Distributed denial of service (DDoS) mitigation using blockchain—A comprehensive insight

S Wani, M Imthiyas, H Almohamedh, KM Alhamed… - Symmetry, 2021 - mdpi.com
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate
requests on any network. Although the first DDoS attack was reported in 1996, the …

Efficient intelligent intrusion detection system for heterogeneous internet of things (HetIoT)

S Mahadik, PM Pawar, R Muthalagu - Journal of Network and Systems …, 2023 - Springer
Moving towards a more digital and intelligent world equipped with internet-of-thing (IoT)
devices creates many security issues. A distributed denial of service (DDoS) attack is one of …

IT standardization in cloud computing: Security challenges, benefits, and future directions

OC Adeusi, YO Adebayo, PA Ayodele… - World Journal of …, 2024 - wjarr.co.in
Cloud computing has revolutionized information technology, offering scalable solutions for
businesses. However, security concerns hinder widespread adoption, especially among …

A blockchain-based authentication scheme for 5g-enabled iot

B Goswami, H Choudhury - Journal of Network and Systems management, 2022 - Springer
Abstract 5G cellular network is becoming a preferred technology for communication in
deployments of the Internet of Things (IoT). However, 5G cellular network is essentially …

Ethereum's peer-to-peer network monitoring and sybil attack prevention

JP Eisenbarth, T Cholez, O Perrin - Journal of Network and Systems …, 2022 - Springer
Public blockchains, like Ethereum, rely on an underlying peer-to-peer (P2P) network to
disseminate transactions and blocks between nodes. With the rise of blockchain …

Towards a trustful game-theoretic mechanism for data trading in the blockchain-IoT ecosystem

S Khezr, A Yassine, R Benlamri - Journal of Network and Systems …, 2022 - Springer
This paper introduces a data trading system based on the blockchain network, where a
trusted data aggregator collects data from the Internet of Things (IoT) device owners and …

A cooperative defense framework against application-level DDoS attacks on mobile edge computing services

H Li, C Yang, L Wang, N Ansari, D Tang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Mobile edge computing (MEC), extending computing services from cloud to edge, is
recognized as one of key pillars to facilitate real-time services and tackle backhaul …

On trust, blockchain, and reputation systems

B Rodrigues, M Franco, C Killer, EJ Scheid… - Handbook on …, 2022 - Springer
Trust management in distributed systems has always been a topic of active interest in the
research community to understand how to foster and manage aspects. In this sense …

A Repeated Game-Based Distributed Denial of Service Attacks Mitigation Method for Mining Pools

X Liu, Z Huang, Q Wang, Y Chen, Y Cao - Electronics, 2024 - mdpi.com
A Distributed Denial of Service (DDoS) attack is a prevalent issue in the blockchain network
layer, causing significant revenue loss for honest mining pools. This paper introduces a …

[PDF][PDF] Cooperative Detection Method for DDoS Attacks Based on Blockchain.

J Cheng, X Yao, H Li, H Lu, N Xiong, P Luo… - Comput. Syst. Sci …, 2022 - cdn.techscience.cn
Distributed Denial of Service (DDoS) attacks is always one of the major problems for service
providers. Using blockchain to detect DDoS attacks is one of the current popular methods …