technology to protect IoT devices. The proposed framework achieves significant improvements in throughput, latency, and CPU utilization compared to existing methods.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2022)

Article Chemistry, Analytical

LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in HIP-Based Internet of Things

Balkis Bettoumi et al.

Summary: This paper proposes an efficient energy-saving solution for authenticating constrained devices connected to IoT, enhancing end-to-end communication security through compression of IPv6 headers. It combines various protocols and models to form an efficient security solution for the IoT environment.

SENSORS (2021)

Review Multidisciplinary Sciences

Distributed Denial of Service (DDoS) Mitigation Using Blockchain-A Comprehensive Insight

Sharyar Wani et al.

Summary: DDoS attacks pose a significant threat to network security and can be mitigated using blockchain technology. The complexity and scale of these attacks continue to increase, challenging research and development in the security field. Leveraging the characteristics of blockchain can effectively address this network threat.

SYMMETRY-BASEL (2021)

Article Computer Science, Theory & Methods

DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)

Saif ur Rehman et al.

Summary: DDoS attacks can disrupt communication networks, and the DIDDOS approach is effective in preventing new types of DDoS attacks, achieving high accuracy of 99.69% and 99.94% using GRU neural network for classification.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Information Systems

Security Analysis of DDoS Attacks Using Machine Learning Algorithms in Networks Traffic

Rami J. Alzahrani et al.

Summary: The rapid development of IoT technology has brought new services and applications for users, but also challenges in terms of network anomalies. This research employs deep learning and machine learning algorithms to achieve high accuracy in DDoS intrusion detection.

ELECTRONICS (2021)

Article Computer Science, Information Systems

A survey on internet of things security: Requirements, challenges, and solutions

Hamed HaddadPajouh et al.

Summary: Internet of Things (IoT) is a promising technology that aims to enhance humans' quality of life in various fields. Discussing and analyzing IoT security issues is crucial for developers and enterprises to find appropriate solutions and provide the best possible IoT-based services. This paper provides a comprehensive study on IoT security issues, limitations, requirements, and current and potential solutions, with a focus on classifying potential threats and challenges by an architectural view.

INTERNET OF THINGS (2021)

Article Engineering, Multidisciplinary

B-DNS: A Secure and Efficient DNS Based on the Blockchain Technology

Zecheng Li et al.

Summary: In this paper, a blockchain-based domain name system, B-DNS, is proposed to provide a more secure and efficient DNS service. Experimental results show that B-DNS has higher attack resistance, lower attack surface, and comparable query performance compared to existing DNS implementations.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Telecommunications

A survey of DDoS attacking techniques and defence mechanisms in the IoT network

Ruchi Vishwakarma et al.

TELECOMMUNICATION SYSTEMS (2020)

Article Computer Science, Information Systems

Am I eclipsed? A smart detector of eclipse attacks for Ethereum

Guangquan Xu et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Hardware & Architecture

BlockSDN: Blockchain-as-a-Service for Software Defined Networking in Smart City Applications

Gagangeet Singh Aujla et al.

IEEE NETWORK (2020)

Review Chemistry, Analytical

A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios

Felipe S. Dantas Silva et al.

SENSORS (2020)

Article Computer Science, Information Systems

An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security

Abbas Yazdinejad et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Business

SOChain: A Privacy-Preserving DDoS Data Exchange Service Over SOC Consortium Blockchain

Lo-Yao Yeh et al.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2020)

Article Computer Science, Information Systems

Machine Learning in IoT Security: Current Solutions and Future Challenges

Fatima Hussain et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

Blockchain Behavioral Traffic Model as a Tool to Influence Service IT Security

Vasiliy Elagin et al.

FUTURE INTERNET (2020)

Review Computer Science, Artificial Intelligence

Orchestrating DDoS mitigation via blockchain-based network provider collaborations

Adam Pavlidis et al.

KNOWLEDGE ENGINEERING REVIEW (2020)

Review Computer Science, Information Systems

A Review of Android Malware Detection Approaches Based on Machine Learning

Kaijun Liu et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Blockchain for Large-Scale Internet of Things Data Storage and Protection

Ruinian Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2019)

Article Engineering, Electrical & Electronic

Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks

Gaoqi Liang et al.

IEEE TRANSACTIONS ON SMART GRID (2019)

Article Computer Science, Hardware & Architecture

Internet of Things: A survey on machine learning-based intrusion detection approaches

Kelton A. P. da Costa et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Theory & Methods

Software-defined Networking-based DDoS Defense Mechanisms

Rochak Swami et al.

ACM COMPUTING SURVEYS (2019)

Article Chemistry, Multidisciplinary

Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack

Sarwar Sayeed et al.

APPLIED SCIENCES-BASEL (2019)

Editorial Material Computer Science, Hardware & Architecture

The Aftermath of the Dyn DDOS Attack

Shane Greenstein

IEEE MICRO (2019)

Article Automation & Control Systems

Towards Secure Industrial IoT: Blockchain System With Credit-Based Consensus Mechanism

Junqin Huang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Automation & Control Systems

A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory

Jiafu Wan et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Theory & Methods

The security of machine learning in an adversarial setting: A survey

Xianmin Wang et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)

Article Chemistry, Analytical

A Decentralized Privacy-Preserving Healthcare Blockchain for IoT

Ashutosh Dhar Dwivedi et al.

SENSORS (2019)

Article Telecommunications

Secure and Reliable IoT Networks Using Fog Computing with Software-Defined Networking and Blockchain

Ammar Muthanna et al.

JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2019)

Article Computer Science, Information Systems

Cochain-SC: An Intra- and Inter-Domain Ddos Mitigation Scheme Based on Blockchain Using SDN and Smart Contract

Zakaria Abou El Houda et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets

Georgios Spathoulas et al.

FUTURE INTERNET (2019)

Article Computer Science, Information Systems

A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments

Shi Dong et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

Security Threats in the Data Plane of Software-Defined Networks

Shang Gao et al.

IEEE NETWORK (2018)

Article Computer Science, Hardware & Architecture

Defense mechanisms against Distributed Denial of Service attacks : A survey

Mousa Taghizadeh Manavi

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Mechanics

Cascading failure and recovery of spatially interdependent networks

Sheng Hong et al.

JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT (2017)

Article Multidisciplinary Sciences

Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions

Jin Ho Park et al.

SYMMETRY-BASEL (2017)

Article Computer Science, Hardware & Architecture

DDoS in the IoT: Mirai and Other Botnets

Constantinos Kolias et al.

COMPUTER (2017)

Review Multidisciplinary Sciences

DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions

Narmeen Zakaria Bawany et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2017)

Article Computer Science, Theory & Methods

Fast authentication in wireless sensor networks

Chafika Benzaid et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Physics, Multidisciplinary

Cascading failure analysis and restoration strategy in an interdependent network

Sheng Hong et al.

JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL (2016)

Article Computer Science, Information Systems

DNS amplification attack revisited

Marios Anagnostopoulos et al.

COMPUTERS & SECURITY (2013)

Article Computer Science, Information Systems

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)