Skip to main content
Log in

Design and implementation of controlling with preventing DDOS attacks using bitcoin by Ethereum block chain technology

  • Published:
Journal of Transportation Security Aims and scope Submit manuscript

A Correction to this article was published on 04 July 2023

This article has been updated

Abstract

In order to avoid needless spread in such a transmission system, all nodes in the block chain search ‘memory pool.’ There is no limit to the rate of output of transactions in the current blockchain. Since there is no limit to the transaction rate, the DDoS attacker can easily target blockchain by making a transaction. This DDoS attack was called ‘Overflood Attack.’ In this paper, to avoid ‘Overflood Attack,’ we propose a method to dynamically limit the maximum amount of the transaction to be created using the Least Mean Square. Blockchain is a p2p-based trusting technology that allows nodes participating in the p2p network to easily exchange data without a central management system. Since all nodes in the blockchain network share the same data at the same stage, confidentiality of shared data can be assured. Bitcoin and Ethereum are electronic money exchange platforms based on blockchain technology which make blockchain technology more popular. As a result, this technology has been used in a variety of fields concerning data confidence and honesty, rather than being used strictly for electronic money transactions. All the nodes in the block-chain network share the same info. To share the same data, Blockchain uses the p2p mechanism called ‘flooding’ as the data transfer process, where the data is represented as a transaction and a block. ‘Flooding’ means that the node that generated the data transmits the data to the directly connected node, does not transmit the data to all the nodes on entire network, and transmitted nodes return to connected nodes. Both blockchain nodes use ‘Data Validation’ and ‘Memory pool management’ to avoid undesired transmission rather than simply re-transmitting transactions and blocks. ‘Data Validation’ is the right transaction and block that is being transmitted.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Change history

References

  • Dasgupta D, Shrein JM, Gupta KD (2019) A survey of blockchain from security perspective. J Bank Financ Technol 3(1):1–17

    Article  Google Scholar 

  • Hafid A, Hafid AS, Samih M (2019) New mathematical model to analyze security of sharding-based blockchain protocols. IEEE Access 7:185447–185457

    Article  Google Scholar 

  • Killer C, Rodrigues B, Stiller B (2019a) Security management and visualization in a blockchain-based collaborative defense. In: 2019 IEEE international conference on blockchain and cryptocurrency (ICBC). IEEE, New York, pp 108–111

    Chapter  Google Scholar 

  • Killer C, Rodrigues B, Stiller B (2019b) Threat management dashboard for a blockchain collaborative defense. In: 2019 IEEE globecom workshops (GC Wkshps). IEEE, New York, pp 1–6

    Google Scholar 

  • Kotey SD, Tchao ET, Gadze JD (2019) On distributed denial of service current defense schemes. Technologies 7(1):19–25

    Article  Google Scholar 

  • Kumar S, Amin R (2021) Mitigating distributed denial of service attack: Blockchain and s oftware-defined networking based approach, network model with future research challenges. Secur Privacy 4(4):e163

    Google Scholar 

  • Kumar P, Kumar R, Gupta GP, Tripathi R (2021) A distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT systems by leveraging fog computing. Trans Emerg Telecommun Technol 32(6):e4112

    Google Scholar 

  • Lee Y, Rathore S, Park JH, Park JH (2020) A blockchain-based smart home gateway architecture for preventing data forgery. Hum-centric Comput Inform Sci 10(1):1–14

    Google Scholar 

  • Mauri L, Cimato S, Damiani E (2018) “A comparative analysis of current cryptocurrencies,” Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP, Funchal, Madeira - Portugal, pp. 127–138. [Online]. https://doi.org/10.5220/0006648801270138

  • Rodrigues B, Eisenring L, Scheid E, Bocek T, Stiller B (2019) Evaluating a blockchain-based cooperative defense. In: 2019 IFIP/IEEE symposium on integrated network and service management (IM 2019), pp. 533–538, Washington, United States of America (USA)

  • Rodrigues B, Trendaflov S, Scheid EJ, Stiller B (2020a) SC-FLARE: cooperative DDoS signalingbased on smart contracts. In: IEEE international conference on blockchain and cryptocurrency (ICBC 2020). IEEE, Toronto, pp 1–3

    Google Scholar 

  • Rodrigues B, Scheid E, Killer C, Franco M, Stiller B (2020b) BlockchainSignaling system (BloSS): cooperative signaling of distributed denial-of-service attacks. J Netw Syst Manag 28(4):953–989

    Article  Google Scholar 

  • Shafi Q, Basit A (2019) DDoS botnet prevention using blockchain in software defined internet of things. In 2019 16th international Bhurban conference on applied sciences and technology (IBCAST) (pp. 624-628). IEEE

  • Sharma PK, Rathore S, Park JH (2018. [Online]) Distarch-scnet: Blockchain-based distributed architecture with li-fi communication for a scalable smart city network. IEEE Consum Electron Mag 7(4):55–64. https://doi.org/10.1109/MCE.2018.2816745

    Article  Google Scholar 

  • Singh R, Tanwar S, Sharma TP (2020) Utilization of blockchain for mitigating the distributed denial of service attacks. Secur Privacy 3(3):e96

    Google Scholar 

  • Spathoulas G, Giachoudis N, Damiris GP, Theodoridis G (2019) Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets. Future Internet 11(11):226

    Article  Google Scholar 

  • Zhang J, Wu M (2020) Blockchain use in IoT for privacy-preserving anti-pandemic home quarantine. Electronics 9(10):1746

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

There is no authorship contribution.

Corresponding author

Correspondence to S. Malathi.

Ethics declarations

Ethics approval and consent to participate

No participation of humans takes place in this implementation process.

Human and animal rights

No violation of Human and Animal Rights is involved.

Conflict of interest

Conflict of interest is not applicable in this work.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article was revised: Affiliations 1 and 2 have been modified as they are Affiliated with Bharathidasan University.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Akilandeswari, R., Malathi, S. Design and implementation of controlling with preventing DDOS attacks using bitcoin by Ethereum block chain technology. J Transp Secur 15, 281–297 (2022). https://doi.org/10.1007/s12198-022-00245-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12198-022-00245-x

Keywords

Navigation