Detect and Mitigate Blockchain-Based DDoS Attacks Using Machine Learning and Smart Contracts
DOI:
https://doi.org/10.31449/inf.v46i7.4033Abstract
The key target of Distributed Denial-of-Service (DDoS) attacks is to interrupt and suspend any available online services either executed for professional or personal gains. These attacks originate from the fast advancement in the number of insecure technologies. The attacks are caused due to the easy access to internet and advent of technology resulting to exponential growth of traffic volumes. DDoS attack remains most leading security risks to provisioning services. Also, the current embraced security mechanism for defense lacks flexibility and adequate resources to combat these attacks. Hence, there is need to embrace various other critical resources, where they can share the problem of mitigation. In addition, emerging technologies for instance smart contracts and blockchain offers for the sharing of these potential attacks information in an entirely automated and distributed manner. This paper recommends for a blockchain design which combines smart contracts and Machine Learning (ML) technologies, by presenting new ideal opportunities towards efficient DDoS mitigation solutions in variety of cooperative domains. Furthermore, the key advantage and benefits of this structure is deployment of still existing distributed and public infrastructure to blacklisted IP address or even advertise white, and the application of such an infrastructure with further defense mechanisms to current attacks of DDoS, deprived of considering distribution mechanisms or specialized registries, which facilitates the implementation of procedures across diverse domains. This paper further presents the demonstration and implementation features of this blockchain structure, discussion and study findings over these smart contracts and ML technologies. The study further concludes by recommending use of smart contract in collaborative block-chain design with ML for mitigating future attack of DDoS.References
B. Rodrigues and B. Stiller, (2019), “Cooperative signaling of DDoS attacks in a blockchain-based network,” in Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, New York, pp. 39–41, doi:10.1145/3342280.3342300.
N. M. Yungaicela-Naula , C. Vargas-Rosales, and J. A. Perez-Diaz, (2021), “SDN-Based Architecture for Transport and Application Layer DDoS Attack Detection by Using Machine and Deep Learning”, IEEE Access, vol. 9, pp. 108495–108512, doi:10.1109/ACCESS.2021.3101650 .
J. G. Almaraz-Rivera , J. A. Perez-Diaz, and J. A. Cantoral-Ceballos, (2022), “Transport and Application Layer DDoS Attacks Detection to IoT Devices by Using Machine Learning and Deep Learning Models”, sensors (MDPI), vol. 22, no. 9, pp. 1-18, doi:10.3390/s22093367.
B. Rodrigues, T. Bocek, A. Lareida, D. Hausheer, S. Rafati, and B. Stiller, (2017), “A blockchain-based architecture for collaborative DDoS mitigation with smart contracts,” in IFIP International Conference on Autonomous Infrastructure, Management and Security, Springer, vol. 10356, pp. 16–29, doi:10.1007/978-3-319-60774-0_2.
M. Chen, X. Tang, J. Cheng, N. Xiong, J. Li, and D. Fan, (2020), “A DDoS Attack Defense Method Based on Blockchain for IoTs Devices,” in International Conference on Artificial Intelligence and Security, (ICAIS), Springer, Singapore, Communications in Computer and Information Science, vol 1253, pp. 685–694, doi:10.1007/978-981-15-8086-4_64.
D. V. V. S. Manikumar and B. U. Maheswari, (2020), "Blockchain Based DDoS Mitigation Using Machine Learning Techniques," 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), India, pp. 794-800, doi: 10.1109/ICIRCA48905.2020.9183092.
B. A. Qader, K. H. Jihad, and M. R. Baker, (2022), “Evolving and training of Neural Network to Play DAMA Board Game Using NEAT Algorithm”, Informatica, vol. 46, no. 5, pp. 29-37, doi:10.31449/inf.v46i5.3897
Subardono and I. K. Hariri, (2021), “Monitoring and Analysis of Honeypot System Performance using Simple Network Management Protocol (SNMP),” Journal of Internet and Software Engineering, vol. 2, no. 1, pp. 1–8.
M. Najafimehr, S. Zarifzadeh, and S. Mostafavi, (2022), “A hybrid machine learning approach for detecting unprecedented DDoS attacks”, J Supercomput., vol. 78, no. 6, pp. 8106–8136, doi:10.1007/s11227-021-04253-x.
R. Singh, S. Tanwar, and T. P. Sharma, (2020), “Utilization of blockchain for mitigating the distributed denial of service attacks,” Security and Privacy, vol. 3, no. 3, pp. 96, doi:10.1002/spy2.96.
X. Han, R. Zhang, X. Liu, and F. Jiang, (2020), “Biologically Inspired Smart Contract: A Blockchain-Based DDoS Detection System,” in 2020 IEEE International Conference on Networking, Sensing and Control (ICNSC), China, pp. 1–6, doi:10.1109/ICNSC48988.2020.9238104 .
S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, and F.-Y. Wang, (2019), “Blockchain-enabled smart contracts: architecture, applications, and future trends,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 11, pp. 2266–2277, doi:10.1109/TSMC.2019.2895123.
Z. Abou El Houda, A. S. Hafid, and L. Khoukhi, (2019), “Cochain-SC: An intra-and inter-domain DDoS mitigation scheme based on blockchain using SDN and smart contract,” IEEE Access, vol. 7, pp. 98893–98907, doi:10.1109/ACCESS.2019.2930715.
Gruhler, B. Rodrigues, and B. Stiller, (2019), “A reputation scheme for a blockchain-based network cooperative defense,” in 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), pp. 71–79.
Rashidi, C. Fung, and E. Bertino, (2017), “A collaborative DDoS defence framework using network function virtualization,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2483–2497, doi:10.1109/TIFS.2017.2708693.
T. Bocek and B. Stiller, (2018), “Smart contracts–blockchains in the wings,” in Digital marketplaces unleashed, Springer, pp. 169–184.
Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika