Analysis of Spam Transaction on the Blockchain

  • Authors

    • Tae Kyung Kim
    • . .
    • . .
  • Blockchain, DDoS, Spam transaction, Eclipse attack, Abnormal node
  • Background/Objectives: The blockchain has been applied to many fields. Users are concerned about its security. The primary goal of this study is supporting the security service to protect DDoS attack.

    Methods/Statistical analysis: To provide security service in the blockchain, the security model is suggested. This model can filter out illegitimate traffic and exchange information with other security switches to determine whether a connected node is a normal node or an abnormal node. Each procedure of the proposed model has been described. Also, two different attack types are used to show the operation process of suggested model.

    Findings: Cyberattacks attempting to impact technology services availability continue to increase. Thus, DDoS is one of the most common type of attacks can also cause the most disruption to internet services. But blockchain has the characteristics of decentralization and peer to peer. This makes it harder to disrupt than conventional distributed application. Nevertheless, DDoS attacks remain a persistent threat. Therefore, a security model is suggested which can effectively block and respond to DDoS attacks.

    Improvements/Applications: The suggested model makes it possible to protect the spam transaction attacks in blockchain network.



  • References

    1. [1] Blockchain. (2018). Retrieved from

      [2] Sun, J., Yan, J., & Zhang, K. Z. (2016). Blockchain-based sharing services: What blockchain technology can contribute to smart cities. Financial Innovation, 2(1), 26.

      [3] Zhang, Y., & Wen, J. (2017). The IoT electric business model: Using blockchain technology for the internet of things. Peer-to-Peer Networking and Applications, 10(4), 983-994.

      [4] Huckle, S., Bhattacharya, R., White, M., & Beloff, N. (2016). Internet of things, blockchain and shared economy applications. Procedia Computer Science, 98, 461-466.

      [5] New spam attacks aim to slow down bitcoin network. (2017). JP BUNTINX. Retrieved from

      [6] Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2017). A survey on the security of blockchain systems. Future Generation Computer Systems.

      [7] Singh, A. (2006). Eclipse attacks on overlay networks: Threats and defenses. In IEEE INFOCOM.

      [8] Heilman, E., Kendler, A., Zohar, A., & Goldberg, S. (2015, August). Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In USENIX Security Symposium, 129-144.

      [9] Spam transactions. (2018). Retrieved from

      [10] Steichen, M., Hommes, S., & State, R. (2017). ChainGuard—A firewall for blockchain applications using SDN with OpenFlow. In Principles, Systems and Applications of IP Telecommunications (IPTComm), 1-8.

      [11] Guerin, R. (1992). A unified approach to bandwidth allocation and access control in fast packet-switched networks. In INFOCOM'92. Eleventh Annual Joint Conference of the IEEE Computer and Communications Societies, 1-12.

  • Downloads

  • How to Cite

    Kyung Kim, T., ., ., & ., . (2018). Analysis of Spam Transaction on the Blockchain. International Journal of Engineering & Technology, 7(3.34), 551-553.