Skip to main content

Collaborative Blockchain Based Distributed Denial of Service Attack Mitigation Approach with IP Reputation System

  • Conference paper
  • First Online:
Database Systems for Advanced Applications. DASFAA 2022 International Workshops (DASFAA 2022)

Abstract

Due to the high accessibility of the internet and unsecured internet-connected devices, Distributed Denial of Service attacks (DDoS) become devastating among all cyber-attacks. Attack complexity and sophistication have been increasing day by day. Many mitigation techniques and methods are available through which the risk of DDoS attacks will be reduced at a significant level. It is ideal to implement distributed solutions to mitigate DDoS attacks because of distributed nature of DDoS attacks. Many collaborators who share the same interest, participate in DDoS attack mitigation in a collaborative DDoS mitigation approach. But, creating a collaboration in a transparent, secured, and distributed way is still a challenge. Blockchain technology presents the ideology of decentralized, distributed, secured, and immutable ledger. Blockchain is an emerging technology to mitigate many cyber threats because of its fundamental characteristics like decentralization, immutability, authenticity, trust management, and integrity. In DDoS attacks mitigation, Blockchain technology is utilized in many different ways but, still in the initial phase. Due to all these characteristics of Blockchain, Blockchain become the ideal choice to create collaboration among peers. As well as it would be also useful to signalize the attack among various collaborators. Accuracy of shared IP addresses is equally important in the mitigation of DDoS Attacks and Botnet identification. IP Reputation systems are generally designed to get accurate information about IP addresses. In this paper, we present how blockchain is used collaboratively to mitigate DDoS attacks in various domains. This paper aim at providing a brief overview of DDoS mitigation strategies, the architecture of the proposed DDoS mitigation solution. This paper also discusses the integration of IP reputation scheme for Blacklisted IP addresses with Blockchain to build transparency and accuracy of data. Accurate IP addresses data would be helpful in not only DDoS Attack Mitigation but, in many attacks related to IP Addresses, identification of the Bots, Intrusion prevention system (IPS), and Intrusion detection system (IDS).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ahamed, J.N., Iyengar, N.: A review on Distributed Denial of Service (DDoS) mitigation techniques in cloud computing environment. IJSIA 10, 277–294 (2016) https://doi.org/10.14257/ijsia.2016.10.8.24

    Article  Google Scholar 

  2. Aujla, G.S., Singh, M., Bose, A., Kumar, N., Han, G., Buyya, R.: BlockSDN: blockchain-as-a-service for software defined networking in smart city applications. IEEE Network 34, 83–91 (2020). https://doi.org/10.1109/MNET.001.1900151

    Article  Google Scholar 

  3. Benet, J.: IPFS - Content Addressed, Versioned, P2P File System. arXiv:1407.3561 [cs]. (2014)

  4. Bodkhe, U., et al.: Blockchain for industry 4.0: a comprehensive review. IEEE Access. 8, 79764–79800 (2020). https://doi.org/10.1109/ACCESS.2020.2988579

    Article  Google Scholar 

  5. DDoS Mitigation Fundamentals. https://www.first.org/education/trainings. Accessed 26 Jun 2021

  6. DDoS mitigation (2021). https://en.wikipedia.org/w/index.php?title=DDoS_mitigation&oldid=1023844160

  7. draft-nishizuka-dots-inter-domain-mechanism-02 - Inter-organization cooperative DDoS protection mechanism. https://datatracker.ietf.org/doc/draft-nishizuka-dots-inter-domain-mechanism/. Accessed 22 Jul 2021

  8. El Houda, Z.A., Hafid, A., Khoukhi, L.: Co-IoT: A collaborative DDoS mitigation scheme in IoT environment based on blockchain Using SDN. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6 (2019). https://doi.org/10.1109/GLOBECOM38437.2019.9013542

  9. Houda, Z.A.E., Hafid, A.S., Khoukhi, L.: Cochain-SC: an intra- and inter-domain DDoS mitigation scheme based on blockchain using SDN and smart contract. IEEE Access. 7, 98893–98907 (2019). https://doi.org/10.1109/ACCESS.2019.2930715

    Article  Google Scholar 

  10. Mahjabin, T., Xiao, Y., Sun, G., Jiang, W.: A survey of distributed denial-of-service attack, prevention, and mitigation techniques. Int. J. Distrib. Sens. Netw. 13, 1550147717741463 (2017). https://doi.org/10.1177/1550147717741463

    Article  Google Scholar 

  11. Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton (2016)

    MATH  Google Scholar 

  12. polygon.technology: Polygon-Ethereum’s Internet of Blockchains. https://polygon.technology/lightpaper-polygon.pdf. Accessed 25 Jan 2022

  13. Real-time Inter-network Defense (RID). https://datatracker.ietf.org/doc/html/rfc6545, Accessed 23 Jun 2021

  14. Riccardi, M., Oro, D., Luna, J., Cremonini, M., Vilanova, M.: A framework for financial botnet analysis. In: 2010 eCrime Researchers Summit, pp. 1–7. IEEE, Dallas (2010). https://doi.org/10.1109/ecrime.2010.5706697

  15. Rodrigues, B., Scheid, E., Killer, C., Franco, M., Stiller, B.: Blockchain Signaling System (BloSS): cooperative signaling of distributed denial-of-service attacks. J. Netw. Syst. Manage. 28(4), 953–989 (2020). https://doi.org/10.1007/s10922-020-09559-4

    Article  Google Scholar 

  16. Shewale, S., Deshpande, L.: Analytical Study on IP Reputation Services & Automation for Traditional Method. IJARCCE. 10, 4 (2021)

    Google Scholar 

  17. Spathoulas, G., Giachoudis, N., Damiris, G.-P., Theodoridis, G.: Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets. Future Internet. 11, 226 (2019). https://doi.org/10.3390/fi11110226

    Article  Google Scholar 

  18. Steinberger, J.: Distributed DDoS Defense (2018). https://doi.org/10.3990/1.9789036545815

  19. Hameed, S.: SDN based collaborative scheme for mitigation of DDoS Attacks. Future Internet. 10, 23 (2018). https://doi.org/10.3390/fi10030023

    Article  Google Scholar 

  20. Usman, N., et al.: Intelligent dynamic malware detection using machine learning in IP reputation for forensics data analytics. Futur. Gener. Comput. Syst. 118, 124–141 (2021). https://doi.org/10.1016/j.future.2021.01.004

    Article  Google Scholar 

  21. Yeh, L.-Y., Lu, P.J., Huang, S.-H., Huang, J.-L.: SOChain: a privacy-preserving DDoS data exchange service over SOC consortium blockchain. IEEE Trans. Eng. Manage. 67, 1487–1500 (2020). https://doi.org/10.1109/TEM.2020.2976113

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Darshi Patel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patel, D., Patel, D. (2022). Collaborative Blockchain Based Distributed Denial of Service Attack Mitigation Approach with IP Reputation System. In: Rage, U.K., Goyal, V., Reddy, P.K. (eds) Database Systems for Advanced Applications. DASFAA 2022 International Workshops. DASFAA 2022. Lecture Notes in Computer Science, vol 13248. Springer, Cham. https://doi.org/10.1007/978-3-031-11217-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-11217-1_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-11216-4

  • Online ISBN: 978-3-031-11217-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics