Intrusion Detection in Cyber Physical Systems Using Multichain

Intrusion Detection in Cyber Physical Systems Using Multichain

Copyright: © 2023 |Pages: 26
DOI: 10.4018/978-1-6684-8666-5.ch009
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Distributed denial of service attack is a kind of cyber smack. Though this attack is known by everyone, its severity is increasing day by day. It denies the services of the network or online services by flooding with unwanted data and makes things unavailable. The impact of DDoS is very high, always. Recently, Twitter, Spotify, Amazon, and Paypal were severely affected by this DDoS. This made the services unavailable to their customers. Blockchain is one of the trending technology can be used to find the misbehaving nodes alias bots from the peer to peer networks. Due to lack of interoperability in blockchain, Multichain is proposed in this chapter to detect DDoS attacks along with cross chain technology. It is designed to communicate with multiple networks and the cross chain technology is built to have the flow between the different chains using smart contract. Deep learning models such as CNN and LSTM are trained and tested with CICDDOS2019 dataset and selected LSTM as the best model and installed at Multichain for detecting the malicious activity and blacklisting it immediately.
Chapter Preview
Top

Blockchain

Blockchain is a Distributed, Decentralized, Immutable ledger which stores record of transactions/data. In Blockchain, blocks are connected in a chain like structure which is shown in Figure 1. Each block is connected to other block using the feature called Hash (Nalayini et al 2023). Hash is of fixed length which is the output of the Hashing algorithm. There are many hashing algorithms such as Secure Hash Algorithm (SHA), Rivest, Shamir, Adleman (RSA) etc. Blockchain’s drawback is Interoperability i.e., communication between the different Blockchain applications. This can be overcome by Multichain.

Complete Chapter List

Search this Book:
Reset