Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Utilization of blockchain for mitigating the distributed denial of service attacks

Published: 15 November 2019 Publication History

Abstract

Distributed Denial of Service (DDoS) attacks cause devastating effects on the web services and hence harm the digital availability. The DDoS attackers use vulnerabilities exposed through new networking technologies like wireless, mobile, IoT, and associated protocol weaknesses for bringing down the networks and servers. Owing to availability of easily available tools and botnet armies, the DDoS attack incidences in the internet world are increasing day by day. Several techniques have been proposed by the researchers against DDoS attacks. This paper concentrates on the utilization of one of the latest and most promising technologies, that is, blockchain technology against DDoS attacks. The blockchain technology is rapidly finding use in various applications ranging from financial to gaming; this is because of its stable, decentralized, and secure architecture. The DDoS solutions based on blockchain are still in infancy and some solutions provide only architectural details without bothering about the implementation details. This paper presents a study of the blockchain‐based DDoS solutions. It also compares the existing blockchain‐based techniques against DDoS attacks and analyses them. This paper facilitates the development of future research proposals in this emerging area of blockchain technology.

References

[2]
Denial of Service Attack . https://en.wikipedia.org/wiki/Denial_of_Service_attack. Accessed April 9, 2019.
[3]
Antoniou S. The PING of death and other DoS network attacks; May 14, 2009. https://www.pluralsight.com/blog/it‐ops/ping‐of‐death‐and‐dos‐attacks. Accessed January 08, 2019.
[4]
Singh R, Sharma TP. A location based method for restricting the flooding DoS effect in WLANs. JLBS. 2016;9(4):273‐295.
[5]
Singh R, Sharma TP. On the IEEE 802.11i security: a denial of service perspective. J Secur Commun Netw. 2015;8(7):1378‐1407.
[6]
Singh R, Sharma TP. A key hiding communication scheme for enhancing the wireless LAN security. Wirel Pers Commun. 2014;77(2):1145‐1165.
[7]
Singh R, Sharma TP. A secure WLAN authentication scheme. IEEK Trans Smart Process Comput. 2013;2(3):176‐187.
[8]
Muncaster P. DDoS attack forces Wikipedia offline. https://www.infosecurity‐magazine.com/news/ddos‐attack‐forces‐wikipedia/ Accessed September 18, 2019.
[9]
Dunn JE. Wikipedia fights off huge DDoS attack; Sep 11, 2019. https://nakedsecurity.sophos.com/2019/09/11/wikipedia‐fights‐off‐huge‐ddos‐attack/. Accessed September 18, 2019.
[10]
O'Donnell L. Wikipedia, World of Warcraft downed by weekend DDoS attacks; Sep 9, 2019. https://threatpost.com/wikipedia‐world‐of‐warcraft‐ddos‐attacks/148121/. Accessed September 18, 2019.
[11]
Morales C. NETSCOUT Arbor confirms 1.7 TbpsDDoS attack; the terabit attack era is upon us; March 5, 2018. https://asert.arbornetworks.com/netscout‐arbor‐confirms‐1‐7‐tbps‐ddos‐attack‐terabit‐attack‐era‐upon‐us/. Accessed January 8, 2019.
[12]
World's largest DDoS attack: US firm suffers 1.7 Tbps of DDoS attack; March 6, 2018. https://www.hackread.com/worlds‐largest‐ddos‐attack‐us‐firm‐suffers‐1‐7‐tbps‐of‐ddos‐attack/. Accessed January 8, 2019.
[13]
Github hit by 1.35 Tbps DDoS attack; the largest ever; March 2, 2018. https://www.hackread.com/github‐hit‐by‐1‐35‐tbps‐of‐largest‐ddos‐attack‐ever/. Accessed January 8, 2019.
[14]
Mirai Botnet linked to massive DDoS attacks on Dyn DNS; October 22, 2016. https://www.hackread.com/mirai‐botnet‐linked‐to‐dyn‐dns‐ddos‐attacks/. Accessed January 8, 2019.
[15]
Osborne C. GitHub suffers “largest DDoS” attack in site's history; March 30, 2015. https://www.zdnet.com/article/github‐suffers‐largest‐ddos‐attack‐in‐sites‐history/. Accessed January 8, 2019.
[16]
Prince M. The Cloudflare Blog—the DDoS that knocked Spamhaus offline; March 20, 2013. https://blog.cloudflare.com/the‐ddos‐that‐knocked‐spamhaus‐offline‐and‐ho/. Accessed September 18, 2019.
[17]
Cimpanu C. DDoS attacks cause train delays across Sweden; October 13, 2017. https://www.bleepingcomputer.com/news/security/ddos‐attacks‐cause‐train‐delays‐across‐sweden/. Accessed January 8, 2019.
[18]
Breaches in the USA and Denmark cast a further spotlight on cyber security in the rail industry; May 21, 2018). https://www.smartrailworld.com/breaches‐in‐the‐usa‐and‐denmark‐cast‐a‐further‐spotlight‐on‐rail‐cyber‐security. Accessed January 8, 2019.
[19]
DDoS cyber attack cripples Danish Rail's ability to sell tickets; May 14, 2018. https://www.transportsecurityworld.com/ddos‐attack‐cripples‐danish‐rails‐ability‐to‐sell‐tickets. Accessed January 8, 2019.
[20]
Hackers target Danish train service over the weekend; May 14, 2018. http://www.cphpost.dk/news/hackers‐target‐danish‐train‐service‐over‐the‐weekend.html. Accessed April 8, 2019.
[22]
Symantec: 26% of DDoS attacks this year originated from India; October 2014. https://www.livemint.com/Industry/V5upm1A2Vb6QIPubzg1I2K/26‐of‐DDoS‐attacks‐this‐year‐originated‐from‐India‐Symante.html. Accessed January 8, 2019.
[23]
Ellis A. State of the internet/security, a year in review (SOTI 2018). Technical Report Akamai. 2018;4(5).
[24]
Nakamoto S. Bitcoin: a peer‐to‐peer electronic cash system. https://bitcoin.org/en/bitcoin‐paper. Accessed April 10, 2019.
[25]
Buterin V. Ethereum: a next‐generation smart contract and decentralized application platform 2014. https://github.com/ethereum/wiki/wiki/White‐Paper. Accessed January 8, 2019.
[26]
Gupta R. Hands‐on Cybersecurity with Blockchain. Birmingham, England: Packt Publishing; 2018.
[27]
Rodrigues B, Bocek T, Lareida A, Hausheer D, Rafati S, Stiller B. A blockchain‐based architecture for collaborative DDoS mitigation with smart contracts. IFIP Int Conf Auton Infrastruct Manag Secur. 2017;10356:16‐29.
[28]
Burger J. Collaborative DDoS Mitigation Based on Blockchains [bachelor thesis]. Switzerland: Department of Informatics, University of Zurich; 2017.
[29]
[30]
Javaid U, Siang AK, Aman MN, et al. Mitigating IoT device based DDoS attacks using blockchain, CryBlock'18; June 15, 2018, Munich, Germany.
[31]
Kataoka K, Gangwar S, Podili P. Trust list: internet‐wide and distributed IoT traffic management using blockchain and SDN. Paper presented at: Proceedings of IEEE 4th World Forum on Internet of Things (WF‐IoT); February 2018: 296–301.
[32]
Gladius' young leaders stop denial of service attacks with decentralized blockchain network. https://venturebeat.com/2018/10/08/gladius‐young‐leaders‐aim‐to‐to‐stop‐denial‐of‐service‐attacks/. Accessed January 8, 2019.
[33]
How blockchain can fight DDoS attacks. https://thechain.media/how‐blockchain‐can‐fight‐ddos‐attacks. Accessed January 8, 2019.
[34]
Adiseshu H, Lakshman TV. The internet blockchain: a distributed, tamper‐resistant transaction framework for the internet. Proceedings of the 15th ACM Workshop on Hot Topics in Networks. Atlanta, GA: ACM; 2016:204‐210.
[35]
Trust list implementation. https://github.com/pvnprashanth/Trust‐List. Accessed April 8, 2019.
[36]
Mosakheil JH. Security Threats Classification in Blockchains, Starred Paper [master of science in information assurance]. Department of Information Systems, St. Cloud State University; 2018.
[37]
Kabra N, Bhattacharya P, Tanwar S, Tyagi S. MudraChain: blockchain‐based framework for automated cheque clearance in financial institutions. Future Gener Comp Sy. 2020;102:574‐587.
[38]
Mistry I, Tanwar S, Tyagi S, Kumar N. Blockchain for 5G‐enabled IoT for industrial automation: a systematic review, solutions, and challenges. Mech Syst Signal Pr. 2020;135:1‐21.
[39]
Gupta R, Tanwar S, Tyagi S, et al. HaBiTs: blockchain based telesurgery framework for healthcare 4.0. Paper presented at: International Conference on Computer, Information and Telecommunication Systems (IEEE CITS‐2019); August 28‐31, 2019; Beijing, China, pp. 6–10.
[40]
Bodkhe U, Bhattacharya P, Tanwar S, et al. BloHosT: blockchain enabled smart tourism and hospitality management. Paper presented at: International Conference on Computer, Information and Telecommunication Systems (IEEE CITS‐2019); August 28‐31, 2019; Beijing, China, pp. 237–241.
[41]
Vora J, Tanwar S, Verma JP, et al. BHEEM: a blockchain‐based framework for securing electronic health records. Paper presented at: IEEE Global Communications Conference (IEEE GLOBECOM‐2018); 9‐13th December, 2018; Abu Dhabi, UAE, pp. 1–6.
[42]
Meng W, Tischhauser EW, Wang Q, Wang Y, Han J. When intrusion detection meets blockchain technology: a review. IEEE Access. 2018;6:10179‐10188.
[43]
Casino F, Patsakis C, Dasaklis TK. A systematic literature review of blockchain‐based applications: current status, classification and open issues. Telematics and Informatics. 2019;36:55‐81.

Cited By

View all
  • (2025)Design of an Iterative Method for Blockchain Optimization Incorporating DeepMiner and AnoBlockSecurity and Privacy10.1002/spy2.4928:1Online publication date: 12-Jan-2025
  • (2023)A context‐aware internet of things‐driven security scheme for smart homesSecurity and Privacy10.1002/spy2.2696:1Online publication date: 16-Jan-2023
  • (2021)SDN‐chainSecurity and Privacy10.1002/spy2.1784:6Online publication date: 2-Nov-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Security and Privacy
Security and Privacy  Volume 3, Issue 3
May/June 2020
95 pages
EISSN:2475-6725
DOI:10.1002/spy2.v3.3
Issue’s Table of Contents

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 15 November 2019

Author Tags

  1. blockchain
  2. communication security
  3. Denial of Service
  4. Distributed Denial of Service
  5. Ethereum blockchain
  6. public blockchain
  7. smart contract

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Design of an Iterative Method for Blockchain Optimization Incorporating DeepMiner and AnoBlockSecurity and Privacy10.1002/spy2.4928:1Online publication date: 12-Jan-2025
  • (2023)A context‐aware internet of things‐driven security scheme for smart homesSecurity and Privacy10.1002/spy2.2696:1Online publication date: 16-Jan-2023
  • (2021)SDN‐chainSecurity and Privacy10.1002/spy2.1784:6Online publication date: 2-Nov-2021
  • (2021)Mitigating distributed denial of service attackSecurity and Privacy10.1002/spy2.1634:4Online publication date: 11-Jul-2021

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media