{"id":"https://openalex.org/W4407247998","doi":"https://doi.org/10.1109/aibthings63359.2024.10863359","title":"Detection of DoS and DDoS Attacks Using Machine Learning and Blockchain in IoMT Networks","display_name":"Detection of DoS and DDoS Attacks Using Machine Learning and Blockchain in IoMT Networks","publication_year":2024,"publication_date":"2024-09-07","ids":{"openalex":"https://openalex.org/W4407247998","doi":"https://doi.org/10.1109/aibthings63359.2024.10863359"},"language":"en","primary_location":{"id":"doi:10.1109/aibthings63359.2024.10863359","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aibthings63359.2024.10863359","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071290143","display_name":"Atul Agrawal","orcid":"https://orcid.org/0000-0002-9101-359X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Atul Agrawal","raw_affiliation_strings":["ITS Engineering College,Department of Computer Science and Engineering,Greater Noida,India"],"affiliations":[{"raw_affiliation_string":"ITS Engineering College,Department of Computer Science and Engineering,Greater Noida,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093764695","display_name":"Pashupati Baniya","orcid":"https://orcid.org/0000-0003-1951-4469"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pashupati Baniya","raw_affiliation_strings":["IEC College of Engineering and Technology,Department of Computer Science and Engineering,Greater Noida,India"],"affiliations":[{"raw_affiliation_string":"IEC College of Engineering and Technology,Department of Computer Science and Engineering,Greater Noida,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106931201","display_name":"Esraa Mohammed Alazzawi","orcid":null},"institutions":[{"id":"https://openalex.org/I135120706","display_name":"University of Baghdad","ror":"https://ror.org/007f1da21","country_code":"IQ","type":"education","lineage":["https://openalex.org/I135120706"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Esraa Mohammed Alazzawi","raw_affiliation_strings":["University of Baghdad,Department of Computer Engineering,Al-Jadriya,Baghdad,Iraq,10071"],"affiliations":[{"raw_affiliation_string":"University of Baghdad,Department of Computer Engineering,Al-Jadriya,Baghdad,Iraq,10071","institution_ids":["https://openalex.org/I135120706"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035132866","display_name":"Nitin Rakesh","orcid":"https://orcid.org/0000-0002-1343-5244"},"institutions":[{"id":"https://openalex.org/I244572783","display_name":"Symbiosis International University","ror":"https://ror.org/005r2ww51","country_code":"IN","type":"education","lineage":["https://openalex.org/I244572783"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nitin Rakesh","raw_affiliation_strings":["Symbiosis Institute of Technology, Nagpur Campus Symbiosis International (Deemed University),Pune,India"],"affiliations":[{"raw_affiliation_string":"Symbiosis Institute of Technology, Nagpur Campus Symbiosis International (Deemed University),Pune,India","institution_ids":["https://openalex.org/I244572783"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085911203","display_name":"Bharat Bhushan","orcid":"https://orcid.org/0000-0001-9244-209X"},"institutions":[{"id":"https://openalex.org/I74885063","display_name":"Sharda University","ror":"https://ror.org/03b6ffh07","country_code":"IN","type":"education","lineage":["https://openalex.org/I74885063"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bharat Bhushan","raw_affiliation_strings":["Sharda University,Department of Computer Science and Engineering,Greater Noida,India"],"affiliations":[{"raw_affiliation_string":"Sharda University,Department of Computer Science and Engineering,Greater Noida,India","institution_ids":["https://openalex.org/I74885063"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090975154","display_name":"Akhtar Jam\u0131l","orcid":"https://orcid.org/0000-0002-2592-1039"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Akhtar Jamil","raw_affiliation_strings":["National University of Computer and Emerging Sciences,Department of Computer Science,Islamabad,Pakistan"],"affiliations":[{"raw_affiliation_string":"National University of Computer and Emerging Sciences,Department of Computer Science,Islamabad,Pakistan","institution_ids":["https://openalex.org/I201384688"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5071290143"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6989,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.74906083,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.965399980545044,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.965399980545044,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.89525306224823},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.802313506603241},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.728506326675415},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4659949541091919},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.4283975660800934},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4044192433357239},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.38441893458366394},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.3430631458759308},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.33189958333969116}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.89525306224823},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.802313506603241},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.728506326675415},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4659949541091919},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.4283975660800934},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4044192433357239},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.38441893458366394},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.3430631458759308},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.33189958333969116}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aibthings63359.2024.10863359","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aibthings63359.2024.10863359","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W2485307462","https://openalex.org/W2790122857","https://openalex.org/W2999565977","https://openalex.org/W3085529854","https://openalex.org/W3138454857","https://openalex.org/W4200350891","https://openalex.org/W4205600874","https://openalex.org/W4220764757","https://openalex.org/W4224046934","https://openalex.org/W4283023579","https://openalex.org/W4296917137","https://openalex.org/W4311521084","https://openalex.org/W4316021277","https://openalex.org/W4319791662","https://openalex.org/W4323344683","https://openalex.org/W4327640799","https://openalex.org/W4327813516","https://openalex.org/W4328029038","https://openalex.org/W4362571489","https://openalex.org/W4366149829","https://openalex.org/W4378191680","https://openalex.org/W4378220355","https://openalex.org/W4378232127","https://openalex.org/W4378900947","https://openalex.org/W4379875198","https://openalex.org/W4380591611","https://openalex.org/W4383346073","https://openalex.org/W4383501516","https://openalex.org/W4384695285","https://openalex.org/W4390196448","https://openalex.org/W4390821027","https://openalex.org/W4391114881","https://openalex.org/W4391936471","https://openalex.org/W4392345882","https://openalex.org/W4393155577","https://openalex.org/W4394829089","https://openalex.org/W6810135401"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"ICMPv6":[0],"is":[1,136],"the":[2,7,13,24,29,39,49,66,98,116],"primary":[3],"standard":[4],"considered":[5],"in":[6,73,106,129],"IoMT":[8,148],"network":[9,25,43],"because,":[10],"together":[11],"with":[12],"spread":[14],"of":[15,41,65,75,100],"IPv6,":[16],"it":[17,53,145],"continues":[18],"to":[19,38,71,138],"increase":[20],"its":[21],"significance":[22],"for":[23,83,147,161,175],"environment":[26],"and":[27,31,45,60,69,77,86,89,103,111,127,140,150,159,164,172],"escalate":[28],"DoS":[30,59,110,163],"DDoS":[32,61,112,165],"threats":[33],"posing":[34],"a":[35],"considerable":[36],"risk":[37],"availability":[40],"various":[42,157],"services":[44],"their":[46],"functioning.":[47],"Considering":[48],"described":[50],"IPv6":[51],"networks,":[52],"can":[54],"be":[55],"stated":[56],"that":[57],"ICMPv6-based":[58],"attacks":[62,166],"are":[63],"some":[64],"most":[67],"concerning":[68],"difficult":[70],"address":[72],"terms":[74],"identification":[76],"prevention.":[78],"As":[79],"an":[80],"efficient":[81],"solution":[82],"DDOS":[84],"detection":[85],"prevention,":[87],"ML":[88,121],"Blockchain-based":[90],"techniques":[91,105,122],"have":[92],"been":[93],"proposed.":[94],"The":[95,134,153],"paper":[96,154],"explores":[97],"use":[99],"machine":[101],"learning":[102],"blockchain":[104],"detecting":[107],"ICMPv6-":[108],"based":[109,167],"attacks.":[113],"It":[114],"highlights":[115],"high":[117],"accuracy":[118],"achieved":[119],"by":[120],"like":[123],"SVM,":[124],"Random":[125],"Forest,":[126],"ANN":[128],"Intrusion":[130],"Detection":[131],"Systems":[132],"(IDS).":[133],"technology":[135],"resistant":[137],"changes":[139],"preserves":[141],"information":[142],"integrity,":[143],"making":[144],"useful":[146],"networks":[149],"healthcare":[151],"settings.":[152],"also":[155],"discusses":[156],"studies":[158],"methods":[160],"identifying":[162],"on":[168],"ICMPv6,":[169],"highlighting":[170],"limitations":[171],"suggesting":[173],"improvements":[174],"future":[176],"work.":[177]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
