Building a dataset of models that are metamodel instances for a Model-Driven Engineering (MDE) process using Artificial Intelligence (AI) techniques is now gaining traction. These datasets are rare. For this reason, t...
详细信息
Blockchain technology offers a decentralized and secure platform for addressing various challenges in smart cities and cyber-physical systems, including identity management, trust and transparency, and supply chain ma...
详细信息
ISBN:
(纸本)9798400717185
Blockchain technology offers a decentralized and secure platform for addressing various challenges in smart cities and cyber-physical systems, including identity management, trust and transparency, and supply chain management. However, blockchains are susceptible to a variety of threats, akin to any other technological system. To assess the resilience and robustness of diverse blockchain technologies, this study evaluates their performance indicators under various attack scenarios. Therefore, this study conducts a thorough examination of multiple well-known blockchain technologies, such as Ethereum and Hyperledger Fabric, under distributed Denial of Service attack scenarios. Ethereum, introduced as a revolutionary blockchain technology, has entirely transformed the way smart contracts and decentralized applications operate. Additionally, the innovative open source blockchain framework, Hyperledger Fabric, is intended for businesses and alliances seeking a secure and adaptable platform to develop distributed ledger applications. Hyperledger Besu, an Ethereum client with an extractable Ethereum Virtual Machine implementation designed to be enterprise-friendly for both public and private permissioned network use cases. Therefore, Ethereum and Hyperledger Fabric are utilized in this study for performance comparison. This study provides a summary of Ethereum's salient characteristics, architecture, and noteworthy influence on the blockchain and cryptocurrency ecosystem. Furthermore, it offers an overview of the main characteristics, architecture, and potential uses of Hyperledger Fabric. The blockchain's resilience against DDoS attacks is assessed by examining performance measures such as latency and throughput, which are fundamental metrics crucial for evaluating and enhancing the effectiveness of various systems, including communication protocols, databases, blockchains, and computernetworks. The outcomes of these experiments show that Hyperledger Fabric has greater t
While mitigating link-flooding attacks on the Internet has become an essential task, little research has been done on how an attacker can further attack and abuse the mitigation solutions themselves. In this paper, we...
详细信息
ISBN:
(纸本)9783031649530;9783031649547
While mitigating link-flooding attacks on the Internet has become an essential task, little research has been done on how an attacker can further attack and abuse the mitigation solutions themselves. In this paper, we propose a two-wave attack with collateral damage of millions (or Carom), a new link-flooding attack that poses a mitigation dilemma for multiple simultaneously attacked networks, which must either endure the flooding attack or suffer unwanted side effects in mitigating the attack. Composed of practical components, the Carom attack aims to maximize the burden on attack mitigation systems and the collateral damage to defending networks, thereby wreaking havoc on large swaths of the Internet. After modeling real-world mitigation solutions, we evaluated the attack against the mitigation solutions with real-world datasets, showing the feasibility of the attack and quantifying the amount of damage it can inflict on today's Internet. We hope that this work can motivate the improvement of existing link-flooding mitigation solutions.
Node deployment is a key issue in building sensor/actuator networks. To improve coverage and reduce costs, the use of autonomous mobile robotic nodes is an attractive option. This paper presents two new virtual force-...
详细信息
In the operation of large multiprocessor systems, intermittent faults have become an important reliability challenge due to their cryptic nature. In these systems, the occurrence of intermittent faults often affects t...
详细信息
With the advent of the 5G era and the rapid development of emerging industries such as cloud computing and big data, data centers, as resource management platforms and key transmission hubs, are experiencing a dramati...
详细信息
As we embrace the dawn of the 5G era, the fusion of Software Defined Network (SDN) and Network Function Virtualization (NFV) technologies has heralded a new epoch in network architecture. This provides indispensable c...
详细信息
The sensing coverage of roadside sensing system usually does not cover the entire road network, resulting in block missing values in traffic data. Traditional methods either adopted simple hints or graph neural networ...
详细信息
Processing neural network inferences on edge devices, such as smartphones, IoT devices and smart sensors can provide substantial advantages compared to traditional cloud-based computation. These include technical aspe...
详细信息
The Internet of Things (IoT) has fundamentally changed how we engage with the environment that surrounds us by facilitating the connection of various devices and the flow of data between them. However, as the complexi...
详细信息
暂无评论