2024
DOI: 10.1109/tem.2022.3170519
|View full text |Cite
|
Sign up to set email alerts
|

ML-DDoS: A Blockchain-Based Multilevel DDoS Mitigation Mechanism for IoT Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 45 publications
(22 citation statements)
references
References 41 publications
0
11
0
Order By: Relevance
“…e proposed mechanism can detect coordinated replay attacks with full privacy. To prevent IoT devices and other computing resources from DDoS attacks, Hayat et al [28] proposed a Multilevel DDoS mitigation approach (ML-DDoS) based on blockchain. e results show that the proposed framework can accurately detect DDoS attacks in IoT, and has good performance in throughput, latency, and CPU utilization.…”
Section: Blockchain-based Traffic Detection Methodmentioning
confidence: 99%
“…e proposed mechanism can detect coordinated replay attacks with full privacy. To prevent IoT devices and other computing resources from DDoS attacks, Hayat et al [28] proposed a Multilevel DDoS mitigation approach (ML-DDoS) based on blockchain. e results show that the proposed framework can accurately detect DDoS attacks in IoT, and has good performance in throughput, latency, and CPU utilization.…”
Section: Blockchain-based Traffic Detection Methodmentioning
confidence: 99%
“…By utilizing past data gatheblack for a particular activity to automatically optimize performance without iteration, ML may be utilized to enhance the performance of various IoT devices. [15][16][17][18][19][20][21] Specifically, the following points are the primary reasons why ML is significant in IoT applications: • The configurations that IoT systems frequently screen have a dynamic structure. As a result, it is critical to develop IoT systems that can effectively respond to these changes as a whole.…”
Section: Iotmentioning
confidence: 99%
“…The IoT enables the connection of millions of objects, including sensors and mobile phones/devices, to carry out numerous functions. By utilizing past data gatheblack for a particular activity to automatically optimize performance without iteration, ML may be utilized to enhance the performance of various IoT devices 15–21 . Specifically, the following points are the primary reasons why ML is significant in IoT applications: The configurations that IoT systems frequently screen have a dynamic structure.…”
Section: Introductionmentioning
confidence: 99%
“…Compromised systems could be used to steal sensitive information and credentials and push malicious firmware updates. Hence there is a need to encompass added security and trust in the IoT environment 2 . Cybercriminals' increasing use of botnets can easily lead to stealing sensitive information and large complex Distributed Denial of Service (DDoS) attacks, which may vandalize a target website.…”
Section: Introductionmentioning
confidence: 99%
“…Hence there is a need to encompass added security and trust in the IoT environment. 2 Cybercriminals' increasing use of botnets can easily lead to stealing sensitive information and large complex Distributed Denial of Service (DDoS) attacks, which may vandalize a target website. DDoS attacks work by consuming resources and occupying bandwidth to take down websites.…”
Section: Introductionmentioning
confidence: 99%