《计算机应用》唯一官方网站 ›› 2025, Vol. 45 ›› Issue (11): 3416-3423.DOI: 10.11772/j.issn.1001-9081.2024121850
• 第七届CCF中国区块链技术大会 • 上一篇
唐梅1,2,3, 万武南1,3,4(
), 张仕斌1,3,4, 张金全1,2,3
收稿日期:2025-01-02
修回日期:2025-02-11
接受日期:2025-02-17
发布日期:2025-02-26
出版日期:2025-11-10
通讯作者:
万武南
作者简介:唐梅(2001—),女,四川广安人,硕士研究生,CCF会员,主要研究方向:区块链基金资助:
Mei TANG1,2,3, Wunan WAN1,3,4(
), Shibin ZHANG1,3,4, Jinquan ZHANG1,2,3
Received:2025-01-02
Revised:2025-02-11
Accepted:2025-02-17
Online:2025-02-26
Published:2025-11-10
Contact:
Wunan WAN
About author:TANG Mei, born in 2001, M. S. candidate. Her research interests include blockchain.Supported by:摘要:
随着网络安全威胁的日益加剧,分布式拒绝服务(DDoS)攻击一直是网络安全领域的研究难题。传统的DDoS防护方案通常依赖中心化架构,存在单点故障、数据篡改等问题,难以应对复杂多样的攻击场景。区块链技术凭借去中心化、不可篡改和透明性等特性,为DDoS防护提供了新的解决思路。针对DDoS防护中的技术挑战,总结了基于区块链的DDoS防护研究进展。首先,介绍DDoS攻击的基本概念及其对传统网络、物联网(IoT)和软件定义网络(SDN)等环境的威胁,分析引入区块链技术的必要性与潜在优势;其次,从区块链结合智能合约、深度学习、跨域协作等方面,归纳并对比现有的DDoS防护机制;最后,结合区块链性能优化、多域协作以及实时响应等方面的技术难点,展望未来基于区块链的DDoS防护技术的发展方向,从而为网络安全领域的研究者提供理论参考,进一步推动区块链在DDoS防护中的实际应用。
中图分类号:
唐梅, 万武南, 张仕斌, 张金全. 基于区块链的DDoS防护研究综述[J]. 计算机应用, 2025, 45(11): 3416-3423.
Mei TANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG. Survey of DDoS protection research based on blockchain[J]. Journal of Computer Applications, 2025, 45(11): 3416-3423.
| 分类 | 文献 | 优势 | 不足 |
|---|---|---|---|
协作防御、 资源共享 | [ | 提高响应速度和准确性,增强跨域协作与防御能力,优化资源共享与配置文件保护 | 在大规模网络中面临性能瓶颈,系统复杂,可能增加管理难度 |
隐私保护、 数据防篡改 | [ | 防止篡改、重放攻击,保障数据和通信的完整性与 机密性,部分方案计算成本低,性能提升显著 | 系统实现复杂,可能增加系统负担,复杂性较高 |
表1 IoT中基于区块链的DDoS防护研究成果总结
Tab. 1 Summary of research results on blockchain-based DDoS protection in IoT
| 分类 | 文献 | 优势 | 不足 |
|---|---|---|---|
协作防御、 资源共享 | [ | 提高响应速度和准确性,增强跨域协作与防御能力,优化资源共享与配置文件保护 | 在大规模网络中面临性能瓶颈,系统复杂,可能增加管理难度 |
隐私保护、 数据防篡改 | [ | 防止篡改、重放攻击,保障数据和通信的完整性与 机密性,部分方案计算成本低,性能提升显著 | 系统实现复杂,可能增加系统负担,复杂性较高 |
| [1] | Nexusguard. DDoS trend report 2024[EB/OL]. [2024-07-21]. . |
| [2] | ZHANG C, GREEN R. Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network[C]// Proceedings of the 18th Symposium on Communications and Networking. San Diego: Society for Modeling and Simulation International, 2015: 8-15. |
| [3] | 田国华,胡云瀚,陈晓峰.区块链系统攻击与防御技术研究进展[J].软件学报,2021,32(5):1495-1525 |
| TIAN G H, HU Y H, CHEN X F. Research progress on attack and defense techniques in block-chain system[J]. Journal of Software, 2021,32(5):1495-1525. | |
| [4] | KUMAR S, AMIN R. Mitigating distributed denial of service attack: blockchain and software‑defined networking based approach, network model with future research challenges[J]. Security and Privacy, 2021, 4(4): No.e163. |
| [5] | CHAGANTI R, BHUSHAN B, RAVI V. The role of blockchain in DDoS attacks mitigation: techniques, open challenges and future directions[EB/OL]. [2024-06-18].. |
| [6] | SHAH Z, ULLAH I, LI H, et al. Blockchain based solutions to mitigate distributed denial of service (DDoS) attacks in the Internet of Things (IoT): a survey[J]. Sensors, 2022, 22(3): No.1094. |
| [7] | KUMAR R, KUMAR P, TRIPATHI R, et al. A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network[J]. Journal of Parallel and Distributed Computing, 2022, 164: 55-68. |
| [8] | 蒋英肇,陈雷,闫巧.基于双通道特征融合的分布式拒绝服务攻击检测算法[J].信息网络安全,2023,23(7):86-97. |
| JIANG Y Z, CHEN L, YAN Q. Distributed denial of service attack detection algorithm based on two-channel feature fusion[J]. Netinfo Security, 2023, 23(7): 86-97. | |
| [9] | BANITALEBI DEHKORDI A, SOLTANAGHAEI M, BOROUJENI F Z. The DDoS attacks detection through machine learning and statistical methods in SDN[J]. The Journal of Supercomputing, 2021, 77(3): 2383-2415. |
| [10] | CHENG J, LI J, TANG X, et al. A novel DDoS attack detection method using optimized generalized multiple kernel learning[J].Computers, Materials and Continua, 2020, 62(3): 1423-1443. |
| [11] | ZARGAR S T, JOSHI J, TIPPER D. A survey of defense mechanisms against Distributed Denial of Service (DDoS) flooding attacks[J]. IEEE Communications Surveys and Tutorials, 2013, 15(4): 2046-2069. |
| [12] | 严芬,王佳佳,赵金凤,等.DDoS攻击检测综述[J].计算机应用研究,2008,25(4):966-969. |
| YAN F, WANG J J, ZHAO J F, et al. Survey of detection on DDoS attack[J]. Application Research of Computers, 2008, 25(4): 966-969. | |
| [13] | GREENSPAN G. Ending the bitcoin vs blockchain debate [EB/OL]. [2024-07-25]. . |
| [14] | MIRKOVIC J, REIHER P. A taxonomy of DDoS attack and DDoS defense mechanisms[J]. ACM SIGCOMM Computer Communication Review, 2004, 34(2): 39-53. |
| [15] | MANIKUMAR V V S, MAHESWARI B U. Blockchain based DDoS mitigation using machine learning techniques[C]// Proceedings of the 2nd International Conference on Inventive Research in Computing Applications. Piscataway: IEEE, 2020: 794-800. |
| [16] | HUSSEIN N A. Securing the networks against DDoS attacks using blockchain technology[C]// Proceedings of the 2023 International Conference on Innovative Computing and Communication, LNNS 703. Singapore: Springer, 2023: 13-22. |
| [17] | RAI A, CHALLA R K. Survey on recent DDoS mitigation techniques and comparative analysis[C]// Proceedings of the 2nd International Conference on Computational Intelligence and Communication Technology. Piscataway: IEEE, 2016: 96-101. |
| [18] | PAVLIDIS A, DIMOLIANIS M, GIOTIS K, et al. Orchestrating DDoS mitigation via blockchain-based network provider collaborations[J]. The Knowledge Engineering Review, 2020, 35: No.e16. |
| [19] | 赵婵,张瑞生.基于区块链技术的DDoS协同防御方法研究[J].现代信息科技,2020,4(5):152-154. |
| ZHAO C, ZHANG R S. Research on DDoS collaborative defense method based on blockchain[J]. Modern Information Technology, 2020,4(5):152-154. | |
| [20] | ABBAS Q E, SUNG-BONG J. A survey of blockchain and its applications[C]// Proceedings of the 2019 International Conference on Artificial Intelligence in Information and Communication. Piscataway: IEEE, 2019: 001-003. |
| [21] | LIN I C, LIAO T C. A survey of blockchain security issues and challenges[J]. International Journal of Network Security, 2017, 19(5): 653-659. |
| [22] | JIA B, LIANG Y. Anti-D chain: a lightweight DDoS attack detection scheme based on heterogeneous ensemble learning in blockchain[J]. China Communications, 2020, 17(9): 11-24. |
| [23] | SUNDARESWARAN N, SASIREKHA S. Packet filtering mechanism to defend against DDoS attack in blockchain network[C]// Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2021, LNDECT 116. Cham: Springer, 2022: 201-214. |
| [24] | ILYAS B, KUMAR A, SETITRA M A, et al. Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology[J]. Transactions on Emerging Telecommunications Technologies, 2023, 34(4): No.e4729. |
| [25] | 刘云,陈路遥,宋凯,等.基于合约熵判决算法的区块链网络DDoS防御优化[J].南京理工大学学报,2024,48(2):175-181. |
| LIU Y, CHEN L Y, SONG K, et al. Blockchain network DDoS defense optimization based on contract entropy judgment algorithm[J]. Journal of Nanjing University of Science and Technology, 2024, 48(2): 175-181. | |
| [26] | AL-FUQAHA A, GUIZANI M, MOHAMMADI M, et al. Internet of things: a survey on enabling technologies, protocols, and applications[J]. IEEE Communications Surveys and Tutorials, 2015, 17(4): 2347-2376. |
| [27] | VISHWAKARMA R, JAIN A K. A survey of DDoS attacking techniques and defence mechanisms in the IoT network[J]. Telecommunication Systems, 2020, 73(1): 3-25. |
| [28] | KPONYO J J, AGYEMANG J O, KLOGO G S, et al. Lightweight and host-based Denial of Service (DoS) detection and defense mechanism for resource-constrained IoT devices[J]. Internet of Things, 2020, 12: No.100319. |
| [29] | ALHIRABI N, RANA O, PERERA C. Security and privacy requirements for the internet of things: a survey[J]. ACM Transactions on Internet of Things, 2021, 2(1): No.6. |
| [30] | AL-SAKRAN H, ALHARBI Y, SERGUIEVSKAIA I. Framework architecture for securing IoT using blockchain, smart contract and software defined network technologies[C]// Proceedings of the 2nd International Conference on New Trends in Computing Sciences. Piscataway: IEEE, 2019: 1-6. |
| [31] | FENG H, YAN X, ZHOU N, et al. A cross-domain collaborative DDoS defense scheme based on blockchain-SDN in the IoT[C]// Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications. New York: ACM, 2021: 77-82. |
| [32] | FEBRO A, XIAO H, SPRING J, et al. Synchronizing DDoS defense at network edge with P4, SDN, and blockchain[J]. Computer Networks, 2022, 216: No.109267. |
| [33] | CHEN M, TANG X, CHENG J, et al. A DDoS attack defense method based on blockchain for IoTs devices[C]// Proceedings of the 6th International Conference on Artificial Intelligence and Security, CCIS 1253. Singapore: Springer, 2020: 685-694. |
| [34] | HUANG H, YE P, HU M, et al. A multi-point collaborative DDoS defense mechanism for IIoT environment[J]. Digital Communications and Networks, 2023, 9(2): 590-601. |
| [35] | HAYAT R F, AURANGZEB S, ALEEM M, et al. ML-DDoS: a blockchain-based multilevel DDoS mitigation mechanism for IoT environments[J]. IEEE Transactions on Engineering Management, 2024, 71: 12605-12618. |
| [36] | 岳猛,王怀远,吴志军,等.云计算中DDoS攻防技术研究综述[J].计算机学报,2020,43(12):2315-2336. |
| YUE M, WANG H Y, WU Z J, et al. A survey of DDoS attack and defense technologies in cloud computing[J]. Chinese Journal of Computers, 2020, 43(12): 2315-2336. | |
| [37] | GUL M J, REHMAN A, PAUL A, et al. Blockchain expansion to secure assets with fog node on special duty[J]. Soft Computing, 2020, 24(20): 15209-15221. |
| [38] | ZIANI A, MEDOURI A. A survey of security and privacy for 5G networks[C]// Emerging Trends in ICT for Sustainable Development: the Proceedings of NICE2020 International Conference, ASTI. Cham: Springer, 2021: 201-208. |
| [39] | CHOW M C, MA M. A secure blockchain-based authentication and key agreement scheme for 3GPP 5G networks[J]. Sensors, 2022, 22(12): No.4525. |
| [40] | 葛浩伟,杨启航,石乐义.基于深度学习和集成学习的DDoS攻击检测方法[J].现代电子技术,2024,47(3):63-67. |
| GE H W, YANG Q H, SHI L Y. DDoS attack detection method based on deep learning and ensemble learning[J]. Modern Electronic Technique, 2024, 47(3): 63-67. | |
| [41] | LIU T, SABRINA F, JANG-JACCARD J, et al. Artificial intelligence-enabled DDoS detection for blockchain-based smart transport systems[J]. Sensors, 2021, 22(1): No.32. |
| [42] | HE L, SUN T, ZHU Z. A remote access and control scheme for smart home based on blockchain[C]// Proceedings of the SPIE 12174, International Conference on Internet of Things and Machine Learning. Bellingham, WA: SPIE, 2022: No.121740A. |
| [43] | YEH L Y, LU P J, HUANG S H, et al. SOChain: a privacy-preserving DDoS data exchange service over SOC consortium blockchain[J]. IEEE Transactions on Engineering Management, 2020, 67(4): 1487-1500. |
| [44] | NA D, PARK S. IoT-chain and monitoring-chain using multilevel blockchain for IoT security[J]. Sensors, 2022, 22(21): No.8271. |
| [45] | DING X, GUO J, LI D, et al. An incentive mechanism for building a secure blockchain-based internet of things[J]. IEEE Transactions on Network Science and Engineering, 2021, 8(1): 477-487. |
| [46] | HAN T, JAN S R U, TAN Z, et al. A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers[J]. Concurrency and Computation: Practice and Experience, 2020, 32(16): No.e5300. |
| [47] | ABOU EL HOUDA Z, HAFID A, KHOUKHI L. Co-IoT: a collaborative DDoS mitigation scheme in IoT environment based on blockchain using SDN[C]// Proceedings of the 2019 IEEE Global Communications Conference. Piscataway: IEEE, 2019: 1-6. |
| [48] | ABOU EL HOUDA Z, HAFID A S, KHOUKHI L. Cochain-SC: an intra-and inter-domain DDoS mitigation scheme based on blockchain using SDN and smart contract[J]. IEEE Access, 2019, 7: 98893-98907. |
| [49] | HAJIZADEH M, AFRAZ N, RUFFINI M, et al. Collaborative cyber attack defense in SDN networks using blockchain technology[C]// Proceedings of the 6th IEEE Conference on Network Softwarization. Piscataway: IEEE, 2020: 487-492. |
| [50] | JIANG S, YANG L, GAO X, et al. BSD‑Guard: a collaborative blockchain-based approach for detection and mitigation of SDN‑targeted DDoS attacks[J]. Security and Communication Networks, 2022, 2022: No.1608689. |
| [51] | FENG H, LIU Y, YAN X, et al. A blockchain-enabled multi-domain DDoS collaborative defense mechanism[J]. KSII Transactions on Internet and Information Systems, 2023, 17(3): 916-937. |
| [52] | 张星星,何利文,段红秀.基于区块链与排队理论的DDoS防御机制研究[J].计算机技术与发展,2024,34(11):117-124. |
| ZHANG X X, HE L W, DUAN H X. Research on DDoS defense mechanism based on blockchain and queuing theory[J]. Computer Technology and Development, 2024, 34(11): 117-124. |
| [1] | 翟社平, 朱鹏举, 杨锐, 刘佳一腾. 基于区块链的物联网身份管理系统[J]. 《计算机应用》唯一官方网站, 2025, 45(9): 2873-2881. |
| [2] | 高威, 刘丽华, 和斌涛, 邓方安. 区块链共识机制与改进算法研究进展[J]. 《计算机应用》唯一官方网站, 2025, 45(9): 2848-2864. |
| [3] | 佘维, 马天祥, 冯海格, 田钊, 刘炜. 基于合约调用掩盖的区块链隐蔽通信方法[J]. 《计算机应用》唯一官方网站, 2025, 45(9): 2865-2872. |
| [4] | 王迪. 区块链边缘节点安全架构P-Dledger[J]. 《计算机应用》唯一官方网站, 2025, 45(8): 2630-2636. |
| [5] | 彭海洋, 计卫星, 刘法旺. 基于区块链的自动驾驶仿真测试数据存证模型[J]. 《计算机应用》唯一官方网站, 2025, 45(8): 2421-2427. |
| [6] | 张硕, 孙国凯, 庄园, 冯小雨, 王敬之. 面向区块链节点分析的eclipse攻击动态检测方法[J]. 《计算机应用》唯一官方网站, 2025, 45(8): 2428-2436. |
| [7] | 张立孝, 马垚, 杨玉丽, 于丹, 陈永乐. 基于命名实体识别的大规模物联网二进制组件识别[J]. 《计算机应用》唯一官方网站, 2025, 45(7): 2288-2295. |
| [8] | 陈宇轩, 郑海彬, 关振宇, 苏泊衡, 王玉珏, 郭振纬. 基于HoneyBadgerBFT和DAG的异步网络区块链分片机制[J]. 《计算机应用》唯一官方网站, 2025, 45(7): 2092-2100. |
| [9] | 赵小阳, 许新征, 李仲年. 物联网应用中的可解释人工智能研究综述[J]. 《计算机应用》唯一官方网站, 2025, 45(7): 2169-2179. |
| [10] | 王利娥, 林彩怡, 李永东, 傅星珵, 李先贤. 基于区块链的数字内容版权保护和公平追踪方案[J]. 《计算机应用》唯一官方网站, 2025, 45(6): 1756-1765. |
| [11] | 林陈威, 陈平. 云边协同工业控制系统跨域攻击评估[J]. 《计算机应用》唯一官方网站, 2025, 45(5): 1548-1555. |
| [12] | 林柄权, 刘磊, 李华峰, 刘晨. DoS攻击下基于APF和DDPG算法的无人机安全集群控制[J]. 《计算机应用》唯一官方网站, 2025, 45(4): 1241-1248. |
| [13] | 耿海军, 董赟, 胡治国, 池浩田, 杨静, 尹霞. 基于Attention-1DCNN-CE的加密流量分类方法[J]. 《计算机应用》唯一官方网站, 2025, 45(3): 872-882. |
| [14] | 邓淼磊, 阚雨培, 孙川川, 徐海航, 樊少珺, 周鑫. 基于深度学习的网络入侵检测系统综述[J]. 《计算机应用》唯一官方网站, 2025, 45(2): 453-466. |
| [15] | 王地欣, 王佳昊, 李敏, 陈浩, 胡光耀, 龚宇. 面向水声通信网络的异常攻击检测[J]. 《计算机应用》唯一官方网站, 2025, 45(2): 526-533. |
| 阅读次数 | ||||||
|
全文 |
|
|||||
|
摘要 |
|
|||||