2022
DOI: 10.48550/arxiv.2202.03617
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

The role of Blockchain in DDoS attacks mitigation: techniques, open challenges and future directions

Abstract: With the proliferation of new technologies such as Internet of Things (IOT) and Software-Defined Networking (SDN) in the recent years, the distributed denial of service (DDoS) attack vector has broadened and opened new opportunities for more sophisticated DDoS attacks on the targeted victims. The new attack vector includes unsecured and vulnerable IoT devices connected to the internet, denial of service vulnerabilities like southbound channel saturation in the SDN architecture. Given the high-volume and pervas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 38 publications
0
14
0
Order By: Relevance
“…Some researchers reviewed the effects of DDoS attacks on IoT, prevention mechanisms and solutions to mitigate DDoS attacks in IoT. In the focus of authors is on the DDoS attacks at the network layer; however, Chaganti et al (2022) discussed technologies on an IoT protocol stack to mitigate DDoS attacks, such as IPv6, IEEE 802.15.4, 6LoWPAN, etc. However, Shah et al (2022) did not mention blockchainbased solutions that mitigate DDoS attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…Some researchers reviewed the effects of DDoS attacks on IoT, prevention mechanisms and solutions to mitigate DDoS attacks in IoT. In the focus of authors is on the DDoS attacks at the network layer; however, Chaganti et al (2022) discussed technologies on an IoT protocol stack to mitigate DDoS attacks, such as IPv6, IEEE 802.15.4, 6LoWPAN, etc. However, Shah et al (2022) did not mention blockchainbased solutions that mitigate DDoS attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…For example, the IDS vendor interoperability to support the blockchain technology is needed in enterprise environment. Denial of service attacks detection at the IDS level is too late and might already congest the edge network communication channels or the content delivery network communications (Chaganti et al, 2022). Yeh et al (2020), Shafi and Basit (2019) and Hajizadeh et al (2020) discussed the threat information sharing including DDoS threat data among the collaborators for secure data sharing using blockchain based smart contracts technology and decentralized data storage.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Nerella et al [13] developed a model based on color decomposition techniques, a new way to perform visual color and encryption using wavelet technology and uses wavelet technology to convert a color image to a gray image that the important feature .…”
Section: Related Workmentioning
confidence: 99%