2023
DOI: 10.3390/app13084953
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Blockchain-SDN Secure IoT System Based on ANN to Mitigate DDoS Attacks

Abstract: By bringing smart and advanced solutions, the Internet of Things (IoT) has opened up new dimensions of innovative services and processing power for contemporary living standards. IoT has a wide range of devices and communication entities as a result of the widespread applications of these services, making network management a challenging task. Therefore, it is critical to redesign the IoT network’s management. The inherent programmability and centralized capabilities of software-defined networking (SDN) make n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 55 publications
1
9
0
Order By: Relevance
“…The framework protected the privacy of blockchain networks and mitigated the hazards of security threats such as DDoS attacks and DoS attacks. Jmal et al [34] proposed an ANN DDoS attack detection model based on an artificial intelligence approach to identify malicious traffic and optimize the traffic load as a way to identify the presence of DDoS attacks on blockchain networks.…”
Section: Defense and Mitigation Methods For Ddos Attacksmentioning
confidence: 99%
“…The framework protected the privacy of blockchain networks and mitigated the hazards of security threats such as DDoS attacks and DoS attacks. Jmal et al [34] proposed an ANN DDoS attack detection model based on an artificial intelligence approach to identify malicious traffic and optimize the traffic load as a way to identify the presence of DDoS attacks on blockchain networks.…”
Section: Defense and Mitigation Methods For Ddos Attacksmentioning
confidence: 99%
“…Traditional machine learning SVM [31][32][33][34][35] Decision Tree [36][37][38] KNN [38][39][40][41] Naive Bayes [38,[42][43][44] Random Forest [36][37][38] Deep learning SOM [41,45,46] ANN [47][48][49] LSTM [48][49][50] DNN [51][52][53] RNN [50,53] The SVM algorithm is a binary classification model utilized for distinguishing between normal and abnormal data in the context of DDoS attack detection based on traffic characteristics. Based on the traffic characteristics observed in the SDN network environment, the SVM detection algorithm is employed to gather input feature vectors in order to develop an algorithm for detecting malicious behavior within the network.…”
Section: Algorithm Classification Algorithm Referencesmentioning
confidence: 99%
“…Compared to Mininet, OMNeT++ has the ability to redefine network layers and protocols, making it suitable for complex network models and capable of handling large-scale and detailed network simulations. Meanwhile, some works in the literature [42,47] integrate SDN with IoT to assess the effectiveness of its detection and mitigation methods in the IoT environment.…”
Section: Sdn Simulator and Controllermentioning
confidence: 99%
“…However, PoW's reliance on computational power exposes blockchain to security risks, including selfish mining (SM) attacks [4], block withholding (BWH) attacks [5], and Distributed Denial of Service (DDoS) attacks [6]. SM attacks gain additional revenue by creating redundant private chains in addition to the public chain [7]. BWH attacks generate illegal revenue by sending spy miner attacks to honest mining pools [8].…”
Section: Introductionmentioning
confidence: 99%