Research Article

A DDoS-Attack Detection Method Oriented to the Blockchain Network Layer

Table 2

Comparative results of model detection under different data flow samples on the blockchain network layer.

Sample numberCMCNN modelBaek schemeEssaid scheme
RecallACCF1-scoreTest time (s)RecallACCF1-scoreTest time (s)RecallACCF1-scoreTest time (s)

10000.85920.8550.89616.40.82110.79250.85663.70.87120.84150.86724.3
50000.89510.89560.92724.50.84270.83240.882417.50.90060.87120.895316.4
100000.92110.90860.938744.50.85120.84990.900432.80.90950.87160.900134.7
150000.9520.93420.956285.40.89770.88730.925374.60.91280.89210.917263.4
200000.96040.94810.9662146.20.92890.91750.9442161.20.91850.89810.9217149.2
250000.97090.9580.973220.70.93510.92150.9486237.50.92870.920.944214.4
300000.98110.97160.9827280.60.95680.93270.85663220.94910.92640.9501330.7