《计算机应用》唯一官方网站 ›› 2025, Vol. 45 ›› Issue (11): 3416-3423.DOI: 10.11772/j.issn.1001-9081.2024121850

• 第七届CCF中国区块链技术大会 • 上一篇    

基于区块链的DDoS防护研究综述

唐梅1,2,3, 万武南1,3,4(), 张仕斌1,3,4, 张金全1,2,3   

  1. 1.先进密码技术与系统安全四川省重点实验室(成都信息工程大学),成都 610054
    2.成都信息工程大学 网络空间安全学院,成都 610225
    3.成都信息工程大学 双流产业学院,成都 610203
    4.成都信息工程大学 人工智能学院,成都 610225
  • 收稿日期:2025-01-02 修回日期:2025-02-11 接受日期:2025-02-17 发布日期:2025-02-26 出版日期:2025-11-10
  • 通讯作者: 万武南
  • 作者简介:唐梅(2001—),女,四川广安人,硕士研究生,CCF会员,主要研究方向:区块链
    张仕斌(1970—),男,重庆人,教授,博士,CCF高级会员,主要研究方向:量子技术、人工智能安全、区块链安全
    张金全(1974—),男,四川邻水人,副教授,博士,主要研究方向:密码学、区块链安全。
  • 基金资助:
    国家重点研发计划项目(2022YFB3103103);四川省科技教育联合基金面上项目(2025NSFSC2077);成都市重点研发项目(2023-XT00-00002-GX);成都市重点研发支撑计划项目(2024-YF05-01227-SN)

Survey of DDoS protection research based on blockchain

Mei TANG1,2,3, Wunan WAN1,3,4(), Shibin ZHANG1,3,4, Jinquan ZHANG1,2,3   

  1. 1.Advanced Cryptography and System Security Key Laboratory of Sichuan Province (Chengdu University of Information Technology),Chengdu Sichuan 610054,China
    2.School of Cybersecurity,Chengdu University of Information Technology,Chengdu Sichuan 610225,China
    3.Shuangliu Industrial College,Chengdu University of Information Technology,Chengdu Sichuan 610203,China
    4.College of Artificial Intelligence,Chengdu University of Information Technology,Chengdu Sichuan 610225,China
  • Received:2025-01-02 Revised:2025-02-11 Accepted:2025-02-17 Online:2025-02-26 Published:2025-11-10
  • Contact: Wunan WAN
  • About author:TANG Mei, born in 2001, M. S. candidate. Her research interests include blockchain.
    ZHANG Shibin, born in 1970, Ph. D., professor. His research interests include quantum technology, artificial intelligence security, blockchain security.
    ZHANG Jinquan, born in 1974, Ph. D., associate professor. His research interests include cryptology, blockchain security.
  • Supported by:
    National Key Research and Development Program of China(2022YFB3103103);General Program of Joint Fund for Science and Technology Education in Sichuan Province(2025NSFSC2077);Key Research and Development Project of Chengdu(2023-XT00-00002-GX);Key Research and Development Support Program Project of Chengdu(2024-YF05-01227-SN)

摘要:

随着网络安全威胁的日益加剧,分布式拒绝服务(DDoS)攻击一直是网络安全领域的研究难题。传统的DDoS防护方案通常依赖中心化架构,存在单点故障、数据篡改等问题,难以应对复杂多样的攻击场景。区块链技术凭借去中心化、不可篡改和透明性等特性,为DDoS防护提供了新的解决思路。针对DDoS防护中的技术挑战,总结了基于区块链的DDoS防护研究进展。首先,介绍DDoS攻击的基本概念及其对传统网络、物联网(IoT)和软件定义网络(SDN)等环境的威胁,分析引入区块链技术的必要性与潜在优势;其次,从区块链结合智能合约、深度学习、跨域协作等方面,归纳并对比现有的DDoS防护机制;最后,结合区块链性能优化、多域协作以及实时响应等方面的技术难点,展望未来基于区块链的DDoS防护技术的发展方向,从而为网络安全领域的研究者提供理论参考,进一步推动区块链在DDoS防护中的实际应用。

关键词: 分布式拒绝服务攻击, 区块链, 物联网, 软件定义网络, 网络安全

Abstract:

With the escalating severity of cybersecurity threats, Distributed Denial of Service (DDoS) attacks remain a persistent challenge in network security research. Traditional DDoS protection solutions usually rely on centralized architectures, which suffer from single point of failure, data tampering and other problems, and are difficult to deal with complex and diverse attack scenarios. Blockchain technology provides a new solution for DDoS protection with its characteristics of decentralization, immutability and transparency. In view of the technical challenges in DDoS protection, the progress of blockchain-based DDoS protection was summarized. Firstly, the basic concepts of DDoS attacks and their threats to environments such as traditional networks, Internet of Things (IoT) and Software Defined Networking (SDN) were introduced, and the necessity and potential advantages of introducing blockchain technology were analyzed. Secondly, from the aspects of blockchain combined with smart contracts, deep learning, cross-domain collaboration, and so on, the existing DDoS protection mechanisms were reviewed and compared. Finally, considering the technical difficulties in blockchain performance optimization, multi-domain collaboration, and real-time response, the future development directions of blockchain-based DDoS protection technology were prospected, providing theoretical references for researchers in the field of cybersecurity and further promoting the practical applications of blockchain in DDoS protection.

Key words: Distributed Denial of Service (DDoS) attack, blockchain, Internet of Things (IoT), Software Defined Networking (SDN), cybersecurity

中图分类号: