{"id":"https://openalex.org/W2980055861","doi":"https://doi.org/10.1109/camad.2019.8858484","title":"Protecting IoTs from Mirai Botnet Attacks Using Blockchains","display_name":"Protecting IoTs from Mirai Botnet Attacks Using Blockchains","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2980055861","doi":"https://doi.org/10.1109/camad.2019.8858484","mag":"2980055861"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/camad.2019.8858484","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028263050","display_name":"Zohaib Ahmed","orcid":null},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"funder","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Zohaib Ahmed","raw_affiliation_strings":["National University of Sciences & Technology (NUST), Islamabad 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"National University of Sciences & Technology (NUST), Islamabad 44000, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032382039","display_name":"Syed Muhammad Danish","orcid":"https://orcid.org/0000-0003-2680-8895"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"funder","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Syed Muhammad Danish","raw_affiliation_strings":["National University of Sciences & Technology (NUST), Islamabad 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"National University of Sciences & Technology (NUST), Islamabad 44000, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080473845","display_name":"Hassaan Khaliq Qureshi","orcid":"https://orcid.org/0000-0003-3042-4050"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"funder","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Hassaan Khaliq Qureshi","raw_affiliation_strings":["National University of Sciences & Technology (NUST), Islamabad 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"National University of Sciences & Technology (NUST), Islamabad 44000, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063814563","display_name":"Marios Lestas","orcid":"https://orcid.org/0000-0002-8418-6329"},"institutions":[{"id":"https://openalex.org/I38552033","display_name":"Frederick University","ror":"https://ror.org/05d8tf882","country_code":"CY","type":"education","lineage":["https://openalex.org/I38552033"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Marios Lestas","raw_affiliation_strings":["Frederick University, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"Frederick University, Nicosia, Cyprus","institution_ids":["https://openalex.org/I38552033"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.286,"has_fulltext":false,"cited_by_count":47,"citation_normalized_percentile":{"value":0.917441,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9953,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9721037}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9721037},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.82230306},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7893003},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7130286},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.7123856},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.64054734},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.63112307},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.62575483},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6017899},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.56814134},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46029672},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.44208062},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4409394},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09806386},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/camad.2019.8858484","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W2612437872","https://openalex.org/W2624744148","https://openalex.org/W2748868501","https://openalex.org/W2768696376","https://openalex.org/W2774161712","https://openalex.org/W2786669173","https://openalex.org/W2801118360","https://openalex.org/W2801215935","https://openalex.org/W2805315705","https://openalex.org/W2806285705","https://openalex.org/W2810652557","https://openalex.org/W2884402032","https://openalex.org/W2894173726","https://openalex.org/W2901081613","https://openalex.org/W2902215642","https://openalex.org/W2907397062","https://openalex.org/W2948041999","https://openalex.org/W2949745073","https://openalex.org/W2964234547"],"related_works":["https://openalex.org/W4285325964","https://openalex.org/W4230824443","https://openalex.org/W3187581118","https://openalex.org/W2929621094","https://openalex.org/W2378449000","https://openalex.org/W2294483539","https://openalex.org/W2292210693","https://openalex.org/W1996006176","https://openalex.org/W1979706594","https://openalex.org/W1966145327"],"abstract_inverted_index":{"The":[0,170,192],"exponential":[1],"growth":[2],"of":[3,5,28,36,52,109,114,123,159,218],"Internet":[4,110],"Things":[6],"(IoT)":[7],"devices":[8,30],"with":[9,150,165],"limited":[10],"computing":[11],"resources":[12],"and":[13,105,143,227,238],"poor":[14],"security":[15,70],"configurations":[16],"make":[17],"them":[18,53],"vulnerable":[19],"to":[20,45,61,103,118,183],"different":[21,90,115,235],"cyber-attacks.":[22],"Mirai":[23,47,72],"Botnet":[24,73],"malware":[25,151],"exploits":[26],"vulnerabilities":[27],"IoT":[29,64,69],"resulting":[31],"in":[32,201],"massive":[33],"Distributed":[34],"Denial":[35],"Service":[37],"(DDoS)":[38],"attacks.":[39],"Various":[40],"techniques":[41],"have":[42,125],"been":[43,126],"proposed":[44,83,141,171,197],"mitigate":[46],"botnet":[48],"attacks,":[49],"but":[50],"most":[51],"are":[54,101],"centralized":[55],"or":[56,152],"just":[57],"provide":[58],"precautionary":[59],"steps":[60],"secure":[62],"the":[63,85,133,137,140,156,163,189,196,206,215,219,228],"devices.":[65],"This":[66],"paper":[67],"addresses":[68,113],"against":[71],"attacks":[74],"using":[75,139],"a":[76,107,146,166,176,185,222],"novel":[77],"blockchain":[78],"based":[79],"architecture.":[80],"In":[81],"our":[82],"approach,":[84],"network":[86,138],"is":[87,98,148,173,181,225,232],"divided":[88],"into":[89],"Autonomous":[91],"Systems":[92],"(AS),":[93],"through":[94],"which":[95,122,180],"host":[96,147,164,208],"connectivity":[97],"established.":[99],"Blockchains":[100],"used":[102,182],"store":[104],"share":[106],"list":[108],"Protocol":[111],"(IP)":[112],"hosts":[116],"connected":[117],"an":[119],"AS,":[120],"indicating":[121],"these":[124],"identified":[127],"as":[128],"malicious.":[129],"Every":[130],"AS":[131,236],"monitors":[132],"communication":[134],"activity":[135],"inside":[136],"approach":[142,172],"determines":[144],"whether":[145],"infected":[149,207],"not":[153,213],"by":[154,162],"comparing":[155],"total":[157],"number":[158],"packets":[160,204],"sent":[161],"specified":[167],"threshold":[168],"value.":[169],"simulated":[174],"on":[175],"custom":[177],"developed":[178],"simulator":[179],"determine":[184],"suitable":[186],"value":[187],"for":[188,234],"malicious":[190,203],"threshold.":[191],"results":[193],"indicate":[194],"that":[195,210],"solution":[198],"works":[199],"effectively":[200],"blocking":[202],"from":[205],"so":[209],"they":[211],"do":[212],"affect":[214],"response":[216],"time":[217],"victim.":[220],"Furthermore,":[221],"scalability":[223],"analysis":[224],"conducted":[226],"block":[229],"propagation":[230],"delay":[231],"evaluated":[233],"sizes":[237],"consensus":[239],"algorithms.":[240]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2980055861","counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":8}],"updated_date":"2025-04-19T09:09:39.487827","created_date":"2019-10-18"}