Journal of Computer Applications ›› 2025, Vol. 45 ›› Issue (11): 3416-3423.DOI: 10.11772/j.issn.1001-9081.2024121850
• The 7th CCF China Conference on Blockchain Technology • Previous Articles
Mei TANG1,2,3, Wunan WAN1,3,4(
), Shibin ZHANG1,3,4, Jinquan ZHANG1,2,3
Received:2025-01-02
Revised:2025-02-11
Accepted:2025-02-17
Online:2025-02-26
Published:2025-11-10
Contact:
Wunan WAN
About author:TANG Mei, born in 2001, M. S. candidate. Her research interests include blockchain.Supported by:
唐梅1,2,3, 万武南1,3,4(
), 张仕斌1,3,4, 张金全1,2,3
通讯作者:
万武南
作者简介:唐梅(2001—),女,四川广安人,硕士研究生,CCF会员,主要研究方向:区块链基金资助:CLC Number:
Mei TANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG. Survey of DDoS protection research based on blockchain[J]. Journal of Computer Applications, 2025, 45(11): 3416-3423.
唐梅, 万武南, 张仕斌, 张金全. 基于区块链的DDoS防护研究综述[J]. 《计算机应用》唯一官方网站, 2025, 45(11): 3416-3423.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2024121850
| 分类 | 文献 | 优势 | 不足 |
|---|---|---|---|
协作防御、 资源共享 | [ | 提高响应速度和准确性,增强跨域协作与防御能力,优化资源共享与配置文件保护 | 在大规模网络中面临性能瓶颈,系统复杂,可能增加管理难度 |
隐私保护、 数据防篡改 | [ | 防止篡改、重放攻击,保障数据和通信的完整性与 机密性,部分方案计算成本低,性能提升显著 | 系统实现复杂,可能增加系统负担,复杂性较高 |
Tab. 1 Summary of research results on blockchain-based DDoS protection in IoT
| 分类 | 文献 | 优势 | 不足 |
|---|---|---|---|
协作防御、 资源共享 | [ | 提高响应速度和准确性,增强跨域协作与防御能力,优化资源共享与配置文件保护 | 在大规模网络中面临性能瓶颈,系统复杂,可能增加管理难度 |
隐私保护、 数据防篡改 | [ | 防止篡改、重放攻击,保障数据和通信的完整性与 机密性,部分方案计算成本低,性能提升显著 | 系统实现复杂,可能增加系统负担,复杂性较高 |
| [1] | Nexusguard. DDoS trend report 2024[EB/OL]. [2024-07-21]. . |
| [2] | ZHANG C, GREEN R. Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network[C]// Proceedings of the 18th Symposium on Communications and Networking. San Diego: Society for Modeling and Simulation International, 2015: 8-15. |
| [3] | 田国华,胡云瀚,陈晓峰.区块链系统攻击与防御技术研究进展[J].软件学报,2021,32(5):1495-1525 |
| TIAN G H, HU Y H, CHEN X F. Research progress on attack and defense techniques in block-chain system[J]. Journal of Software, 2021,32(5):1495-1525. | |
| [4] | KUMAR S, AMIN R. Mitigating distributed denial of service attack: blockchain and software‑defined networking based approach, network model with future research challenges[J]. Security and Privacy, 2021, 4(4): No.e163. |
| [5] | CHAGANTI R, BHUSHAN B, RAVI V. The role of blockchain in DDoS attacks mitigation: techniques, open challenges and future directions[EB/OL]. [2024-06-18].. |
| [6] | SHAH Z, ULLAH I, LI H, et al. Blockchain based solutions to mitigate distributed denial of service (DDoS) attacks in the Internet of Things (IoT): a survey[J]. Sensors, 2022, 22(3): No.1094. |
| [7] | KUMAR R, KUMAR P, TRIPATHI R, et al. A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network[J]. Journal of Parallel and Distributed Computing, 2022, 164: 55-68. |
| [8] | 蒋英肇,陈雷,闫巧.基于双通道特征融合的分布式拒绝服务攻击检测算法[J].信息网络安全,2023,23(7):86-97. |
| JIANG Y Z, CHEN L, YAN Q. Distributed denial of service attack detection algorithm based on two-channel feature fusion[J]. Netinfo Security, 2023, 23(7): 86-97. | |
| [9] | BANITALEBI DEHKORDI A, SOLTANAGHAEI M, BOROUJENI F Z. The DDoS attacks detection through machine learning and statistical methods in SDN[J]. The Journal of Supercomputing, 2021, 77(3): 2383-2415. |
| [10] | CHENG J, LI J, TANG X, et al. A novel DDoS attack detection method using optimized generalized multiple kernel learning[J].Computers, Materials and Continua, 2020, 62(3): 1423-1443. |
| [11] | ZARGAR S T, JOSHI J, TIPPER D. A survey of defense mechanisms against Distributed Denial of Service (DDoS) flooding attacks[J]. IEEE Communications Surveys and Tutorials, 2013, 15(4): 2046-2069. |
| [12] | 严芬,王佳佳,赵金凤,等.DDoS攻击检测综述[J].计算机应用研究,2008,25(4):966-969. |
| YAN F, WANG J J, ZHAO J F, et al. Survey of detection on DDoS attack[J]. Application Research of Computers, 2008, 25(4): 966-969. | |
| [13] | GREENSPAN G. Ending the bitcoin vs blockchain debate [EB/OL]. [2024-07-25]. . |
| [14] | MIRKOVIC J, REIHER P. A taxonomy of DDoS attack and DDoS defense mechanisms[J]. ACM SIGCOMM Computer Communication Review, 2004, 34(2): 39-53. |
| [15] | MANIKUMAR V V S, MAHESWARI B U. Blockchain based DDoS mitigation using machine learning techniques[C]// Proceedings of the 2nd International Conference on Inventive Research in Computing Applications. Piscataway: IEEE, 2020: 794-800. |
| [16] | HUSSEIN N A. Securing the networks against DDoS attacks using blockchain technology[C]// Proceedings of the 2023 International Conference on Innovative Computing and Communication, LNNS 703. Singapore: Springer, 2023: 13-22. |
| [17] | RAI A, CHALLA R K. Survey on recent DDoS mitigation techniques and comparative analysis[C]// Proceedings of the 2nd International Conference on Computational Intelligence and Communication Technology. Piscataway: IEEE, 2016: 96-101. |
| [18] | PAVLIDIS A, DIMOLIANIS M, GIOTIS K, et al. Orchestrating DDoS mitigation via blockchain-based network provider collaborations[J]. The Knowledge Engineering Review, 2020, 35: No.e16. |
| [19] | 赵婵,张瑞生.基于区块链技术的DDoS协同防御方法研究[J].现代信息科技,2020,4(5):152-154. |
| ZHAO C, ZHANG R S. Research on DDoS collaborative defense method based on blockchain[J]. Modern Information Technology, 2020,4(5):152-154. | |
| [20] | ABBAS Q E, SUNG-BONG J. A survey of blockchain and its applications[C]// Proceedings of the 2019 International Conference on Artificial Intelligence in Information and Communication. Piscataway: IEEE, 2019: 001-003. |
| [21] | LIN I C, LIAO T C. A survey of blockchain security issues and challenges[J]. International Journal of Network Security, 2017, 19(5): 653-659. |
| [22] | JIA B, LIANG Y. Anti-D chain: a lightweight DDoS attack detection scheme based on heterogeneous ensemble learning in blockchain[J]. China Communications, 2020, 17(9): 11-24. |
| [23] | SUNDARESWARAN N, SASIREKHA S. Packet filtering mechanism to defend against DDoS attack in blockchain network[C]// Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2021, LNDECT 116. Cham: Springer, 2022: 201-214. |
| [24] | ILYAS B, KUMAR A, SETITRA M A, et al. Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology[J]. Transactions on Emerging Telecommunications Technologies, 2023, 34(4): No.e4729. |
| [25] | 刘云,陈路遥,宋凯,等.基于合约熵判决算法的区块链网络DDoS防御优化[J].南京理工大学学报,2024,48(2):175-181. |
| LIU Y, CHEN L Y, SONG K, et al. Blockchain network DDoS defense optimization based on contract entropy judgment algorithm[J]. Journal of Nanjing University of Science and Technology, 2024, 48(2): 175-181. | |
| [26] | AL-FUQAHA A, GUIZANI M, MOHAMMADI M, et al. Internet of things: a survey on enabling technologies, protocols, and applications[J]. IEEE Communications Surveys and Tutorials, 2015, 17(4): 2347-2376. |
| [27] | VISHWAKARMA R, JAIN A K. A survey of DDoS attacking techniques and defence mechanisms in the IoT network[J]. Telecommunication Systems, 2020, 73(1): 3-25. |
| [28] | KPONYO J J, AGYEMANG J O, KLOGO G S, et al. Lightweight and host-based Denial of Service (DoS) detection and defense mechanism for resource-constrained IoT devices[J]. Internet of Things, 2020, 12: No.100319. |
| [29] | ALHIRABI N, RANA O, PERERA C. Security and privacy requirements for the internet of things: a survey[J]. ACM Transactions on Internet of Things, 2021, 2(1): No.6. |
| [30] | AL-SAKRAN H, ALHARBI Y, SERGUIEVSKAIA I. Framework architecture for securing IoT using blockchain, smart contract and software defined network technologies[C]// Proceedings of the 2nd International Conference on New Trends in Computing Sciences. Piscataway: IEEE, 2019: 1-6. |
| [31] | FENG H, YAN X, ZHOU N, et al. A cross-domain collaborative DDoS defense scheme based on blockchain-SDN in the IoT[C]// Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications. New York: ACM, 2021: 77-82. |
| [32] | FEBRO A, XIAO H, SPRING J, et al. Synchronizing DDoS defense at network edge with P4, SDN, and blockchain[J]. Computer Networks, 2022, 216: No.109267. |
| [33] | CHEN M, TANG X, CHENG J, et al. A DDoS attack defense method based on blockchain for IoTs devices[C]// Proceedings of the 6th International Conference on Artificial Intelligence and Security, CCIS 1253. Singapore: Springer, 2020: 685-694. |
| [34] | HUANG H, YE P, HU M, et al. A multi-point collaborative DDoS defense mechanism for IIoT environment[J]. Digital Communications and Networks, 2023, 9(2): 590-601. |
| [35] | HAYAT R F, AURANGZEB S, ALEEM M, et al. ML-DDoS: a blockchain-based multilevel DDoS mitigation mechanism for IoT environments[J]. IEEE Transactions on Engineering Management, 2024, 71: 12605-12618. |
| [36] | 岳猛,王怀远,吴志军,等.云计算中DDoS攻防技术研究综述[J].计算机学报,2020,43(12):2315-2336. |
| YUE M, WANG H Y, WU Z J, et al. A survey of DDoS attack and defense technologies in cloud computing[J]. Chinese Journal of Computers, 2020, 43(12): 2315-2336. | |
| [37] | GUL M J, REHMAN A, PAUL A, et al. Blockchain expansion to secure assets with fog node on special duty[J]. Soft Computing, 2020, 24(20): 15209-15221. |
| [38] | ZIANI A, MEDOURI A. A survey of security and privacy for 5G networks[C]// Emerging Trends in ICT for Sustainable Development: the Proceedings of NICE2020 International Conference, ASTI. Cham: Springer, 2021: 201-208. |
| [39] | CHOW M C, MA M. A secure blockchain-based authentication and key agreement scheme for 3GPP 5G networks[J]. Sensors, 2022, 22(12): No.4525. |
| [40] | 葛浩伟,杨启航,石乐义.基于深度学习和集成学习的DDoS攻击检测方法[J].现代电子技术,2024,47(3):63-67. |
| GE H W, YANG Q H, SHI L Y. DDoS attack detection method based on deep learning and ensemble learning[J]. Modern Electronic Technique, 2024, 47(3): 63-67. | |
| [41] | LIU T, SABRINA F, JANG-JACCARD J, et al. Artificial intelligence-enabled DDoS detection for blockchain-based smart transport systems[J]. Sensors, 2021, 22(1): No.32. |
| [42] | HE L, SUN T, ZHU Z. A remote access and control scheme for smart home based on blockchain[C]// Proceedings of the SPIE 12174, International Conference on Internet of Things and Machine Learning. Bellingham, WA: SPIE, 2022: No.121740A. |
| [43] | YEH L Y, LU P J, HUANG S H, et al. SOChain: a privacy-preserving DDoS data exchange service over SOC consortium blockchain[J]. IEEE Transactions on Engineering Management, 2020, 67(4): 1487-1500. |
| [44] | NA D, PARK S. IoT-chain and monitoring-chain using multilevel blockchain for IoT security[J]. Sensors, 2022, 22(21): No.8271. |
| [45] | DING X, GUO J, LI D, et al. An incentive mechanism for building a secure blockchain-based internet of things[J]. IEEE Transactions on Network Science and Engineering, 2021, 8(1): 477-487. |
| [46] | HAN T, JAN S R U, TAN Z, et al. A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers[J]. Concurrency and Computation: Practice and Experience, 2020, 32(16): No.e5300. |
| [47] | ABOU EL HOUDA Z, HAFID A, KHOUKHI L. Co-IoT: a collaborative DDoS mitigation scheme in IoT environment based on blockchain using SDN[C]// Proceedings of the 2019 IEEE Global Communications Conference. Piscataway: IEEE, 2019: 1-6. |
| [48] | ABOU EL HOUDA Z, HAFID A S, KHOUKHI L. Cochain-SC: an intra-and inter-domain DDoS mitigation scheme based on blockchain using SDN and smart contract[J]. IEEE Access, 2019, 7: 98893-98907. |
| [49] | HAJIZADEH M, AFRAZ N, RUFFINI M, et al. Collaborative cyber attack defense in SDN networks using blockchain technology[C]// Proceedings of the 6th IEEE Conference on Network Softwarization. Piscataway: IEEE, 2020: 487-492. |
| [50] | JIANG S, YANG L, GAO X, et al. BSD‑Guard: a collaborative blockchain-based approach for detection and mitigation of SDN‑targeted DDoS attacks[J]. Security and Communication Networks, 2022, 2022: No.1608689. |
| [51] | FENG H, LIU Y, YAN X, et al. A blockchain-enabled multi-domain DDoS collaborative defense mechanism[J]. KSII Transactions on Internet and Information Systems, 2023, 17(3): 916-937. |
| [52] | 张星星,何利文,段红秀.基于区块链与排队理论的DDoS防御机制研究[J].计算机技术与发展,2024,34(11):117-124. |
| ZHANG X X, HE L W, DUAN H X. Research on DDoS defense mechanism based on blockchain and queuing theory[J]. Computer Technology and Development, 2024, 34(11): 117-124. |
| [1] | Sheping ZHAI, Pengju ZHU, Rui YANG, Jiayiteng LIU. Blockchain-based identity management system for internet of things [J]. Journal of Computer Applications, 2025, 45(9): 2873-2881. |
| [2] | Wei GAO, Lihua LIU, Bintao HE, Fang’an DENG. Research advances in blockchain consensus mechanisms and improvement algorithms [J]. Journal of Computer Applications, 2025, 45(9): 2848-2864. |
| [3] | Wei SHE, Tianxiang MA, Haige FENG, Zhao TIAN, Wei LIU. Blockchain covert communication method based on contract call concealment [J]. Journal of Computer Applications, 2025, 45(9): 2865-2872. |
| [4] | Di WANG. P-Dledger: blockchain edge node security architecture [J]. Journal of Computer Applications, 2025, 45(8): 2630-2636. |
| [5] | Haiyang PENG, Weixing JI, Fawang LIU. Blockchain-based data notarization model for autonomous driving simulation testing [J]. Journal of Computer Applications, 2025, 45(8): 2421-2427. |
| [6] | Shuo ZHANG, Guokai SUN, Yuan ZHUANG, Xiaoyu FENG, Jingzhi WANG. Dynamic detection method of eclipse attacks for blockchain node analysis [J]. Journal of Computer Applications, 2025, 45(8): 2428-2436. |
| [7] | Lixiao ZHANG, Yao MA, Yuli YANG, Dan YU, Yongle CHEN. Large-scale IoT binary component identification based on named entity recognition [J]. Journal of Computer Applications, 2025, 45(7): 2288-2295. |
| [8] | Yuxuan CHEN, Haibin ZHENG, Zhenyu GUAN, Boheng SU, Yujue WANG, Zhenwei GUO. Blockchain sharding mechanism in asynchronous network based on HoneyBadgerBFT and DAG [J]. Journal of Computer Applications, 2025, 45(7): 2092-2100. |
| [9] | Xiaoyang ZHAO, Xinzheng XU, Zhongnian LI. Research review on explainable artificial intelligence in internet of things applications [J]. Journal of Computer Applications, 2025, 45(7): 2169-2179. |
| [10] | Li’e WANG, Caiyi LIN, Yongdong LI, Xingcheng FU, Xianxian LI. Digital content copyright protection and fair tracking scheme based on blockchain [J]. Journal of Computer Applications, 2025, 45(6): 1756-1765. |
| [11] | Xin SHAO, Zigang CHEN, Xingchun YANG, Haihua ZHU, Wenjun LUO, Long CHEN, Yousheng ZHOU. Vehicular digital evidence preservation and access control based on consortium blockchain [J]. Journal of Computer Applications, 2025, 45(6): 1902-1910. |
| [12] | Gaimei GAO, Miaolian DU, Chunxia LIU, Yuli YANG, Weichao DANG, Guoxia DI. Privacy protection method for consortium blockchain based on SM2 linkable ring signature [J]. Journal of Computer Applications, 2025, 45(5): 1564-1572. |
| [13] | Chenwei LIN, Ping CHEN. Evaluation of cross-domain attacks in cloud-edge collaborative industrial control systems [J]. Journal of Computer Applications, 2025, 45(5): 1548-1555. |
| [14] | Bingquan LIN, Lei LIU, Huafeng LI, Chen LIU. Secure cluster control of UAVs under DoS attacks based on APF and DDPG algorithm [J]. Journal of Computer Applications, 2025, 45(4): 1241-1248. |
| [15] | Haijun GENG, Yun DONG, Zhiguo HU, Haotian CHI, Jing YANG, Xia YIN. Encrypted traffic classification method based on Attention-1DCNN-CE [J]. Journal of Computer Applications, 2025, 45(3): 872-882. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||