Abstract
In order to avoid needless spread in such a transmission system, all nodes in the block chain search ‘memory pool.’ There is no limit to the rate of output of transactions in the current blockchain. Since there is no limit to the transaction rate, the DDoS attacker can easily target blockchain by making a transaction. This DDoS attack was called ‘Overflood Attack.’ In this paper, to avoid ‘Overflood Attack,’ we propose a method to dynamically limit the maximum amount of the transaction to be created using the Least Mean Square. Blockchain is a p2p-based trusting technology that allows nodes participating in the p2p network to easily exchange data without a central management system. Since all nodes in the blockchain network share the same data at the same stage, confidentiality of shared data can be assured. Bitcoin and Ethereum are electronic money exchange platforms based on blockchain technology which make blockchain technology more popular. As a result, this technology has been used in a variety of fields concerning data confidence and honesty, rather than being used strictly for electronic money transactions. All the nodes in the block-chain network share the same info. To share the same data, Blockchain uses the p2p mechanism called ‘flooding’ as the data transfer process, where the data is represented as a transaction and a block. ‘Flooding’ means that the node that generated the data transmits the data to the directly connected node, does not transmit the data to all the nodes on entire network, and transmitted nodes return to connected nodes. Both blockchain nodes use ‘Data Validation’ and ‘Memory pool management’ to avoid undesired transmission rather than simply re-transmitting transactions and blocks. ‘Data Validation’ is the right transaction and block that is being transmitted.
Similar content being viewed by others
Change history
04 July 2023
A Correction to this paper has been published: https://doi.org/10.1007/s12198-023-00265-1
References
Dasgupta D, Shrein JM, Gupta KD (2019) A survey of blockchain from security perspective. J Bank Financ Technol 3(1):1–17
Hafid A, Hafid AS, Samih M (2019) New mathematical model to analyze security of sharding-based blockchain protocols. IEEE Access 7:185447–185457
Killer C, Rodrigues B, Stiller B (2019a) Security management and visualization in a blockchain-based collaborative defense. In: 2019 IEEE international conference on blockchain and cryptocurrency (ICBC). IEEE, New York, pp 108–111
Killer C, Rodrigues B, Stiller B (2019b) Threat management dashboard for a blockchain collaborative defense. In: 2019 IEEE globecom workshops (GC Wkshps). IEEE, New York, pp 1–6
Kotey SD, Tchao ET, Gadze JD (2019) On distributed denial of service current defense schemes. Technologies 7(1):19–25
Kumar S, Amin R (2021) Mitigating distributed denial of service attack: Blockchain and s oftware-defined networking based approach, network model with future research challenges. Secur Privacy 4(4):e163
Kumar P, Kumar R, Gupta GP, Tripathi R (2021) A distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT systems by leveraging fog computing. Trans Emerg Telecommun Technol 32(6):e4112
Lee Y, Rathore S, Park JH, Park JH (2020) A blockchain-based smart home gateway architecture for preventing data forgery. Hum-centric Comput Inform Sci 10(1):1–14
Mauri L, Cimato S, Damiani E (2018) “A comparative analysis of current cryptocurrencies,” Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP, Funchal, Madeira - Portugal, pp. 127–138. [Online]. https://doi.org/10.5220/0006648801270138
Rodrigues B, Eisenring L, Scheid E, Bocek T, Stiller B (2019) Evaluating a blockchain-based cooperative defense. In: 2019 IFIP/IEEE symposium on integrated network and service management (IM 2019), pp. 533–538, Washington, United States of America (USA)
Rodrigues B, Trendaflov S, Scheid EJ, Stiller B (2020a) SC-FLARE: cooperative DDoS signalingbased on smart contracts. In: IEEE international conference on blockchain and cryptocurrency (ICBC 2020). IEEE, Toronto, pp 1–3
Rodrigues B, Scheid E, Killer C, Franco M, Stiller B (2020b) BlockchainSignaling system (BloSS): cooperative signaling of distributed denial-of-service attacks. J Netw Syst Manag 28(4):953–989
Shafi Q, Basit A (2019) DDoS botnet prevention using blockchain in software defined internet of things. In 2019 16th international Bhurban conference on applied sciences and technology (IBCAST) (pp. 624-628). IEEE
Sharma PK, Rathore S, Park JH (2018. [Online]) Distarch-scnet: Blockchain-based distributed architecture with li-fi communication for a scalable smart city network. IEEE Consum Electron Mag 7(4):55–64. https://doi.org/10.1109/MCE.2018.2816745
Singh R, Tanwar S, Sharma TP (2020) Utilization of blockchain for mitigating the distributed denial of service attacks. Secur Privacy 3(3):e96
Spathoulas G, Giachoudis N, Damiris GP, Theodoridis G (2019) Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets. Future Internet 11(11):226
Zhang J, Wu M (2020) Blockchain use in IoT for privacy-preserving anti-pandemic home quarantine. Electronics 9(10):1746
Author information
Authors and Affiliations
Contributions
There is no authorship contribution.
Corresponding author
Ethics declarations
Ethics approval and consent to participate
No participation of humans takes place in this implementation process.
Human and animal rights
No violation of Human and Animal Rights is involved.
Conflict of interest
Conflict of interest is not applicable in this work.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original version of this article was revised: Affiliations 1 and 2 have been modified as they are Affiliated with Bharathidasan University.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Akilandeswari, R., Malathi, S. Design and implementation of controlling with preventing DDOS attacks using bitcoin by Ethereum block chain technology. J Transp Secur 15, 281–297 (2022). https://doi.org/10.1007/s12198-022-00245-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12198-022-00245-x