Font Size: a A A

Research And Implementation Of Anti-DDoS Attack Methods For Internet Of Things Devices Based On Blockchain

Posted on:2022-06-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2518306323460344Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years,the rapid development of technologies such as the Internet of Things,artificial intelligence,and blockchain has made people's quality of life more superior,and people's demand for Internet of Things devices(smart bracelets,smart speakers,mobile phones,etc.)has continued to increase.However,when a large number of Io T devices are manufactured,most of them have security problems such as lack of firewall software and weak key passwords.Attackers can use these Io T devices with potential security risks to launch a Distributed Denial of Service(DDoS)attack on other Io T devices in the Internet of Things,causing the victim's system resources or network resources to be consumed,which may be serious.Can lead to the collapse of the entire Io T ecosystem.At present,most of the existing DDoS attack mitigation schemes are based on Software Defined Networking(SDN),but SDN itself has the risk of being targeted by DDoS attacks.As a completely distributed technology,blockchain can effectively avoid DDoS attacks.For this reason,this thesis studies the anti-DDoS attack methods of Io T devices based on blockchain.The main work and contributions of this thesis are as follows:(1)Research on DDoS attack mitigation schemes based on blockchain.The paper propose a blockchain-based collaborative defense scheme against DDoS attacks and built a blockchain-based collaborative defense architecture against DDoS attacks in a self-constructed blockchain network.The architecture includes a DDoS anomaly information detection module,a DDoS anomaly information sharing module,and a DDoS anomaly device filtering module.Through the unified collaboration of various modules,the collaborative defense scheme against DDoS attacks in the Internet of Things system can be realized.(2)Research on DDoS attack detection methods based on blockchain.First,analyze the current existing DDoS attack detection technology.Then,study the network traffic preprocessing method.Then,conduct the research on the DDoS attack detection model in the self-built blockchain-based collaborative defense architecture against DDoS attacks(KNN model,Decision tree model and random forest model,etc.).Finally,the DDoS attack detection model based on random forest is applied to the blockchain-based collaborative defense architecture against DDoS attacks.(3)Research on DDoS abnormal information sharing method based on blockchain.Research on the current existing information sharing model and blockchain consensus mechanism and propose a secure information sharing model(S-Chain double-chain information sharing model),which can not only share the summary information of abnormal DDoS traffic information when the network is busy It provides a basis for filtering DDoS attack initiation equipment,and can also share detailed information of abnormal DDoS traffic information when the network is idle to provide data support for edge node training models.(4)Research on DDoS attack defense methods based on blockchain.The existing device filtering scheme is studied and be analyzed,and a blockchain-based trusted filtering algorithm for DDoS attack devices is proposed.The algorithm is based on the non-tamperable DDoS abnormal traffic information stored in the blockchain,and uses smart contracts to implement DDoS attack device filtering rules to automatically filter DDoS attack initiating devices according to the priority level.(5)Design and implement a blockchain-based collaborative defense system against DDoS attacks.On top of the above research results,a blockchain-based collaborative defense system against DDoS attacks is implemented.Through the blockchain-based collaborative defense system against DDoS attacks,not only can edge nodes,abnormal devices and attack records be managed and controlled,but also the whole process from DDoS attack initiation to filtering can be monitored.
Keywords/Search Tags:IoT devices, DDoS attack, Blockchain, Machine Learning
PDF Full Text Request
Related items