Skip to main content

Intelligent Web-Application for Countering DDoS Attacks on Educational Institutions

  • 553 Accesses

Part of the Studies in Computational Intelligence book series (SCI,volume 1032)

Abstract

The work is devoted to the development of an intelligent prevention system DDoS attacks on educational institutions using blockchain technology. The principles of developing decentralized applications were studied using smart con-tracts. A model of a system for countering DDoS attacks using blockchain has been developed. A new architecture of an intelligent system is proposed using the blockchain to counter cyber-attacks, such as distributed denial of service. A com-putational experiment for issuing DDoS attacks on educational institutions was carried out. A comparison of the proposed intelligent system with traditional countermeasures against DDoS attacks used by educational institutions to ensure information security. The advantages of an intelligent blockchain system are established prevention of DDoS attacks, applied to political institutions. The results will be useful to specialists and researchers in both the field information security, and in the field of social and political sciences.

Keywords

  • Information security
  • DDoS attack
  • Artificial intelligence
  • Education
  • Web-application
  • Digital technologies

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Dunn Cavelty M., Wenger A.: Cyber security meets security politics: complex technology, fragmented politics, and networked science. Contemp. Secur. Policy 41(1), 5–32 (2020)

    Google Scholar 

  2. Kuznetsova, A., Maleva, T., Soloviev, V.: Detecting apples in orchards using YOLOv3. In: Gervasi, O., et al. (eds.) Computational Science and Its Applications – ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science, vol. 12249, pp. 923–934. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58799-4_66

  3. Korchagin, S.A., Terin, D.V., Klinaev, Y.V., Romanchuk, S.P.: Simulation of current-voltage characteristics of conglomerate of nonlinear semiconductor nanocomposites. In: 2018 International Conference on Actual Problems of Electron Devices Engineering (APEDE), pp. 397–399. IEEE (2018)

    Google Scholar 

  4. Canh, N.P., et al.: Systematic risk in cryptocurrency market: evidence from DCC-MGARCH model. Financ. Res. Lett. 29, 90–100 (2019)

    Google Scholar 

  5. Husain, S.O., Franklin, A., Roep, D.: The political imaginaries of blockchain projects: discerning the expressions of an emerging ecosystem. Sustain Sci 15, 379--394 (2020). https://doi.org/10.1007/s11625-020-00786-x

  6. Conti, M., et al.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutorials 20(4), 3416–3452 (2018)

    Google Scholar 

  7. Korchagin, S.A., et al.: Software and digital methods in the natural experiment for the research of dielectric permeability of nanocomposites. In: 2018 International Conference on Actual Problems of Electron Devices Engineering (APEDE), Saratov, pp. 262–265. IEEE (2018)

    Google Scholar 

  8. Gataullin T.M., Gataullin S.T.: Best economic approaches under conditions of uncertainty. In: 11th International Conference Management of Large-Scale System Development, MLSD 2018, Moscow (2018)

    Google Scholar 

  9. Gataullin T.M., Gataullin S.T.: Management of financial flows on transport. In: 12th International Conference Management of Large-Scale System Development, MLSD 2019, Moscow (2019)

    Google Scholar 

  10. Apel, S., Hertrampf, F., Späthe, S.: Towards a metrics-based software quality rating for a microservice architecture. In: Lüke, K.-H., Eichler, G., Erfurth, C., Fahrnberger, G. (eds.) I4CS 2019. CCIS, vol. 1041, pp. 205–220. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22482-0_15

    CrossRef  Google Scholar 

  11. Mladenov V., Mainka C., zu Selhausen K.M., Grothe M., Schwenk J.: Trillion dollar refund: how to spoof PDF signatures. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, pp. 1–14. ACM (2019)

    Google Scholar 

  12. Salah, K., Rehman, M.H.U., Nizamuddin, N., Al-Fuqaha, A.: Blockchain for AI: review and open research challenges. IEEE Access 7, 10127–10149 (2019)

    Google Scholar 

  13. Yadav, A.K., Singh, K.: Comparative analysis of consensus algorithms of blockchain technology. In: Hu, YC., Tiwari, S., Trivedi, M., Mishra, K. (eds.) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol. 1097, pp. 205–218. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-1518-7_17

  14. Gupta, B.B., Dahiya, A., Upneja, C., Garg, A., Choudhary, R.: A comprehensive survey on DDoS attacks and recent defense mechanisms. In: Gupta, B.B., Srinivasagopalan, S. (eds.) Handbook of Research on Intrusion Detection Systems:, pp. 186–218. IGI Global (2020)

    CrossRef  Google Scholar 

  15. Tavares, B., Correia, F.F, Restivo, A.L A Survey on blockchain technologies and research. J. Inf. 14, 118–128 (2019)

    Google Scholar 

  16. Schulzke, M.: The politics of attributing blame for cyberattacks and the costs of uncertainty. Perspect. Politics 16(4), 954–968 (2018)

    CrossRef  Google Scholar 

  17. Rahman, N.A.A., Sairi, I.H., Zizi, N.A.M., Khalid, F.: The importance of cybersecurity education in school. Int. J. Inf. Educ. Technol. 10(5), 378–382 (2020)

    Google Scholar 

  18. Dawson, M.: National cybersecurity education: bridging defense to offense. Land Forces Acad. Rev. 25(1), 68–75 (2020)

    CrossRef  Google Scholar 

  19. Khasanshin, I.: Application of an artificial neural network to automate the measurement of kinematic characteristics of punches in boxing. Appl. Sci. 11(3), 1223 (2021)

    CrossRef  Google Scholar 

  20. Soboleva, E.V., Suvorova, T.N., Zenkina, S.V., Bocharov, M.I.: Professional self-determination support for students in the digital educational space. Eur. J. Contemp. Educ. 9(3), 603–620 (2020). https://doi.org/10.32744/pse.2020.6.32

  21. Korchagin S., Romanova E., Serdechnyy D., Nikitin P., Dolgov V., Feklin V. Mathematical modeling of layered nanocomposite of fractal structure. Mathematics 9(13), 1541 (2021)

    Google Scholar 

  22. Shirokanev A.S., Andriyanov N.A., Ilyasova N.Y.: Development of vector algorithm using CUDA technology for three-dimensional retinal laser coagulation process modeling. Comput. Opt. 45(3), 427–437 (2021)

    Google Scholar 

  23. Soloviev, V., Titov, N., Smirnova, E.: Coking coal railway transportation forecasting using ensembles of ElasticNet, LightGBM, and Facebook prophet. In: Nicosia, G., et al. (eds.) Machine Learning, Optimization, and Data Science. LOD 2020. Lecture Notes in Computer Science, vol. 12566, pp. 181–190. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-64580-9_15

  24. Kuznetsova, A., Maleva, T., Soloviev, V.: Detecting apples in orchards using YOLOv3. In: Gervasi, O., et al. (eds.) ICCSA 2020. LNCS, vol. 12249, pp. 923–934. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58799-4_66

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Radygin Victor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mikhail, I. et al. (2022). Intelligent Web-Application for Countering DDoS Attacks on Educational Institutions. In: Klimov, V.V., Kelley, D.J. (eds) Biologically Inspired Cognitive Architectures 2021. BICA 2021. Studies in Computational Intelligence, vol 1032. Springer, Cham. https://doi.org/10.1007/978-3-030-96993-6_18

Download citation