Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Designing of Blockchain-Based Cyber Security for the Protection of Distributed Denial of Service (DDoS) Attacks on Client-Server Networks

View through CrossRef
Abstract The complexity and difficulty of the ongoing and unstoppable cybercrimes in the traditional or conventional Artificial Intelligence (AI) system create the worst problems for the recent day’s modern cyberspace. The traditional systems are always dependent on centralized systems, which have insufficient performance to prevent and reveal DDoS attacks and modern cybersecurity challenges. The traditional systems of artificial intelligence (AI), machine learning (ML), and Deep Learning (DL) are limited only to the task of detecting DDoS attacks; they are not able to protect the client-server network cyberspace from DDoS attacks. Centralized-based property of the traditional systems produces a particular failure that makes them more attractive victims in cyberspace by DDoS attack criminals. The difficulty of deploying Artificial Intelligence (AI) cybersecurity techniques often results in poor DDoS attack protection performance, leaving organizations vulnerable and susceptible to DDoS attacks. The principal and major goal of the study is to formulate a strong Blockchain Technology-based Cyber Security emerging technology-oriented technique, particularly designing and modeling for protecting client-server network cyberspace from DDoS-based cyber-attacks. We have a few numbers of system methodologies like data collection (i.e, related literature review, dataset selection and collection, and experimental data collection), selection of performance evaluation parameters, validation process, experimental equations of performance evaluation metrics, and selection and collection of hardware and software resources. Different models are trained and tested on the CIC-DDoS2019 dataset; we have seen that there are different values of performance evaluation metrics for different models. The CNN model showed the value of 98.5% and 99.5% DDoS attack detection accuracy and prevention capability, respectively.
Title: Designing of Blockchain-Based Cyber Security for the Protection of Distributed Denial of Service (DDoS) Attacks on Client-Server Networks
Description:
Abstract The complexity and difficulty of the ongoing and unstoppable cybercrimes in the traditional or conventional Artificial Intelligence (AI) system create the worst problems for the recent day’s modern cyberspace.
The traditional systems are always dependent on centralized systems, which have insufficient performance to prevent and reveal DDoS attacks and modern cybersecurity challenges.
The traditional systems of artificial intelligence (AI), machine learning (ML), and Deep Learning (DL) are limited only to the task of detecting DDoS attacks; they are not able to protect the client-server network cyberspace from DDoS attacks.
Centralized-based property of the traditional systems produces a particular failure that makes them more attractive victims in cyberspace by DDoS attack criminals.
The difficulty of deploying Artificial Intelligence (AI) cybersecurity techniques often results in poor DDoS attack protection performance, leaving organizations vulnerable and susceptible to DDoS attacks.
The principal and major goal of the study is to formulate a strong Blockchain Technology-based Cyber Security emerging technology-oriented technique, particularly designing and modeling for protecting client-server network cyberspace from DDoS-based cyber-attacks.
We have a few numbers of system methodologies like data collection (i.
e, related literature review, dataset selection and collection, and experimental data collection), selection of performance evaluation parameters, validation process, experimental equations of performance evaluation metrics, and selection and collection of hardware and software resources.
Different models are trained and tested on the CIC-DDoS2019 dataset; we have seen that there are different values of performance evaluation metrics for different models.
The CNN model showed the value of 98.
5% and 99.
5% DDoS attack detection accuracy and prevention capability, respectively.

Related Results

Mitigating DDoS Attacks in Cloud Networks
Mitigating DDoS Attacks in Cloud Networks
Distributed Denial of Service (DDoS) attacks represent a significant and growing threat to cloud networks, capable of causing extensive service disruptions and substantial financia...
Timely Detection of DDoS Attacks with Dimenstionality Reduction
Timely Detection of DDoS Attacks with Dimenstionality Reduction
Due to the interconnectedness and exponential proliferation of IoT devices, the technology is more susceptible to network attacks like Distributed Denial of Service (DDoS), which d...
Detection & Mitigation of DDOS Attack
Detection & Mitigation of DDOS Attack
Abstract The DDoS (Distributed Denial of Service) attack is a type of Cyberattack in which multiple attackers aim to attack different network resources like a server or a w...
A Framework for Detecting Distributed Denial of Services Attack in Cloud Enviorment using Machine Learning Techniques
A Framework for Detecting Distributed Denial of Services Attack in Cloud Enviorment using Machine Learning Techniques
Distributed Denial of Service (DDoS) persists in Online Applications as One of those significant threats. Attackers can execute DDoS by the more natural steps. Then with the high p...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS
MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS
Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease o...
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Abstract Cyber-Manufacturing Systems (CMS) are vulnerable to cyber-manufacturing attacks ironically because of its very beneficial advance: seamless integration with...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...

Back to Top