Analysis of spam transaction on the blockchain

5Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

Background/Objectives: The blockchain has been applied to many fields. Users are concerned about its security. The primary goal of this study is supporting the security service to protect DDoS attack. Methods/Statistical analysis: To provide security service in the blockchain, the security model is suggested. This model can filter out illegitimate traffic and exchange information with other security switches to determine whether a connected node is a normal node or an abnormal node. Each procedure of the proposed model has been described. Also, two different attack types are used to show the operation process of suggested model. Findings: Cyberattacks attempting to impact technology services availability continue to increase. Thus, DDoS is one of the most common type of attacks can also cause the most disruption to internet services. But blockchain has the characteristics of decentralization and peer to peer. This makes it harder to disrupt than conventional distributed application. Nevertheless, DDoS attacks remain a persistent threat. Therefore, a security model is suggested which can effectively block and respond to DDoS attacks. Improvements/Applications: The suggested model makes it possible to protect the spam transaction attacks in blockchain network.

Cite

CITATION STYLE

APA

Kim, T. K. (2018). Analysis of spam transaction on the blockchain. International Journal of Engineering and Technology(UAE), 7(3.34 Special Issue  34), 551–553. https://doi.org/10.14419/ijet.v7i3.34.19379

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free