A BLOCKCHAIN-DRIVEN ALGORITHM FOR ANOMALY DETECTION IN IPV6 NETWORK TRAFFIC
Volume 2, Issue 3, Pp 1-4, 2024
DOI: https://doi.org/10.61784/wjit3007
Author(s)
YuXin Li
Affiliation(s)
Jiangxi Normal University (JIANGXI NORMAL UNIVERSITY), Nanchang 330022, Jiangxi,China.
Corresponding Author
YuXin Li
ABSTRACT
As the deployment of IPv6 networks continues to expand, managing security threats becomes increasingly intricate due to the protocol’s extensive address space and dynamic traffic patterns. This paper presents a novel blockchain-driven decentralized anomaly detection algorithm designed explicitly for IPv6 networks. By leveraging the inherent properties of blockchain—immutability, transparency, and decentralization—our approach enhances security monitoring capabilities. Integrating traffic analysis with a distributed ledger facilitates improved accuracy in anomaly detection and robust resilience against distributed denial-of-service (DDoS) attacks and other threats. Experimental evaluations conducted in a simulated IPv6 environment demonstrate that the proposed methodology outperforms traditional centralized detection systems, significantly improving detection accuracy, attack mitigation, and data integrity.
KEYWORDS
IPv6 networks; Blockchain-driven security; Anomaly detection algorithm; Decentralized monitoring; DDoS attack resilience
CITE THIS PAPER
YuXin Li. A blockchain-driven algorithm for anomaly detection in IPv6 network traffic. World Journal of Information Technology. 2024, 2(3): 1-4. DOI: https://doi.org/10.61784/wjit3007.
REFERENCES
[1] Zhang Y, Kasahara S, Shen Y, et al. Smart Contract-Based Access Control for the Internet of Things. IEEE IoT Journal, 2018, 6(2): 1594-1605.
[2] Lee I, Lee K. Internet of Things (IoT) Security: Threats and Solutions. IEEE Access, 2020, 8: 25786-25805.
[3] Mirkin B. Clustering for Data Mining: A Data Recovery Approach. Chapman and Hall/CRC, 2005.
[4] Chen Y, Zhang Z, Lin Y. Security and Privacy Issues of the Internet of Things: A Survey. IEEE Internet of Things Journal, 2020, 7(4): 2951-2969.
[5] He S, Zhang Y, Yang L. Advanced Anomaly Detection for IPv6 Traffic. IEEE Transactions on Information Forensics and Security, 2021, 16: 2744-2757.
[6] Patel D, Mistry K, Patel P. IPv6 Network Traffic Analysis: A Survey. International Journal of Computer Applications, 2019, 975, 8887.
[7] Krawczyk H, Bellare M. HMAC: Keyed-Hashing for Message Authentication. RFC 2104, 1997.
[8] Yang S, et al. Blockchain-based Network Intrusion Detection System in IPv6 Networks. Journal of Information Security and Applications, 2019, 45: 87-97.
[9] Sharafaldin I, Lashkari A H, Ghor-bani A A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP), 2018: 108-116.
[10] Zhou H, Xiong Y, Zhang Y. Blockchain-Based Security Management in IoT: A Survey. IEEE Communications Surveys & Tutorials, 2021, 23(2): 1242-1265.