Title | Blacklisted IP Distribution System to Handle DDoS Attacks on IPS Snort Based on Blockchain |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Al'aziz, Bram Andika Ahmad, Sukarno, Parman, Wardana, Aulia Arif |
Conference Name | 2020 6th Information Technology International Seminar (ITIS) |
Date Published | Oct. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-7726-7 |
Keywords | Blacklisted IP, blockchain, composability, Computer crime, DDoS, DDoS attack mitigation, DDoS Attack Prevention, DDOS attacks detection, denial-of-service attack, Human Behavior, IP networks, IPS, Metrics, pubcrawl, resilience, Resiliency, Servers, smart contract, smart contracts, Testing |
Abstract | The mechanism for distributing information on the source of the attack by combining blockchain technology with the Intrusion Prevention System (IPS) can be done so that DDoS attack mitigation becomes more flexible, saves resources and costs. Also, by informing the blacklisted Internet Protocol(IP), each IPS can share attack source information so that attack traffic blocking can be carried out on IPS that are closer to the source of the attack. Therefore, the attack traffic passing through the network can be drastically reduced because the attack traffic has been blocked on the IPS that is closer to the attack source. The blocking of existing DDoS attack traffic is generally carried out on each IPS without a mechanism to share information on the source of the attack so that each IPS cannot cooperate. Also, even though the DDoS attack traffic did not reach the server because it had been blocked by IPS, the attack traffic still flooded the network so that network performance was reduced. Through smart contracts on the Ethereum blockchain, it is possible to inform the source of the attack or blacklisted IP addresses without requiring additional infrastructure. The blacklisted IP address is used by IPS to detect and handle DDoS attacks. Through the blacklisted IP distribution scheme, testing and analysis are carried out to see information on the source of the attack on each IPS and the attack traffic that passes on the network. The result is that each IPS can have the same blacklisted IP so that each IPS can have the same attack source information. The results also showed that the attack traffic through the network infrastructure can be drastically reduced. Initially, the total number of attack packets had an average of 115,578 reduced to 27,165. |
URL | https://ieeexplore.ieee.org/document/9320996 |
DOI | 10.1109/ITIS50118.2020.9320996 |
Citation Key | alaziz_blacklisted_2020 |