{"id":"https://openalex.org/W4221095677","doi":"https://doi.org/10.23919/icact53585.2022.9728816","title":"Retracted: Systematic Analysis of DDoS Attacks in Blockchain","display_name":"Retracted: Systematic Analysis of DDoS Attacks in Blockchain","publication_year":2022,"publication_date":"2022-02-13","ids":{"openalex":"https://openalex.org/W4221095677","doi":"https://doi.org/10.23919/icact53585.2022.9728816"},"language":"en","primary_location":{"id":"doi:10.23919/icact53585.2022.9728816","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact53585.2022.9728816","pdf_url":null,"source":{"id":"https://openalex.org/S4363608017","display_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000066491","display_name":"Mohamad Arsalan Sheikh","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mohamad Arsalan Sheikh","raw_affiliation_strings":["University of Technology,School of Computer Science Faculty of Engineering and Information and Technology,Sydney,Broadway Ultimo,NSW,2007"],"affiliations":[{"raw_affiliation_string":"University of Technology,School of Computer Science Faculty of Engineering and Information and Technology,Sydney,Broadway Ultimo,NSW,2007","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114910175","display_name":"Gul Zameen Khan","orcid":"https://orcid.org/0000-0003-4081-2268"},"institutions":[{"id":"https://openalex.org/I4210146984","display_name":"Dynamic Digital Depth (Australia)","ror":"https://ror.org/050fr6z67","country_code":"AU","type":"company","lineage":["https://openalex.org/I4210146984"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Gul Zameen Khan","raw_affiliation_strings":["NLT Digital Solutions,Australia","NLT Digital Solutions, Australia"],"affiliations":[{"raw_affiliation_string":"NLT Digital Solutions,Australia","institution_ids":["https://openalex.org/I4210146984"]},{"raw_affiliation_string":"NLT Digital Solutions, Australia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041615708","display_name":"Farookh Khadeer Hussain","orcid":"https://orcid.org/0000-0003-1513-8072"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Farookh Khadeer Hussain","raw_affiliation_strings":["University of Technology,School of Computer Science Faculty of Engineering and Information and Technology,Sydney,Broadway Ultimo,NSW,2007"],"affiliations":[{"raw_affiliation_string":"University of Technology,School of Computer Science Faculty of Engineering and Information and Technology,Sydney,Broadway Ultimo,NSW,2007","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5000066491"],"corresponding_institution_ids":["https://openalex.org/I114017466"],"apc_list":null,"apc_paid":null,"fwci":0.2162,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.25222469,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"132","last_page":"137"},"is_retracted":true,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7806972861289978},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7737196683883667},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6177945733070374},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.5319331884384155},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.48501941561698914},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48081910610198975},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12746793031692505},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.10224208235740662}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7806972861289978},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7737196683883667},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6177945733070374},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.5319331884384155},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.48501941561698914},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48081910610198975},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12746793031692505},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.10224208235740662}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact53585.2022.9728816","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact53585.2022.9728816","pdf_url":null,"source":{"id":"https://openalex.org/S4363608017","display_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1561104315","https://openalex.org/W1825497982","https://openalex.org/W1875348914","https://openalex.org/W1964921349","https://openalex.org/W1979494246","https://openalex.org/W2015420980","https://openalex.org/W2028521711","https://openalex.org/W2081357650","https://openalex.org/W2127289656","https://openalex.org/W2144622427","https://openalex.org/W2150847526","https://openalex.org/W2152195021","https://openalex.org/W2155871862","https://openalex.org/W2170810185","https://openalex.org/W2170852315","https://openalex.org/W2188593784","https://openalex.org/W2295598076","https://openalex.org/W2617095022","https://openalex.org/W2790670692","https://openalex.org/W2801092672","https://openalex.org/W2890624031","https://openalex.org/W2911093106","https://openalex.org/W2944452041","https://openalex.org/W2973207694","https://openalex.org/W3006189297","https://openalex.org/W3049461974","https://openalex.org/W3080201860","https://openalex.org/W3111356309","https://openalex.org/W3119250988","https://openalex.org/W3138887713","https://openalex.org/W4235795579","https://openalex.org/W6633725412","https://openalex.org/W6762316053","https://openalex.org/W6767821756","https://openalex.org/W6786948829"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2754163055","https://openalex.org/W2185673024","https://openalex.org/W4377970398","https://openalex.org/W3026018975"],"abstract_inverted_index":{"With":[0],"the":[1,4,6,49,73,81,84,106,121,124,127,133,146,151,154,166],"expansion":[2],"of":[3,10,35,76,83,89,101,108,150,160,165],"internet,":[5],"identification":[7],"and":[8,30,51,126],"recuperation":[9],"digital":[11,19,42],"attacks":[12,26,78],"have":[13],"become":[14],"a":[15,40,103],"primary":[16],"concern":[17],"for":[18,72,141],"businesses.":[20],"Damage":[21],"brought":[22],"about":[23,161],"by":[24],"network":[25,50],"has":[27,119],"caused":[28],"far":[29],"wide":[31],"concern.":[32],"Distributed":[33],"Denial":[34],"Service":[36],"(DDoS)":[37],"attack":[38,46],"is":[39,70,91],"dangerous":[41],"attack.":[43],"It\u2019s":[44],"an":[45,158],"that":[47,92],"annihilates":[48],"can":[52],"cause":[53],"multiple":[54],"computers":[55],"to":[56,61,79,131,144],"be":[57],"assaulted":[58],"simultaneously,":[59],"fizzling":[60],"perform":[62],"service":[63],"appropriately.":[64],"A":[65],"blockchain-based":[66],"DDoS":[67,77,114],"recognition":[68],"model":[69],"proposed":[71],"systematic":[74],"evaluation":[75],"understand":[80],"vulnerabilities":[82],"Blockchain":[85,90],"better.":[86],"The":[87,99],"advantage":[88],"Blacklisted":[93],"IP":[94],"addresses":[95],"are":[96],"effectively":[97],"stored.":[98],"use":[100],"such":[102],"framework":[104],"gives":[105,157],"benefit":[107],"additional":[109],"security":[110],"components":[111],"over":[112],"existing":[113],"moderation":[115],"frameworks.":[116],"This":[117],"paper":[118],"assessed":[120],"Tab":[122,155],"Transformer,":[123],"XGBoost,":[125],"Random":[128],"Forest":[129],"algorithm":[130],"discover":[132],"better":[134],"classifying":[135],"algorithm.":[136],"Tree-Based":[137],"classifier":[138],"procedure":[139],"utilized":[140],"feature":[142],"selection":[143],"boost":[145],"computational":[147],"time.":[148],"Out":[149],"three":[152],"algorithms,":[153],"Transformer":[156],"accuracy":[159],"97%":[162],"real-time":[163],"investigation":[164],"$attacks$.":[167]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-04-03T00:00:00"}
