EconPapers    
Economics at your fingertips  
 

Design and implementation of controlling with preventing DDOS attacks using bitcoin by Ethereum block chain technology

R. Akilandeswari () and S. Malathi ()
Additional contact information
R. Akilandeswari: A.VeeriyaVandayar Memorial Sri Pushpam College(Autonomous) (Affiliated to Bharathidasan University)
S. Malathi: Swami Dayananda College of Arts and Science, Manjakkudi, Tiruvarur(dt) (Affiliated to Bharathidasan University)

Journal of Transportation Security, 2022, vol. 15, issue 3, No 9, 297 pages

Abstract: Abstract In order to avoid needless spread in such a transmission system, all nodes in the block chain search ‘memory pool.’ There is no limit to the rate of output of transactions in the current blockchain. Since there is no limit to the transaction rate, the DDoS attacker can easily target blockchain by making a transaction. This DDoS attack was called ‘Overflood Attack.’ In this paper, to avoid ‘Overflood Attack,’ we propose a method to dynamically limit the maximum amount of the transaction to be created using the Least Mean Square. Blockchain is a p2p-based trusting technology that allows nodes participating in the p2p network to easily exchange data without a central management system. Since all nodes in the blockchain network share the same data at the same stage, confidentiality of shared data can be assured. Bitcoin and Ethereum are electronic money exchange platforms based on blockchain technology which make blockchain technology more popular. As a result, this technology has been used in a variety of fields concerning data confidence and honesty, rather than being used strictly for electronic money transactions. All the nodes in the block-chain network share the same info. To share the same data, Blockchain uses the p2p mechanism called ‘flooding’ as the data transfer process, where the data is represented as a transaction and a block. ‘Flooding’ means that the node that generated the data transmits the data to the directly connected node, does not transmit the data to all the nodes on entire network, and transmitted nodes return to connected nodes. Both blockchain nodes use ‘Data Validation’ and ‘Memory pool management’ to avoid undesired transmission rather than simply re-transmitting transactions and blocks. ‘Data Validation’ is the right transaction and block that is being transmitted.

Keywords: Blockchain; Overflood; Bitcoin; Ethereum; p2p; Data validation (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s12198-022-00245-x Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:jtrsec:v:15:y:2022:i:3:d:10.1007_s12198-022-00245-x

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/12198

DOI: 10.1007/s12198-022-00245-x

Access Statistics for this article

Journal of Transportation Security is currently edited by Andrew Thomas

More articles in Journal of Transportation Security from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:jtrsec:v:15:y:2022:i:3:d:10.1007_s12198-022-00245-x