Analysis of Spam Transaction on the Blockchain
Keywords:Blockchain, DDoS, Spam transaction, Eclipse attack, Abnormal node
Background/Objectives: The blockchain has been applied to many fields. Users are concerned about its security. The primary goal of this study is supporting the security service to protect DDoS attack.
Methods/Statistical analysis: To provide security service in the blockchain, the security model is suggested. This model can filter out illegitimate traffic and exchange information with other security switches to determine whether a connected node is a normal node or an abnormal node. Each procedure of the proposed model has been described. Also, two different attack types are used to show the operation process of suggested model.
Findings: Cyberattacks attempting to impact technology services availability continue to increase. Thus, DDoS is one of the most common type of attacks can also cause the most disruption to internet services. But blockchain has the characteristics of decentralization and peer to peer. This makes it harder to disrupt than conventional distributed application. Nevertheless, DDoS attacks remain a persistent threat. Therefore, a security model is suggested which can effectively block and respond to DDoS attacks.
Improvements/Applications: The suggested model makes it possible to protect the spam transaction attacks in blockchain network.
 Blockchain. (2018). Retrieved from https://en.wikipedia.org/wiki/Blockchain.
 Sun, J., Yan, J., & Zhang, K. Z. (2016). Blockchain-based sharing services: What blockchain technology can contribute to smart cities. Financial Innovation, 2(1), 26.
 Zhang, Y., & Wen, J. (2017). The IoT electric business model: Using blockchain technology for the internet of things. Peer-to-Peer Networking and Applications, 10(4), 983-994.
 Huckle, S., Bhattacharya, R., White, M., & Beloff, N. (2016). Internet of things, blockchain and shared economy applications. Procedia Computer Science, 98, 461-466.
 New spam attacks aim to slow down bitcoin network. (2017). JP BUNTINX. Retrieved from http://www.newsbtc.com/2017/03/04/new-spam-attacks-aim-slow-bitcoin-network/.
 Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2017). A survey on the security of blockchain systems. Future Generation Computer Systems.
 Singh, A. (2006). Eclipse attacks on overlay networks: Threats and defenses. In IEEE INFOCOM.
 Heilman, E., Kendler, A., Zohar, A., & Goldberg, S. (2015, August). Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In USENIX Security Symposium, 129-144.
 Spam transactions. (2018). Retrieved from https://en.bitcoin.it/wiki/Spam_transactions
 Steichen, M., Hommes, S., & State, R. (2017). ChainGuardâ€”A firewall for blockchain applications using SDN with OpenFlow. In Principles, Systems and Applications of IP Telecommunications (IPTComm), 1-8.
 Guerin, R. (1992). A unified approach to bandwidth allocation and access control in fast packet-switched networks. In INFOCOM'92. Eleventh Annual Joint Conference of the IEEE Computer and Communications Societies, 1-12.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).