ISSN 2394-5125
 

Research Article 


ATTACKS IN BLOCK CHAIN WITH VULNERABILITIES DDOS AND SDN (SOFTWARE DEFINED NETWORK)

Sonali Gupta, AmandeepKaur, Sheilly Padda, Lofty Sahi.

Abstract
Blockchain, sometimes referred to as Distributed Ledger Technology (DLT), makes the history of any digital
asset unalterable and transparent using decentralization and cryptographic hashing. A simple analogy for
understanding blockchain technology is a Google Doc. When we create a document and share it with a group
of people, the document is distributed instead of copied or transferred. This creates a
decentralized distribution chain that gives everyone access to the document at the same time.No one is locked out
awaiting changes from another party, while all modifications to the doc are being recorded in real-time,
making changes completely transparent. Blockchains are decentralized in nature meaning that no single person
or group holds the authority of the overall network. DoS attacks referring to distributed denial of service.
These attacks are very destructive in nature. In this, the hackers use many algorithms to send the request and
increase the traffic on the site till the point it is not able to receive further requests and the site
crashes.The D DoS attack is analogous to a group of people crowding the entry door of a shop,making it hard
for legitimate customers to enter,thus disrupting trade.The incoming traffic originates from different sources so that it
makes it challenging for the management to stop the request by simply blocking the IP address of a
single person.

Key words: Blockchain, Digital Ledger, Security and Privacy, Scalability, Security Threat


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by Sonali Gupta
Articles by AmandeepKaur
Articles by Sheilly Padda
Articles by Lofty Sahi
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

Sonali Gupta, AmandeepKaur, Sheilly Padda, Lofty Sahi. ATTACKS IN BLOCK CHAIN WITH VULNERABILITIES DDOS AND SDN (SOFTWARE DEFINED NETWORK). JCR. 2020; 7(17): 2582-2586. doi:10.31838/jcr.07.17.319


Web Style

Sonali Gupta, AmandeepKaur, Sheilly Padda, Lofty Sahi. ATTACKS IN BLOCK CHAIN WITH VULNERABILITIES DDOS AND SDN (SOFTWARE DEFINED NETWORK). http://www.jcreview.com/?mno=23881 [Access: August 18, 2021]. doi:10.31838/jcr.07.17.319


AMA (American Medical Association) Style

Sonali Gupta, AmandeepKaur, Sheilly Padda, Lofty Sahi. ATTACKS IN BLOCK CHAIN WITH VULNERABILITIES DDOS AND SDN (SOFTWARE DEFINED NETWORK). JCR. 2020; 7(17): 2582-2586. doi:10.31838/jcr.07.17.319



Vancouver/ICMJE Style

Sonali Gupta, AmandeepKaur, Sheilly Padda, Lofty Sahi. ATTACKS IN BLOCK CHAIN WITH VULNERABILITIES DDOS AND SDN (SOFTWARE DEFINED NETWORK). JCR. (2020), [cited August 18, 2021]; 7(17): 2582-2586. doi:10.31838/jcr.07.17.319



Harvard Style

Sonali Gupta, AmandeepKaur, Sheilly Padda, Lofty Sahi (2020) ATTACKS IN BLOCK CHAIN WITH VULNERABILITIES DDOS AND SDN (SOFTWARE DEFINED NETWORK). JCR, 7 (17), 2582-2586. doi:10.31838/jcr.07.17.319



Turabian Style

Sonali Gupta, AmandeepKaur, Sheilly Padda, Lofty Sahi. 2020. ATTACKS IN BLOCK CHAIN WITH VULNERABILITIES DDOS AND SDN (SOFTWARE DEFINED NETWORK). Journal of Critical Reviews, 7 (17), 2582-2586. doi:10.31838/jcr.07.17.319



Chicago Style

Sonali Gupta, AmandeepKaur, Sheilly Padda, Lofty Sahi. "ATTACKS IN BLOCK CHAIN WITH VULNERABILITIES DDOS AND SDN (SOFTWARE DEFINED NETWORK)." Journal of Critical Reviews 7 (2020), 2582-2586. doi:10.31838/jcr.07.17.319



MLA (The Modern Language Association) Style

Sonali Gupta, AmandeepKaur, Sheilly Padda, Lofty Sahi. "ATTACKS IN BLOCK CHAIN WITH VULNERABILITIES DDOS AND SDN (SOFTWARE DEFINED NETWORK)." Journal of Critical Reviews 7.17 (2020), 2582-2586. Print. doi:10.31838/jcr.07.17.319



APA (American Psychological Association) Style

Sonali Gupta, AmandeepKaur, Sheilly Padda, Lofty Sahi (2020) ATTACKS IN BLOCK CHAIN WITH VULNERABILITIES DDOS AND SDN (SOFTWARE DEFINED NETWORK). Journal of Critical Reviews, 7 (17), 2582-2586. doi:10.31838/jcr.07.17.319