Detect and Mitigate Blockchain-Based DDoS Attacks Using Machine Learning and Smart Contracts

Yaser Issam Aljanabi, Aso Ahmed Majeed, Kamal H. Jihad, Banaz Anwer Qader

Abstract


The key target of Distributed Denial-of-Service (DDoS) attacks is to interrupt and suspend any available online services either executed for professional or personal gains. These attacks originate from the fast advancement in the number of insecure technologies. The attacks are caused due to the easy access to internet and advent of technology resulting to exponential growth of traffic volumes. DDoS attack remains most leading security risks to provisioning services. Also, the current embraced security mechanism for defense lacks flexibility and adequate resources to combat these attacks. Hence, there is need to embrace various other critical resources, where they can share the problem of mitigation. In addition, emerging technologies for instance smart contracts and blockchain offers for the sharing of these potential attacks information in an entirely automated and distributed manner. This paper recommends for a blockchain design which combines smart contracts and Machine Learning (ML) technologies, by presenting new ideal opportunities towards efficient DDoS mitigation solutions in variety of cooperative domains. Furthermore, the key advantage and benefits of this structure is deployment of still existing distributed and public infrastructure to blacklisted IP address or even advertise white, and the application of such an infrastructure with further defense mechanisms to current attacks of DDoS, deprived of considering distribution mechanisms or specialized registries, which facilitates the implementation of procedures across diverse domains. This paper further presents the demonstration and implementation features of this blockchain structure, discussion and study findings over these smart contracts and ML technologies. The study further concludes by recommending use of smart contract in collaborative block-chain design with ML for mitigating future attack of DDoS.


Full Text:

PDF

References


B. Rodrigues and B. Stiller, (2019), “Cooperative signaling of DDoS attacks in a blockchain-based network,” in Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, New York, pp. 39–41, doi:10.1145/3342280.3342300.

N. M. Yungaicela-Naula , C. Vargas-Rosales, and J. A. Perez-Diaz, (2021), “SDN-Based Architecture for Transport and Application Layer DDoS Attack Detection by Using Machine and Deep Learning”, IEEE Access, vol. 9, pp. 108495–108512, doi:10.1109/ACCESS.2021.3101650 .

J. G. Almaraz-Rivera , J. A. Perez-Diaz, and J. A. Cantoral-Ceballos, (2022), “Transport and Application Layer DDoS Attacks Detection to IoT Devices by Using Machine Learning and Deep Learning Models”, sensors (MDPI), vol. 22, no. 9, pp. 1-18, doi:10.3390/s22093367.

B. Rodrigues, T. Bocek, A. Lareida, D. Hausheer, S. Rafati, and B. Stiller, (2017), “A blockchain-based architecture for collaborative DDoS mitigation with smart contracts,” in IFIP International Conference on Autonomous Infrastructure, Management and Security, Springer, vol. 10356, pp. 16–29, doi:10.1007/978-3-319-60774-0_2.

M. Chen, X. Tang, J. Cheng, N. Xiong, J. Li, and D. Fan, (2020), “A DDoS Attack Defense Method Based on Blockchain for IoTs Devices,” in International Conference on Artificial Intelligence and Security, (ICAIS), Springer, Singapore, Communications in Computer and Information Science, vol 1253, pp. 685–694, doi:10.1007/978-981-15-8086-4_64.

D. V. V. S. Manikumar and B. U. Maheswari, (2020), "Blockchain Based DDoS Mitigation Using Machine Learning Techniques," 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), India, pp. 794-800, doi: 10.1109/ICIRCA48905.2020.9183092.

B. A. Qader, K. H. Jihad, and M. R. Baker, (2022), “Evolving and training of Neural Network to Play DAMA Board Game Using NEAT Algorithm”, Informatica, vol. 46, no. 5, pp. 29-37, doi:10.31449/inf.v46i5.3897

Subardono and I. K. Hariri, (2021), “Monitoring and Analysis of Honeypot System Performance using Simple Network Management Protocol (SNMP),” Journal of Internet and Software Engineering, vol. 2, no. 1, pp. 1–8.

M. Najafimehr, S. Zarifzadeh, and S. Mostafavi, (2022), “A hybrid machine learning approach for detecting unprecedented DDoS attacks”, J Supercomput., vol. 78, no. 6, pp. 8106–8136, doi:10.1007/s11227-021-04253-x.

R. Singh, S. Tanwar, and T. P. Sharma, (2020), “Utilization of blockchain for mitigating the distributed denial of service attacks,” Security and Privacy, vol. 3, no. 3, pp. 96, doi:10.1002/spy2.96.

X. Han, R. Zhang, X. Liu, and F. Jiang, (2020), “Biologically Inspired Smart Contract: A Blockchain-Based DDoS Detection System,” in 2020 IEEE International Conference on Networking, Sensing and Control (ICNSC), China, pp. 1–6, doi:10.1109/ICNSC48988.2020.9238104 .

S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, and F.-Y. Wang, (2019), “Blockchain-enabled smart contracts: architecture, applications, and future trends,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 11, pp. 2266–2277, doi:10.1109/TSMC.2019.2895123.

Z. Abou El Houda, A. S. Hafid, and L. Khoukhi, (2019), “Cochain-SC: An intra-and inter-domain DDoS mitigation scheme based on blockchain using SDN and smart contract,” IEEE Access, vol. 7, pp. 98893–98907, doi:10.1109/ACCESS.2019.2930715.

Gruhler, B. Rodrigues, and B. Stiller, (2019), “A reputation scheme for a blockchain-based network cooperative defense,” in 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), pp. 71–79.

Rashidi, C. Fung, and E. Bertino, (2017), “A collaborative DDoS defence framework using network function virtualization,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2483–2497, doi:10.1109/TIFS.2017.2708693.

T. Bocek and B. Stiller, (2018), “Smart contracts–blockchains in the wings,” in Digital marketplaces unleashed, Springer, pp. 169–184.




DOI: https://doi.org/10.31449/inf.v46i7.4033

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.