IDEAS home Printed from https://ideas.repec.org/a/spr/jtrsec/v15y2022i3d10.1007_s12198-022-00245-x.html
   My bibliography  Save this article

Design and implementation of controlling with preventing DDOS attacks using bitcoin by Ethereum block chain technology

Author

Listed:
  • R. Akilandeswari

    (A.VeeriyaVandayar Memorial Sri Pushpam College(Autonomous) (Affiliated to Bharathidasan University))

  • S. Malathi

    (Swami Dayananda College of Arts and Science, Manjakkudi, Tiruvarur(dt) (Affiliated to Bharathidasan University))

Abstract

In order to avoid needless spread in such a transmission system, all nodes in the block chain search ‘memory pool.’ There is no limit to the rate of output of transactions in the current blockchain. Since there is no limit to the transaction rate, the DDoS attacker can easily target blockchain by making a transaction. This DDoS attack was called ‘Overflood Attack.’ In this paper, to avoid ‘Overflood Attack,’ we propose a method to dynamically limit the maximum amount of the transaction to be created using the Least Mean Square. Blockchain is a p2p-based trusting technology that allows nodes participating in the p2p network to easily exchange data without a central management system. Since all nodes in the blockchain network share the same data at the same stage, confidentiality of shared data can be assured. Bitcoin and Ethereum are electronic money exchange platforms based on blockchain technology which make blockchain technology more popular. As a result, this technology has been used in a variety of fields concerning data confidence and honesty, rather than being used strictly for electronic money transactions. All the nodes in the block-chain network share the same info. To share the same data, Blockchain uses the p2p mechanism called ‘flooding’ as the data transfer process, where the data is represented as a transaction and a block. ‘Flooding’ means that the node that generated the data transmits the data to the directly connected node, does not transmit the data to all the nodes on entire network, and transmitted nodes return to connected nodes. Both blockchain nodes use ‘Data Validation’ and ‘Memory pool management’ to avoid undesired transmission rather than simply re-transmitting transactions and blocks. ‘Data Validation’ is the right transaction and block that is being transmitted.

Suggested Citation

  • R. Akilandeswari & S. Malathi, 2022. "Design and implementation of controlling with preventing DDOS attacks using bitcoin by Ethereum block chain technology," Journal of Transportation Security, Springer, vol. 15(3), pages 281-297, December.
  • Handle: RePEc:spr:jtrsec:v:15:y:2022:i:3:d:10.1007_s12198-022-00245-x
    DOI: 10.1007/s12198-022-00245-x
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s12198-022-00245-x
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s12198-022-00245-x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Georgios Spathoulas & Nikolaos Giachoudis & Georgios-Paraskevas Damiris & Georgios Theodoridis, 2019. "Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets," Future Internet, MDPI, vol. 11(11), pages 1-24, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kainat Ansar & Mansoor Ahmed & Markus Helfert & Jungsuk Kim, 2023. "Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions," Mathematics, MDPI, vol. 12(1), pages 1-21, December.
    2. Simon Nam Thanh Vu & Mads Stege & Peter Issam El-Habr & Jesper Bang & Nicola Dragoni, 2021. "A Survey on Botnets: Incentives, Evolution, Detection and Current Trends," Future Internet, MDPI, vol. 13(8), pages 1-43, July.
    3. Shatha Alharbi & Afraa Attiah & Daniyal Alghazzawi, 2022. "Integrating Blockchain with Artificial Intelligence to Secure IoT Networks: Future Trends," Sustainability, MDPI, vol. 14(23), pages 1-27, November.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:jtrsec:v:15:y:2022:i:3:d:10.1007_s12198-022-00245-x. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.