2020 6th IEEE Conference on Network Softwarization (NetSoft) 2020
DOI: 10.1109/netsoft48620.2020.9165396
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative Cyber Attack Defense in SDN Networks using Blockchain Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 11 publications
0
17
0
1
Order By: Relevance
“…Büber et al [36] proposed a voting/consensus system to add entries into a CTI database. Hajizadeh et al [37] used the blockchain to control software-defined networking (SND) systems to mitigate threats based on intelligence collaboration. In addition, Purohit et al [38] proposed the utilization of the blockchain to share intelligence to fight against threats that are targeted at cloud-based services, such as free-riding and false reporting, by defining quality metrics.…”
Section: Methodsmentioning
confidence: 99%
“…Büber et al [36] proposed a voting/consensus system to add entries into a CTI database. Hajizadeh et al [37] used the blockchain to control software-defined networking (SND) systems to mitigate threats based on intelligence collaboration. In addition, Purohit et al [38] proposed the utilization of the blockchain to share intelligence to fight against threats that are targeted at cloud-based services, such as free-riding and false reporting, by defining quality metrics.…”
Section: Methodsmentioning
confidence: 99%
“…Yeh et al [21], Yeh et al [72], Shafi et al [79] and Hajizadeh et al [77] discussed the threat information sharing including DDoS threat data among the collaborators for secure data sharing using blockchain based smart contracts technology and decentralized data storage. The Security operation centers can be upload the threat data and ISP act as verifier to confirm the illegitimacy of the threat data prior to adding to the blockchain transaction in [21], [72].…”
Section: The Following Papers [21] [70] [71][72] [73] [74] [71] [67] ...mentioning
confidence: 99%
“…The Ethereum based smart contract implementation for DDoS data sharing is performed for evaluation. But, in [77] and [79], the Hyperledger caliper is used to implement the threat information sharing among the organizations. Each organization may have the SDN controller to run the blockchain application and act as a blockchain node for updating the threat information in other nodes.…”
Section: The Following Papers [21] [70] [71][72] [73] [74] [71] [67] ...mentioning
confidence: 99%
“…A public permissioned blockchain tries to fill in the gaps between public permissionless and private consortium networks in order to achieve the best of both models. A cyber threat intelligence platform using open-source permissioned blockchain is discussed in [59]. The blockchain is essentially used for record-keeping, and smart contracts are used to guarantee immutable logic.…”
Section: Blockchain and Smart Contractsmentioning
confidence: 99%