Abstract
The work is devoted to the development of an intelligent prevention system DDoS attacks on educational institutions using blockchain technology. The principles of developing decentralized applications were studied using smart con-tracts. A model of a system for countering DDoS attacks using blockchain has been developed. A new architecture of an intelligent system is proposed using the blockchain to counter cyber-attacks, such as distributed denial of service. A com-putational experiment for issuing DDoS attacks on educational institutions was carried out. A comparison of the proposed intelligent system with traditional countermeasures against DDoS attacks used by educational institutions to ensure information security. The advantages of an intelligent blockchain system are established prevention of DDoS attacks, applied to political institutions. The results will be useful to specialists and researchers in both the field information security, and in the field of social and political sciences.
Keywords
- Information security
- DDoS attack
- Artificial intelligence
- Education
- Web-application
- Digital technologies
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Dunn Cavelty M., Wenger A.: Cyber security meets security politics: complex technology, fragmented politics, and networked science. Contemp. Secur. Policy 41(1), 5–32 (2020)
Kuznetsova, A., Maleva, T., Soloviev, V.: Detecting apples in orchards using YOLOv3. In: Gervasi, O., et al. (eds.) Computational Science and Its Applications – ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science, vol. 12249, pp. 923–934. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58799-4_66
Korchagin, S.A., Terin, D.V., Klinaev, Y.V., Romanchuk, S.P.: Simulation of current-voltage characteristics of conglomerate of nonlinear semiconductor nanocomposites. In: 2018 International Conference on Actual Problems of Electron Devices Engineering (APEDE), pp. 397–399. IEEE (2018)
Canh, N.P., et al.: Systematic risk in cryptocurrency market: evidence from DCC-MGARCH model. Financ. Res. Lett. 29, 90–100 (2019)
Husain, S.O., Franklin, A., Roep, D.: The political imaginaries of blockchain projects: discerning the expressions of an emerging ecosystem. Sustain Sci 15, 379--394 (2020). https://doi.org/10.1007/s11625-020-00786-x
Conti, M., et al.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutorials 20(4), 3416–3452 (2018)
Korchagin, S.A., et al.: Software and digital methods in the natural experiment for the research of dielectric permeability of nanocomposites. In: 2018 International Conference on Actual Problems of Electron Devices Engineering (APEDE), Saratov, pp. 262–265. IEEE (2018)
Gataullin T.M., Gataullin S.T.: Best economic approaches under conditions of uncertainty. In: 11th International Conference Management of Large-Scale System Development, MLSD 2018, Moscow (2018)
Gataullin T.M., Gataullin S.T.: Management of financial flows on transport. In: 12th International Conference Management of Large-Scale System Development, MLSD 2019, Moscow (2019)
Apel, S., Hertrampf, F., Späthe, S.: Towards a metrics-based software quality rating for a microservice architecture. In: Lüke, K.-H., Eichler, G., Erfurth, C., Fahrnberger, G. (eds.) I4CS 2019. CCIS, vol. 1041, pp. 205–220. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22482-0_15
Mladenov V., Mainka C., zu Selhausen K.M., Grothe M., Schwenk J.: Trillion dollar refund: how to spoof PDF signatures. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, pp. 1–14. ACM (2019)
Salah, K., Rehman, M.H.U., Nizamuddin, N., Al-Fuqaha, A.: Blockchain for AI: review and open research challenges. IEEE Access 7, 10127–10149 (2019)
Yadav, A.K., Singh, K.: Comparative analysis of consensus algorithms of blockchain technology. In: Hu, YC., Tiwari, S., Trivedi, M., Mishra, K. (eds.) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol. 1097, pp. 205–218. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-1518-7_17
Gupta, B.B., Dahiya, A., Upneja, C., Garg, A., Choudhary, R.: A comprehensive survey on DDoS attacks and recent defense mechanisms. In: Gupta, B.B., Srinivasagopalan, S. (eds.) Handbook of Research on Intrusion Detection Systems:, pp. 186–218. IGI Global (2020)
Tavares, B., Correia, F.F, Restivo, A.L A Survey on blockchain technologies and research. J. Inf. 14, 118–128 (2019)
Schulzke, M.: The politics of attributing blame for cyberattacks and the costs of uncertainty. Perspect. Politics 16(4), 954–968 (2018)
Rahman, N.A.A., Sairi, I.H., Zizi, N.A.M., Khalid, F.: The importance of cybersecurity education in school. Int. J. Inf. Educ. Technol. 10(5), 378–382 (2020)
Dawson, M.: National cybersecurity education: bridging defense to offense. Land Forces Acad. Rev. 25(1), 68–75 (2020)
Khasanshin, I.: Application of an artificial neural network to automate the measurement of kinematic characteristics of punches in boxing. Appl. Sci. 11(3), 1223 (2021)
Soboleva, E.V., Suvorova, T.N., Zenkina, S.V., Bocharov, M.I.: Professional self-determination support for students in the digital educational space. Eur. J. Contemp. Educ. 9(3), 603–620 (2020). https://doi.org/10.32744/pse.2020.6.32
Korchagin S., Romanova E., Serdechnyy D., Nikitin P., Dolgov V., Feklin V. Mathematical modeling of layered nanocomposite of fractal structure. Mathematics 9(13), 1541 (2021)
Shirokanev A.S., Andriyanov N.A., Ilyasova N.Y.: Development of vector algorithm using CUDA technology for three-dimensional retinal laser coagulation process modeling. Comput. Opt. 45(3), 427–437 (2021)
Soloviev, V., Titov, N., Smirnova, E.: Coking coal railway transportation forecasting using ensembles of ElasticNet, LightGBM, and Facebook prophet. In: Nicosia, G., et al. (eds.) Machine Learning, Optimization, and Data Science. LOD 2020. Lecture Notes in Computer Science, vol. 12566, pp. 181–190. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-64580-9_15
Kuznetsova, A., Maleva, T., Soloviev, V.: Detecting apples in orchards using YOLOv3. In: Gervasi, O., et al. (eds.) ICCSA 2020. LNCS, vol. 12249, pp. 923–934. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58799-4_66
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Mikhail, I. et al. (2022). Intelligent Web-Application for Countering DDoS Attacks on Educational Institutions. In: Klimov, V.V., Kelley, D.J. (eds) Biologically Inspired Cognitive Architectures 2021. BICA 2021. Studies in Computational Intelligence, vol 1032. Springer, Cham. https://doi.org/10.1007/978-3-030-96993-6_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-96993-6_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-96992-9
Online ISBN: 978-3-030-96993-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)