Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao ZENODOarrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
ZENODO
Conference object . 2020
Data sources: ZENODO
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
ZENODO
Conference object . 2020
Data sources: ZENODO
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
https://doi.org/10.1007/978-3-...
Part of book or chapter of book . 2020 . Peer-reviewed
License: Springer TDM
Data sources: Crossref
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
ZENODO
Conference object . 2020
Data sources: Datacite
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
ZENODO
Conference object . 2020
Data sources: Datacite
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
http://dx.doi.org/10.1007/978-...
Part of book or chapter of book
License: Springer TDM
Data sources: Sygma
DBLP
Conference object . 2024
Data sources: DBLP
versions View all 8 versions
addClaim

ProtectDDoS: A Platform for Trustworthy Offering and Recommendation of Protections

Authors: Muriel Figueredo Franco; Erion Sula; Bruno Rodrigues 0001; Eder J. Scheid; Burkhard Stiller;

ProtectDDoS: A Platform for Trustworthy Offering and Recommendation of Protections

Abstract

As the dependency of business on digital services to offer their products increases, their vulnerability to cyberattacks increases. In this sense, besides providing innovative and flexible services, busi- ness owners must focus on investing in robust cybersecurity mechanisms to prevent cyberattacks. Distributed Denial of Service (DDoS) attacks remains one of the most dangerous cyberattacks, leading to several prob- lems, such as service disruption, financial loss, and reputation harm, for companies and end-users. Even though several providers offer protections for different types of DDoS attacks, there is still a lack of catalogs or solu- tions that help network operators to access and filter information in order to select the most suitable protection for a specific demand. Thus, in this paper, a platform for offering and recommendation of DDoS protection, named ProtectDDoS, is proposed. ProtectDDoS provides a blockchain- based catalog where DDoS protection providers can announce details regarding their services, while interested users can filter or obtain rec- ommendations of DDoS protection according to their specific demands (e.g., price, attacks supported, and geolocation constraints). ProtectD- DoS provides a smart contract that maintains the integrity of the data about the protections available and provides tamper-proof reputations. To evaluate the feasibility and effectiveness of ProtectDDoS, a proto- type was implemented and a case study conducted. Further, a discussion concerning additional costs, including the interaction with the smart contract, is provided.

Related Organizations
Keywords

Smart Contracts, Cybersecurity, Smart Contract (SC), DDoS Protections, Recommender Systems, Recommender system, Marketplace, Marketplaces, DDoS protection

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    8
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Top 10%
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Top 10%
    OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 11
    download downloads 1
  • 11
    views
    1
    downloads
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
download
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
8
Top 10%
Top 10%
Top 10%
11
1
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!