Research Article
A DDoS-Attack Detection Method Oriented to the Blockchain Network Layer
Table 2
Comparative results of model detection under different data flow samples on the blockchain network layer.
| Sample number | CMCNN model | Baek scheme | Essaid scheme | Recall | ACC | F1-score | Test time (s) | Recall | ACC | F1-score | Test time (s) | Recall | ACC | F1-score | Test time (s) |
| 1000 | 0.8592 | 0.855 | 0.8961 | 6.4 | 0.8211 | 0.7925 | 0.8566 | 3.7 | 0.8712 | 0.8415 | 0.8672 | 4.3 | 5000 | 0.8951 | 0.8956 | 0.927 | 24.5 | 0.8427 | 0.8324 | 0.8824 | 17.5 | 0.9006 | 0.8712 | 0.8953 | 16.4 | 10000 | 0.9211 | 0.9086 | 0.9387 | 44.5 | 0.8512 | 0.8499 | 0.9004 | 32.8 | 0.9095 | 0.8716 | 0.9001 | 34.7 | 15000 | 0.952 | 0.9342 | 0.9562 | 85.4 | 0.8977 | 0.8873 | 0.9253 | 74.6 | 0.9128 | 0.8921 | 0.9172 | 63.4 | 20000 | 0.9604 | 0.9481 | 0.9662 | 146.2 | 0.9289 | 0.9175 | 0.9442 | 161.2 | 0.9185 | 0.8981 | 0.9217 | 149.2 | 25000 | 0.9709 | 0.958 | 0.973 | 220.7 | 0.9351 | 0.9215 | 0.9486 | 237.5 | 0.9287 | 0.92 | 0.944 | 214.4 | 30000 | 0.9811 | 0.9716 | 0.9827 | 280.6 | 0.9568 | 0.9327 | 0.8566 | 322 | 0.9491 | 0.9264 | 0.9501 | 330.7 |
|
|