{"id":"https://openalex.org/W4411787135","doi":"https://doi.org/10.3390/jcp5030039","title":"Denial-of-Service Attacks on Permissioned Blockchains: A Practical Study","display_name":"Denial-of-Service Attacks on Permissioned Blockchains: A Practical Study","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4411787135","doi":"https://doi.org/10.3390/jcp5030039"},"language":"en","primary_location":{"id":"doi:10.3390/jcp5030039","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5030039","pdf_url":"https://www.mdpi.com/2624-800X/5/3/39/pdf?version=1751288595","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/5/3/39/pdf?version=1751288595","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040214198","display_name":"Mohammad Pishdar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammad Pishdar","raw_affiliation_strings":["CoinFa Research Lab, Tehran 11369, Iran"],"affiliations":[{"raw_affiliation_string":"CoinFa Research Lab, Tehran 11369, Iran","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5118701340","display_name":"Yixing Lei","orcid":null},"institutions":[{"id":"https://openalex.org/I188760350","display_name":"Ollscoil na Gaillimhe \u2013 University of Galway","ror":"https://ror.org/03bea9k73","country_code":"IE","type":"education","lineage":["https://openalex.org/I188760350"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Yixing Lei","raw_affiliation_strings":["School of Computer Science, University of Galway, H91 TK33 Galway, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Galway, H91 TK33 Galway, Ireland","institution_ids":["https://openalex.org/I188760350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078662604","display_name":"Khaled Harfoush","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Khaled Harfoush","raw_affiliation_strings":["School of Computer Science, North Carolina State University, Raleigh, NC 27606, USA"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, North Carolina State University, Raleigh, NC 27606, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061041971","display_name":"Jawad Manzoor","orcid":"https://orcid.org/0000-0002-1541-0972"},"institutions":[{"id":"https://openalex.org/I188760350","display_name":"Ollscoil na Gaillimhe \u2013 University of Galway","ror":"https://ror.org/03bea9k73","country_code":"IE","type":"education","lineage":["https://openalex.org/I188760350"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Jawad Manzoor","raw_affiliation_strings":["School of Computer Science, University of Galway, H91 TK33 Galway, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Galway, H91 TK33 Galway, Ireland","institution_ids":["https://openalex.org/I188760350"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5061041971"],"corresponding_institution_ids":["https://openalex.org/I188760350"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":7.1568,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.96678299,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"5","issue":"3","first_page":"39","last_page":"39"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6802617907524109},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6337321996688843},{"id":"https://openalex.org/keywords/denial","display_name":"Denial","score":0.5571079850196838},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.49497145414352417},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.42804381251335144},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.42002636194229126},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3765382766723633},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.2794855833053589},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10367521643638611},{"id":"https://openalex.org/keywords/psychotherapist","display_name":"Psychotherapist","score":0.08540856838226318},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.046907901763916016}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6802617907524109},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6337321996688843},{"id":"https://openalex.org/C2780900520","wikidata":"https://www.wikidata.org/wiki/Q100268981","display_name":"Denial","level":2,"score":0.5571079850196838},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.49497145414352417},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.42804381251335144},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.42002636194229126},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3765382766723633},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.2794855833053589},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10367521643638611},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.08540856838226318},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.046907901763916016},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp5030039","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5030039","pdf_url":"https://www.mdpi.com/2624-800X/5/3/39/pdf?version=1751288595","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f032c516a8784ed59a0b752994ebf86c","is_oa":true,"landing_page_url":"https://doaj.org/article/f032c516a8784ed59a0b752994ebf86c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 5, Iss 3, p 39 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp5030039","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5030039","pdf_url":"https://www.mdpi.com/2624-800X/5/3/39/pdf?version=1751288595","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411787135.pdf","grobid_xml":"https://content.openalex.org/works/W4411787135.grobid-xml"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W2127612127","https://openalex.org/W2601306580","https://openalex.org/W2754529701","https://openalex.org/W2767453162","https://openalex.org/W2885743763","https://openalex.org/W2897450989","https://openalex.org/W2913606752","https://openalex.org/W2958290437","https://openalex.org/W2964167690","https://openalex.org/W2964302640","https://openalex.org/W2980394150","https://openalex.org/W2983754084","https://openalex.org/W2987069389","https://openalex.org/W3000787661","https://openalex.org/W3048157372","https://openalex.org/W3048460560","https://openalex.org/W3065831858","https://openalex.org/W3095660977","https://openalex.org/W3105886686","https://openalex.org/W3117549445","https://openalex.org/W3135300514","https://openalex.org/W3203183630","https://openalex.org/W4200220095","https://openalex.org/W4206257743","https://openalex.org/W4229034602","https://openalex.org/W4293732046","https://openalex.org/W4296437702","https://openalex.org/W4300127641","https://openalex.org/W4307125545","https://openalex.org/W4384161932","https://openalex.org/W4393145406","https://openalex.org/W4394860440","https://openalex.org/W4400121524","https://openalex.org/W4400489962","https://openalex.org/W4400679069","https://openalex.org/W4400976659","https://openalex.org/W4403938330","https://openalex.org/W4404008130","https://openalex.org/W4404410834","https://openalex.org/W4408324878","https://openalex.org/W6682904396","https://openalex.org/W6903913235","https://openalex.org/W7024640192"],"related_works":["https://openalex.org/W2035091929","https://openalex.org/W2161226151","https://openalex.org/W2765658188","https://openalex.org/W2235209299","https://openalex.org/W2886198660","https://openalex.org/W1484565796","https://openalex.org/W4230824443","https://openalex.org/W3026018975","https://openalex.org/W2185673024","https://openalex.org/W2142794587"],"abstract_inverted_index":{"Hyperledger":[0],"Fabric":[1],"(HLF)":[2],"is":[3],"a":[4,38],"leading":[5],"permissioned":[6],"blockchain":[7,88],"platform":[8],"designed":[9],"for":[10,156],"enterprise":[11],"applications.":[12],"However,":[13],"it":[14],"faces":[15],"significant":[16],"security":[17],"risks":[18],"from":[19,188],"Denial-of-Service":[20],"(DoS)":[21],"attacks":[22,79],"targeting":[23],"its":[24,43],"core":[25],"components.":[26],"This":[27],"study":[28],"systematically":[29],"investigated":[30],"network-level":[31],"DoS":[32,78,167],"attack":[33,91],"vectors":[34],"against":[35],"HLF,":[36,182],"with":[37,193],"focus":[39],"on":[40,63,138],"threats":[41],"to":[42,68,76,97,102,112,118,128,163,181,196],"ordering":[44],"service,":[45],"Membership":[46],"Service":[47],"Provider":[48],"(MSP),":[49],"peer":[50],"nodes,":[51],"consensus":[52,123],"protocols,":[53],"and":[54,80,84,125,146,159,165,191],"architectural":[55],"dependencies.":[56],"In":[57],"this":[58],"research,":[59],"we":[60,170],"performed":[61],"experiments":[62],"an":[64],"HLF":[65,202],"test":[66],"bed":[67],"demonstrate":[69],"how":[70],"compromised":[71],"components":[72],"can":[73],"be":[74],"exploited":[75],"launch":[77],"degrade":[81],"the":[82,87,139,149,154],"performance":[83],"availability":[85],"of":[86,148,200],"network.":[89],"Key":[90],"scenarios":[92],"included":[93],"manipulating":[94],"block":[95],"sizes":[96],"induce":[98],"latency,":[99,143],"discarding":[100],"blocks":[101],"disrupt":[103],"consensus,":[104],"issuing":[105],"malicious":[106],"certificates":[107],"via":[108],"MSP,":[109],"colluding":[110],"peers":[111],"sabotage":[113],"validation,":[114],"flooding":[115],"external":[116],"clients":[117],"overwhelm":[119],"resources,":[120],"misconfiguring":[121],"Raft":[122],"parameters,":[124],"disabling":[126],"CouchDB":[127],"cripple":[129],"data":[130],"access.":[131],"The":[132],"experimental":[133],"results":[134],"reveal":[135],"severe":[136],"impacts":[137],"availability,":[140],"including":[141,176],"increased":[142],"decreased":[144],"throughput,":[145],"inaccessibility":[147],"ledger.":[150],"Our":[151],"findings":[152],"emphasize":[153],"need":[155],"proactive":[157],"monitoring":[158,184],"robust":[160],"defense":[161],"mechanisms":[162],"detect":[164],"mitigate":[166],"threats.":[168],"Finally,":[169],"discuss":[171],"some":[172],"future":[173],"research":[174],"directions,":[175],"lightweight":[177],"machine":[178],"learning":[179],"tailored":[180],"enhanced":[183],"by":[185],"aggregating":[186],"logs":[187],"multiple":[189],"sources,":[190],"collaboration":[192],"industry":[194],"stakeholders":[195],"deploy":[197],"pilot":[198],"studies":[199],"security-enhanced":[201],"in":[203],"operational":[204],"environments.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
