Conference PaperPDF Available

Collaborative Cyber Attack Defense in SDN Networks using Blockchain Technology

Authors:
Collaborative Cyber Attack Defense in SDN
Networks using Blockchain Technology
Mehrdad Hajizadeh, Nima Afraz, Marco Ruffini, Thomas Bauschert
Technische Universität Chemnitz, Chair of Communication Networks, Chemnitz, Germany
CONNECT Center, Trinity College Dublin, Ireland
Email: {mehrdad.hajizadeh, thomas.bauschert}@etit.tu-chemnitz.de
Email: nafraz@tcd.ie | marco.ruffini@scss.tcd.ie
Abstract—The legacy security defense mechanisms cannot
resist where emerging sophisticated threats such as zero-day and
malware campaigns have profoundly changed the dimensions of
cyber-attacks. Recent studies indicate that cyber threat intel-
ligence plays a crucial role in implementing proactive defense
operations. It provides a knowledge-sharing platform that not
only increases security awareness and readiness but also enables
the collaborative defense to diminish the effectiveness of potential
attacks. In this paper, we propose a secure distributed model to
facilitate cyber threat intelligence sharing among diverse partici-
pants. The proposed model uses blockchain technology to assure
tamper-proof record-keeping and smart contracts to guarantee
immutable logic. We use an open-source permissioned blockchain
platform, Hyperledger Fabric, to implement the blockchain
application. We also utilize the flexibility and management
capabilities of Software-Defined Networking to be integrated with
the proposed sharing platform to enhance defense perspectives
against threats in the system. In the end, collaborative DDoS
attack mitigation is taken as a case study to demonstrate our
approach.
Index Terms—Cyber Threat Intelligence, Blockchain, SDN,
Proactive Defense, Collaborative DDoS Mitigation
I. INTRODUCTION
The continuous growth of IT infrastructures, along with
emerging technologies such as 5G, exposes a massive and
diverse number of devices connected to the Internet. This
leads to an increase in the complexity and vulnerability of
the Internet infrastructure especially concerning cyber security
attacks. Well-funded players have transformed simple hacking
activities to very advanced attack operations e.g., to gain
financial benefits or for political interests. Unauthorized access
through Zero-day attacks as well as Advanced Persistence
Threats (APTs) are two examples of dynamic, stealthy and
sophisticated threats to the system [1]. Despite huge annual
spending in cybersecurity, companies are still dealing with
significant security challenges which cannot be handled by
their legacy defense mechanisms.
Nowadays, organizations mostly use reactive defense meth-
ods that retain the defense team in a firefighting fashion [2].
However the key to proactive defense is acting rather than
reacting. The successful counter-strategy against advanced
threats comprises 1) collecting information about threats,
adversaries, their techniques, and 2) sharing with other parties.
Consequently, near-real-time (NRT) Cyber Threat Intelligence
Fig. 1: Cyber threat intelligence sharing for different scenarios
using blockchain technology.
(CTI) could ease the proactive defense of critical network
infrastructures [3].
Threat Intelligence (TI) is the collection of information
about a threat that might prevent an attack or reduce the
detection time [1]. Practically, cyber threat intelligence sharing
is utilized for distributing security knowledge and experiences
with other contributors on a sharing platform. Verizon [4]
indicates that the observation spread time is a vital factor.
Indeed, 75% of attacks are launched from target 0 to target
1 within only 24 hours. Surprisingly, more than 40% of them
invade the second target in less than an hour.
On the other hand, there are network operators that heavily
rely on third-parties (CTI providers) to feed intelligence into
their defense mechanisms. However, this reliance may hin-
der the implementation of Service Level Agreements (SLA)
between CTI customers (e.g., network operators) and CTI
providers. For example, an SLA violation may occur due to an
insufficient reaction of the CTI provider during a cyber attack
that might lead to massive compensation fees.
Recently, Software Defined Networking (SDN) is recog-
nized as a promising concept that facilitates network man-
agement as well as policy enforcement. SDN decouples the978-1-7281-5684-2/20/$31.00 ©2020 IEEE
control plane and the data plane of the network, enabling a
global view on the network and allowing network programma-
bility [5].
Our objective in this work is to overcome the common
issues of threat sharing. We outline a secure, scalable, im-
mutable, low-cost, and easy to deploy decentralized infrastruc-
ture where different parties can share cyber threat intelligence.
Fig.1 shows how various partners with common business
objectives can use a single blockchain platform. For example,
a network provider could be supported by either open-source
CTI communities or CTI-as-a-Service providers. Meanwhile,
it can cooperate with upper layer ISPs or with security incident
response teams for collaborative defense against adversaries.
In this work, we particularly address the following issues:
A highly secure platform that allows various members
to share sensitive information through channeling and
authenticated access.
A trustworthy platform where participants benefit from a
reliable business model. This is a necessary prerequisite
for a successful security collaboration based on smart
contracts for providing reliable SLAs.
A SDN control plane that enables fast security policy
enforcement and thus reduces cyber attack mitigation
time.
This paper is organized as follows. Section II presents
related work. In section III, we outline the components of
our proposed platform. The case study is described in section
IV, and the results are presented in section V. Finally, section
VI concludes the paper.
II. BACKGROU ND A ND RE LATE D WORK
The lack of a secure and reliable platform for CTI sharing
hinders the collaboration between parties. As mentioned in
[1], [6], revealing sensitive information is one of the main
reasons that prevents knowledge-sharing - competitors might
misuse the exposed information. Also, sensitive intelligence
could reveal critical details about the network infrastructure
where adversaries can benefit from. Likewise, the disclosed
invasion techniques could encourage new malicious actors to
invade other insecure systems [7]. Additionally, the adversaries
may gain awareness on the detection of their attack if this
information is disclosed outside the trusted zone. By that
they will be able to perform necessary updates to continue
their malicious activities. Considering the above-mentioned
issues, organizations either avoid sharing or prefer to restrict
collaboration with only highly trusted community members
[6] [7].
Hence, the CTI sharing platform, as well as the participants,
should establish several levels of trust relationship to avoid
information disclosure and assure the reliability of intelligence
data provided by other partners [8].
The application of blockchain technology in the context of
security is an emerging trend in various research domains.
Authors in [9] suggest that storing the logs in ledgers can
improve the transparency due to the append-only feature
of a blockchain. Thus any misbehaving individual cannot
Fig. 2: High-Level architecture of a CTI sharing platform for
collaborative DDoS attack mitigation using STIX objects
tamper the logs. Moreover, CTI sharing through an immutable
database prohibits malicious players from manipulating the
intelligence for confusing the defense mechanisms. It also
provides traceability for forensic analysis e.g., for cyber-crime
investigations [10].
Another application use case for blockchain technology is
in the context of Distributed Denial of Service (DDoS) attacks.
Nowadays, DDoS attacks are recognized as one of the most
sophisticated attacks with large impact. The probability of
a successful [11] DDoS attack is quite high if only legacy
security mechanisms are applied. A large body of research
addressed DDoS attack mitigation. A coordinated protection
following a group-defense approach facilitates the prevention
of illegitimate DDoS traffic through collaboration among net-
work providers. This extends the defense horizon close to the
source of attack rather than to victim resources [12] [13]. The
IETF in [14] proposed a signaling protocol for collaborative
DDoS attack mitigation named DDoS Open Threat Signaling
(DOTS). However, the implementation complexity makes the
global development of DOTS challenging [15]. Furthermore,
a compromised DOTS server may lead to a defeat especially
when it is deployed as a single point of failure [16].
Although in [17] [15] a public blockchain is proposed
for DDoS signaling collaboration, in our opinion a private
blockchain should be used to provide security and privacy
of the CTI sharing environment. Public blockchains utilize
challenging consensus mechanisms such as proof of stake or
proof of work which diminishes the overall performance of
the collaboration system.
III. PROP OS ED ARCHITECTURE
Fig. 2 shows the proposed architecture of a CTI shar-
ing platform for conducting collaborative mitigation against
large scale DDoS attacks launched across multiple network
domains. This architecture combines SDN-based policy en-
forcement and blockchain-based CTI sharing which enables
an automated and agile DDoS defense framework. In the
following sections we outline some technical details of the
architecture
A. CTI Sharing Format
In conventional CTI sharing, unstructured threat information
is collected and exchanged using generic insecure tools such
as telephone and email. In contrast, a structured model uses
a standard format for the entire process [6]. For example, the
U.S. Department of Homeland Security utilizes the Structured
Threat Information eXpression (STIX) format, which is based
on JSON [18]. The STIX Domain Objects (SDOs) describe in-
formation associated with CTI, e.g. attack patterns, campaigns,
malware, indicators.
An SDO also includes the Course of Action object to
describe actions that could be performed to prevent or mitigate
an attack. In our architecture, SDOs are used to exchange
cyber threat intelligence between participants.
B. Blockchain Concept
A blockchain is a immutable distributed ledger for storing
information of transactions between various untrusted parties.
The Bitcoin cryptocurrency is the most well-known application
of a public (permissionless) blockchain. However, a public
blockchain is not suitable for enterprise environments as it
might threaten the data privacy of the parties. Therefore, in
order to share extremely sensitive information with groups of
partners, we propose to use a private blockchain for providing
interaction among known participants with common objectives
but without having a fully trusted relationship [19].
The Hyperledger Fabric (HLF) is an open-source permis-
sioned blockchain designed for enterprise environments which
has some distinctive features compared to other blockchain
technologies. In the beginning, each transaction is concurrently
executed by the endorsing blockchain peers and verified by
a group of them. Then, signed and verified transactions are
ordered through the consensus protocol. Finally, the blocks
are generated and written on the ledger. In the following sub-
section, we outline the key components of the HLF framework.
1) Smart Contract: The joint understanding of a business
logic between different parties can be deployed through a
smart contract (a chaincode in HLF terminology). It performs
pre-defined actions when particular circumstances are reached.
In comparison to manual methods, this reduces the time to
mitigate as well as facilitates business process automation.
2) Blockchain Network: Generally, an HLF network con-
sists of various components: peer node, channel, orderer node,
and client application. Each organization participating in the
blockchain maintains one or more peer nodes. An individual
peer node hosts chaincodes and ledgers in every blockchain
network. A ledger provides a tamper-resistant storage, which
is a principal element of each peer node to keep records of all
state transitions. In addition, an HLF network allows multiple
channeling where only participants authenticated by a channel
can collaborate.
The ordering service is responsible for ordering transactions
that will be stored in the ledgers. The order of transactions
should be established in a way that avoids inserting wrong
transactions into the ledger (caused by error or malicious
actors). This could be done through a consensus algorithm
that plays a significant role in the whole transaction flow [20].
The client application uses the Fabric Software Develop-
ment Kit (SDK) for interacting with the blockchain to either
submit a transaction or retrieve content from it. The APIs
provided by the SDK allow client applications to communi-
cate with the peer node and invoke the chaincode to create
transactions.
C. SDN Infrastructure
SDN enables the creation of customized applications which
interact with various SDN components through standard APIs.
In our architecture, a client application communicates with
the blockchain and the SDN controller. It can submit or
retrieve CTI from the blockchain using the Hyperledger Fabric
SDK. Simultaneously, the client application is also interacting
with the SDN controller through (RESTful) APIs to enforce
mitigation policies e.g. by implementing blacklists (containing
malicious IP addresses) on the SDN switches [5].
D. Collaborative DDoS Mitigation
Figure 2 shows a multi-domain SDN network setup, where
each network domain represents a different Autonomous Sys-
tems (AS). We aim to perform the DDoS mitigation as close
as possible to the sources of the attack. Each individual AS is
contributing CTI via the blockchain using smart contracts. In
the example scenario the victim located in AS2 submits the
incident to the blockchain in the form of STIX domain objects,
including a blacklist of illegitimate IPs. Then, according to the
smart contracts, the respective AS(s) receive the blacklist and
enforce corresponding mitigation rules (e.g. traffic blocking
or rate-limitation) to the SDN switches close to the malicious
clients.
IV. CAS E STU DY
For the case study we implemented the CTI sharing platform
based on a private HLF blockchain application and evaluate
the performance of the collaborative DDoS attack mitigation
in a multi-domain SDN environment.
As depicted in Fig. 3, we utilize Kathara [21] to emulate a
multi-domain SDN network with two SDN controllers. Within
Kathara, we use Ryu [22] as SDN controller and OpenVSwitch
[5] to realize the the OpenFlow-enabled SDN switches. The
BGP [23] [22] app in the Ryu controller enables the OpenFlow
SDN switches to act as a BGP speaker; thus, the two SDN
networks are able to communicate via the BGP protocol. We
use a Linux computer (Ubuntu 16.04. ) equipped with a Intel
i5 CPU with 2.40GHz clock rate and 8.0 GB RAM to run
both Kathara and the Hyperledger Fabric V1.1 in a single
VM instance (using 4 CPU cores and 4 GB RAM). As shown
in Fig. 3, there are two hosts attached to an OpenFlow SDN
switch in AS1.
In normal mode of operation, every host from either AS1
or AS2 can legitimately access the website located in AS1.
Fig. 3: Scenario: two SDN networks with two separated Ryu
controllers communicating via BGP.
In the attack scenario, two hosts in AS2 are generating TCP
SYN flood DDoS traffic towards the web server. The CTI app
has two main modules: 1) POST, to submit a transaction in
the blockchain, and 2) GET, to read from the blockchain. We
assume that a blacklist of these hosts, which have illegitimate
IP addresses, is stored in a log file. The CTI App 1 periodically
examines if the blacklist is updated. If so, the new blacklist
will be inserted into the HLF using the POST module in the
App. Meanwhile, in AS2, the CTI App 2 periodically checks
for new content in the HLF and retrieves the blacklist using
the GET module. Then, the corresponding flow rules will be
issued and loaded into the OpenFlow SDN switch to block the
malicious hosts in AS2.
Our blockchain architecture comprises two organizations,
each representing an AS. There is one orderer node for the
whole blockchain, together with two peer nodes for each
organization. The Certificate Authority (CA) in each orga-
nization registers and enrolls the CTI application through
various cryptographic schemes for authenticating the App to
the blockchain network. Then, the App submits a transaction
proposal to the endorsing peer nodes.
Every peer node executes the chaincode using the proposed
transaction to sign, generates a transaction response and sends
it to the CTI application. Once the application receives signed
transactions, it will submit all of them to be ordered.
The ordering service collects transactions into blocks to be
distributed to the corresponding peer nodes. Finally, each peer
validates the received signed transaction to fulfill the endorsing
policy. Successfully validated transactions are submitted to the
ledger while the invalid ones are discarded.
A. Scalability Evaluation
In our demonstration, the DDoS attack mitigation is accom-
plished instantaneously - once the blacklist is shared in HLF,
the incoming attack traffic from AS2 against the web server
is immediately terminated.
We use the Hyperledger Caliper [24] benchmark tool to
evaluate the performance of the Hyperledger blockchain im-
plementation. It can generate reports including various per-
Fig. 4: HLF benchmark architecture: three organizations with
one peer per organization
formance parameters such as the number of Transaction Per
Second (TPS), the transaction latency, and the computing
resource consumption.
Notwithstanding our implementation depicted in Fig. 3, for
performance evaluation we scaled up the blockchain network
towards three organizations, see Fig. 4. The setup uses the Solo
consensus protocol of Hyperledger Fabric with an Orderer
node through a single channel. The Solo implementation is
convenient for a proof of concept but it is not recommended for
real production environments due to the absence of fault toler-
ance. Each of the three organizations includes one peer node
that owns administration privilege over the entire network. A
variable number of clients are generating random-length STIX
objects as transactions through all three organizations. We use
the same hardware and virtual machine configuration as in
our previous demonstration for carrying out the benchmarking
experiments. The virtual machine hosts every node in the
blockchain network as Docker container [25].
V. RESULTS AND DISCUSSION
Figure 5 shows the total executed transactions per second,
the so-called real throughput in Transaction Per Second (TPS)
versus the number of input transactions. At each benchmark
iteration, we submit groups of 500, 1000, 1500, 2000, 2500
input transactions into the HLF varying also the send rates (i.e.,
50, 100, 150 TPS). For each bunch of inputs, every individual
transaction is submitted sequentially until the last one has
reached its destination. Fig. 5 shows no significant changes of
the real throughput for a send rate of 50 TPS across different
number of input transactions. Meanwhile, for the other two
send rates (100, 150) a slight reduction of the real throughput
is observed, when increasing the number of input transactions.
As expected, the performance of the blockchain network
highly depends on the underlying hardware. The Hyperledger
Fabric provides a three-stage revolutionary architecture known
Fig. 5: Real throughput vs. number of transactions and send
rates
Fig. 6: Min, Max and Avg latency vs. number of transactions
and send rate = 100 TPS
Fig. 7: Number of successful transactions vs. send rates with
sending time interval = 20 sec
Fig. 8: Real throughput vs. send rates and number of clients
as execute-order-validate [19] in which every stage depends
on previously executed transactions. Hence, a less powerful
computer is not able to provide a high transaction throughput,
leading to performance degradation. Our results show that a
send rate of 50 TPS is sustainable, as the actual throughput
is 49.7. However, increasing the send rate to 100 and 150
TPS, yields only to a marginal throughput increase of 59.7
and 61.1, respectively. This lead to the conclusion that our
setup can sustain a send rate of about 60 TPS.
We denote latency as the time interval between the time
a transaction is sent to the blockchain and the time that the
same transaction is confirmed. The maximum, minimum, and
average latency for a send rate of 100 TPS (as an example)
are shown in Fig. 6. The maximum latency grows to nearly 36
seconds as the number of input transactions increases. This is
due to resource restrictions of the containers allocated to the
peer nodes. The minimum latency remains almost constant
as there are no high loads imposed on the peer nodes at
the beginning. Also, the blockchain configuration (e.g., the
block size, the number of channels, ordering service, users,
endorsing nodes) influences the latency.
To measure the number of successful transactions assuming
a fixed sending time interval, e.g. 20 seconds, we ran the
benchmark with different send rates (i.e., 20, 40, 60, 80, 100)
- the results are shown in Fig. 7. It can be observed that in all
cases all transactions are successfully completed i.e. no loss
of transactions occur. However, the time until all transactions
are successfully completed is larger than 20 seconds. This
corresponds to the difference of the real throughput (e.g. 60
TPS) and the send rate (e.g. 100 TPS).
Despite security and privacy, latency and throughput are
important performance metrics when selecting an appropri-
ate blockchain platform for CTI applications. For instance,
the latency requirements for feeding security functions (e.g.,
for a firewall) in an attack mitigation scenario differs from
sharing CTI for increasing the awareness of a security team
during normal system operation. The resource allocation for
the blockchain network has to be done so that the latency
requirements are met (for a given input load) . As an example,
in our lab setup 2500 transactions with an input send rate of
100 TPS lead to an average latency of 17 seconds and an
average throughput of 53.3 TPS. A lightweight virtual machine
can be deployed to host several components of the blockchain
network on a low-cost cloud service or even on a tiny computer
like the Raspberry Pi [26]. For enterprise-scale deployment
with thousands of CTIs per day, the provisioning of sufficiently
large computation resources is essential.
Our previous experiments considered only an individual
client in the blockchain network to generate all transactions.
In Fig. 8, we compare the real throughput for 1000 input
transactions when the number of clients changes (C=1, 10,
20). It can be seen that an increase in the number of clients
leads to a reduction in throughput due to the consumption of
more resources.
VI. CONCLUSION
The main objective of this paper is to present a Cyber
Threat Intelligence (CTI) sharing platform based on a private
blockchain addressing common CTI collaboration issues. We
demonstrate the application of this platform to mitigate DDoS
attacks in a multi-domain SDN network. Upon receiving
CTI information (through various STIX 2.0 objects), the
corresponding security policies are issued and enforced on
the SDN network to prevent or reduce the risk of threat-
ening incidents. For our CTI sharing platform, we propose
to use the Hyperledger Fabric as open-source blockchain
framework to provide security, privacy, and B2B requirements.
We believe that our model could address various concerns
of the current CTI sharing platforms. It provides a secure
infrastructure where multiple members can preserve their
privacy and share sensitive intelligence information. Moreover,
SLA requirements could be formulated in the form of smart
contracts. Hence, when certain conditions are met, the system
would automatically enforce appropriate actions. Also, the
immutability nature of the blockchain guarantees the tamper-
resistance property of all logs and transactions submitted in
the ledger. Consequently, it provides transparency as well as
traceability, facilitating the implementation of SLAs.
ACK NOW LE DG EM EN T
This work has been performed in the framework of the
Celtic-Plus project SENDATE Secure-DCI, funded by the
German BMBF (ID 16KIS0481).
Financial support from Science Foundation Ireland grants
14/IA/252 (O’SHARE) and 13/RC/2077 is gratefully acknowl-
edged.
REFERENCES
[1] W. Tounsi and H. Rais, “A survey on technical threat intelligence in the
age of sophisticated cyber attacks,” Computers & security, vol. 72, pp.
212–233, 2018.
[2] Dr. Jamie Graves, “Reactive vs. proactive cybersecurity: 5 reasons why
traditional security no longer works,” 2019.
[3] Dave McMahon, Rafal Rohozinski,Bell Canada , “The dark space
project - defence research reports,” 2013.
[4] verizonenterprise.com , “2015 data breach investigations report,” 2015.
[5] D. Kreutz, F. Ramos et al., “Software-defined networking: A compre-
hensive survey,” arXiv preprint arXiv:1406.0440, 2014.
[6] A. Mohaisen, O. Al-Ibrahim et al., “Rethinking information sharing for
threat intelligence,” in Proceedings of the fifth ACM/IEEE Workshop on
Hot Topics in Web Systems and Technologies. ACM, 2017, p. 6.
[7] G. D. Webster, R. L. Harris et al., “Sharing is caring: Collaborative
analysis and real-time enquiry for security analytics,” in iThings. IEEE,
2018, pp. 1402–1409.
[8] E. U. A. for Network and I. S. (ENISA), “Exploring the opportunities
and limitations of current threat intelligence platforms,” Tech. Rep.,
2017.
[9] W. Pourmajidi and A. Miranskyy, “Logchain: Blockchain-assisted log
storage,” in 2018 IEEE 11th International Conference on Cloud Com-
puting (CLOUD). IEEE, 2018, pp. 978–982.
[10] S. Brotsis, N. Kolokotronis et al., “Blockchain solutions for foren-
sic evidence preservation in iot environments,arXiv preprint
arXiv:1903.10770, 2019.
[11] M. Hajizadeh, T. V. Phan et al., “Probability analysis of successful
cyber attacks in sdn-based networks,” in 2018 IEEE Conference on
Network Function Virtualization and Software Defined Networks (NFV-
SDN). IEEE, 2018, pp. 1–6.
[12] B. Rodrigues, T. Bocek et al., “Enabling a cooperative, multi-domain
ddos defense by a blockchain signaling system (bloss),” Semantic
Scholar, 2017.
[13] S. Hameed and H. A. Khan, “Leveraging sdn for collaborative ddos
mitigation,” in 2017 International Conference on Networked Systems
(NetSys). IEEE, 2017, pp. 1–6.
[14] R. M. A. Mortensen, T. Reddy, “Ddos open threat signaling
(dots) requirements,” RFC 8612, May 2019. [Online]. Available:
https://www.rfc-editor.org/info/rfc8612
[15] Z. A. El Houda, A. S. Hafid et al., “Cochain-sc: An intra-and inter-
domain ddos mitigation scheme based on blockchain using sdn and smart
contract,” IEEE Access, vol. 7, pp. 98893–98 907, 2019.
[16] Z. Guangsen, M. Parashar et al., “Cooperative defence against ddos
attacks,” Journal of Research and Practice in Information Technology,
vol. 38, no. 1, p. 69, 2006.
[17] B. Rodrigues, T. Bocek et al., “A blockchain-based architecture for
collaborative ddos mitigation with smart contracts,” in IFIP International
Conference on Autonomous Infrastructure, Management and Security.
Springer, Cham, 2017, pp. 16–29.
[18] J. W. Bret Jordan, Rich Piazza, “Stix™ version 2.0. part 2: Stix objects,”
Tech. Rep. 8612, Jun 2017.
[19] E. Androulaki, A. Barger et al., “Hyperledger fabric: a distributed
operating system for permissioned blockchains,” in Proceedings of the
Thirteenth EuroSys Conference. ACM, 2018, p. 30.
[20] “A blockchain platform for the enterprise,” 2019. [Online]. Available:
https://hyperledger-fabric.readthedocs.io/en/latest/
[21] “Kathara,” [Online]. Available:http://www.kathara.org/.
[22] “Ryu,” [Online]. Available: https://osrg.github.io/ryu/.
[23] S. H. Y. Rekhter, T. Li, “A border gateway protocol
4 (bgp-4),” RFC 4271, January 2006. [Online]. Available:
https://tools.ietf.org/html/rfc4271
[24] “Hyperledger caliper,” [Online]. Avail-
able:https://www.hyperledger.org/projects/caliper.
[25] “Docker,” [Online]. https://www.docker.com/products/container-
runtime.
[26] “raspery pi,” [Online]. https://www.raspberrypi.org/.
... Additionally, Generative Adversarial Networks (GANs) can simulate adversarial behavior to enhance the robustness of cyber defense mechanisms (Gadekallu et al. 2021). By leveraging the power of Deep Learning (DL), organizations can enhance their cyber resilience by augmenting traditional security measures with adaptive defense mechanisms (Hajizadeh et al. 2020). These mechanisms continuously learn from new data and adjust their strategies, providing a proactive defense against emerging threats. ...
... 5. Consensus mechanisms: in digital era blockchains are popular implementations and highlighting their suitability for different types of blockchain-based applications (Hajizadeh et al., 2020). The most common consensus mechanisms followed are such as Proof of Work (PoW) has High energy consumption and risk of 51% attacks,its is well known for robust security and decentralization, Proof of Stake (PoS) Reduces energy usage but potential centralization concerns but PoS may be susceptible to new types of attacks (Aljihani et al., 2021).Delegated Proof of Stake (DPoS) improves transaction Efficiency but trade-offs with a decentralization nature. ...
... The work in [85] aims to address common issues in threat intelligence sharing by proposing a secure, scalable, and cost-effective decentralized infrastructure for various parties to share cyber threat intelligence. The platform offers high security, enabling members to share sensitive information through controlled access and authentication. ...
Preprint
Full-text available
Cyberthreat intelligence sharing is a critical aspect of cybersecurity, and it is essential to understand its definition, objectives, benefits, and impact on society. Blockchain and Distributed Ledger Technology (DLT) are emerging technologies that have the potential to transform intelligence sharing. This paper aims to provide a comprehensive understanding of intelligence sharing and the role of blockchain and DLT in enhancing it. The paper addresses questions related to the definition, objectives, benefits, and impact of intelligence sharing and provides a review of the existing literature. Additionally, the paper explores the challenges associated with blockchain and DLT and their potential impact on security and privacy. The paper also discusses the use of DLT and blockchain in security and intelligence sharing and highlights the associated challenges and risks. Furthermore, the paper examines the potential impact of a National Cybersecurity Strategy on addressing cybersecurity risks. Finally, the paper explores the experimental set up required for implementing blockchain and DLT for intelligence sharing and discusses the curricular ramifications of intelligence sharing.
Chapter
Full-text available
Traditional cybersecurity methods are becoming inadequate due to the growing complexity and frequency of cyber threats. This chapter explores autonomous cyber defense systems—self-sustaining, intelligent frameworks that detect, analyze, and respond to threats in real time without human intervention. Leveraging AI, Machine Learning, Reinforcement Learning, NLP, and Explainable AI, these systems enable adaptive and scalable security operations. The chapter analyzes system architectures across varying autonomy levels—human-in-the-loop, on-the-loop, and out-of-the-loop—and discusses enabling technologies such as Cyber Threat Intelligence. It reviews modern threats including zero-day exploits, AI-driven malware, and APTs, highlighting the advantages of autonomous systems in resilience and responsiveness. Practical frameworks, deployment strategies, and real-world case studies are presented with performance and ethical evaluation. The chapter concludes with future directions such as quantum-resilient architectures and sustainable cybersecurity strategies.
Chapter
In the recent economic environment and modern business landscape, supply chain management has become increasingly important. Modern supply chains are more complicated because of the globalization of business units, high customer demand, low product life cycle, and geographically disjointed entities competing to serve customers. Currently, business units are more inclined to maintain minimum inventory to avoid storage problems. Therefore, it has become challenging to predict accurate demand and the level of production process. Blockchain technology has emerged as a game changer, transforming the company's monitoring system, to authenticate and safeguard their transactions. Blockchain technology is a modern internet-based digital ledger system that ensures transparency, efficiency, traceability, and security for easing global supply chain management. The main aim of the present study is to focus on the barriers, constraints, challenges, and limitations to applying blockchain technology in sustainable supply chain management.
Article
Full-text available
With the exponential growth in the number of insecure devices, the impact of Distributed Denial-of-Service (DDoS) attacks is growing rapidly. Existing DDoS mitigation schemes are facing obstacles due to low flexibility, lack of resources and high cost. The new emerging technologies, such as blockchain, introduce new opportunities for low-cost, efficient and flexible DDoS attacks mitigation across multiple domains. In this paper, we propose a blockchain-based approach, called Cochain-SC, which combines two levels of mitigation, intra-domain and inter-domain DDoS mitigation. For intra-domain, we propose an effective DDoS mitigation method in the context of software defined networks (SDN); it consists of 3 schemes: (1) Intra Entropy-based scheme (I-ES) to measure, using sFlow, the randomness of data inside the domain; (2) Intra Bayes-based scheme (I-BS) to classify, based on entropy values, illegitimate flows; and (3) Intra-domain Mitigation (I-DM) scheme to effectively mitigate illegitimate flows inside the domain. For inter-domain, we propose a collaborative DDoS mitigation scheme based on blockchain; it uses the concept of smart contracts (i.e., Ethereum’s smart contracts) to facilitate the collaboration among SDNbased domains (i.e., Autonomous System: AS) to mitigate DDoS attacks. For this aim, we design a novel and secure scheme that allows multiple SDN-based domains to securely collaborate and transfer attack information in a decentralized manner. Combining intra- and inter-domain DDoS mitigation, Cochain-SC allows an efficient mitigation along the path of an ongoing attack and an effective mitigation near the origin of the attack. This allows reducing the enormous cost of forwarding packets, across multiple domains, which consist mostly of useless amplified attack traffic. To the best of our knowledge, Cochain-SC is the first scheme that proposes to deal with both intra-domain and inter-domain DDoS attacks mitigation combining SDN, blockchain and smart contract. The implementation of Cochain-SC is deployed on Ethereum official test network Ropsten. Moreover, we conducted extensive experiments to evaluate our proposed approach; the experimental results show that Cochain-SC achieves flexibility, efficiency, security, cost effectiveness and high accuracy in detecting illegitimate flows, making it a promising approach to mitigate DDoS attacks.
Conference Paper
Full-text available
Risk assessment plays a key role in the information security management of organizations to protect their assets against cyber threats and reduce the risk of attacks to their infrastructures. One key element in the risk assessment process is the determination of the probability of occurrence of elementary attack actions. For that, this paper suggests a novel model which considers vulnerability severities, attack scenarios and various potential actors and their motivations. Based on the results obtained from the new model we further infer the most likely attack scenarios. An SDN-based network infrastructure is taken as an example scenario to demonstrate our new approach.
Conference Paper
Full-text available
In the past decade, the information security and threat landscape has grown significantly making it difficult for a single defender to defend against all attacks at the same time. This called for introducing information sharing, a paradigm in which threat indicators are shared in a community of trust to facilitate defenses. Standards for representation, exchange, and consumption of indicators are proposed in the literature, although various issues are undermined. In this paper, we take the position of rethinking information sharing for actionable intelligence, by highlighting various issues that deserve further exploration. We argue that information sharing can benefit from well-defined use models, threat models, well-understood risk by measurement and robust scoring, well-understood and preserved privacy and quality of indicators and robust mechanism to avoid free riding behavior of selfish agents. We call for using the differential nature of data and community structures for optimizing sharing designs and structures.
Conference Paper
Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains and one of the Hyperledger projects hosted by the Linux Foundation (www.hyperledger.org). Fabric is the first truly extensible blockchain system for running distributed applications. It supports modular consensus protocols, which allows the system to be tailored to particular use cases and trust models. Fabric is also the first blockchain system that runs distributed applications written in standard, general-purpose programming languages, without systemic dependency on a native cryptocurrency. This stands in sharp contrast to existing block-chain platforms that require "smart-contracts" to be written in domain-specific languages or rely on a cryptocurrency. Fabric realizes the permissioned model using a portable notion of membership, which may be integrated with industry-standard identity management. To support such flexibility, Fabric introduces an entirely novel blockchain design and revamps the way blockchains cope with non-determinism, resource exhaustion, and performance attacks. This paper describes Fabric, its architecture, the rationale behind various design decisions, its most prominent implementation aspects, as well as its distributed application programming model. We further evaluate Fabric by implementing and benchmarking a Bitcoin-inspired digital currency. We show that Fabric achieves end-to-end throughput of more than 3500 transactions per second in certain popular deployment configurations, with sub-second latency, scaling well to over 100 peers.
Article
Hyperledger Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains. Fabric is currently used in more than 400 prototypes and proofs-of-concept of distributed ledger technology, as well as several production systems, across different industries and use cases. Starting from the premise that there are no "one-size-fits-all" solutions, Fabric is the first truly extensible blockchain system for running distributed applications. It supports modular consensus protocols, which allows the system to be tailored to particular use cases and trust models. Fabric is also the first blockchain system that runs distributed applications written in general-purpose programming languages, without systemic dependency on a native cryptocurrency. This stands in sharp contrast to existing blockchain platforms for running smart contracts that require code to be written in domain-specific languages or rely on a cryptocurrency. Furthermore, it uses a portable notion of membership for realizing the permissioned model, which may be integrated with industry-standard identity management. To support such flexibility, Fabric takes a novel approach to the design of a permissioned blockchain and revamps the way blockchains cope with non-determinism, resource exhaustion, and performance attacks. This paper describes Fabric, its architecture, the rationale behind various design decisions, its security model and guarantees, its most prominent implementation aspects, as well as its distributed application programming model. We further evaluate Fabric by implementing and benchmarking a Bitcoin-inspired digital currency. We show that Fabric achieves end-to-end throughput of more than 3500 transactions per second in certain popular deployment configurations, with sub-second latency.
Article
Today's cyber attacks require a new line of security defenses. The static approach of traditional security based on heuristic and signature does not match the dynamic nature of new generation of threats that are known to be evasive, resilient and complex. Organizations need to gather and share real-time cyber threat information and to transform it to threat intelligence in order to prevent attacks or at least execute timely disaster recovery. Threat Intelligence (TI) means evidence-based knowledge representing threats that can inform decisions. There is a general awareness for the need of threat intelligence while vendors today are rushing to provide a diverse array of threat intelligence products, specifically focusing on Technical Threat Intelligence (TTI). Although threat intelligence is being increasingly adopted, there is little consensus on what it actually is, or how to use it. Without any real understanding of this need, organizations risk investing large amounts of time and money without solving existing security problems. Our paper aims to classify and make distinction among existing threat intelligence types. We focus particularly on the TTI issues, emerging researches, trends and standards. Our paper also explains why there is a reluctance among organizations to share threat intelligence. We provide sharing strategies based on trust and anonymity, so participating organizations can do away with the risks of business leak. We also show in this paper why having a standardized representation of threat information can improve the quality of TTI, thus providing better automated analytics solutions on large volumes of TTI which are often non-uniform and redundant. Finally, we evaluate most popular open source/free threat intelligence tools, and compare their features with those of a new AlliaCERT TI tool.