Research Article
A DDoS-Attack Detection Method Oriented to the Blockchain Network Layer
Table 4
Detection efficiencies over different attacks under different ratios of DDoS-attack traffic on the blockchain network layer.
| Attack ratio (%) | TCP flood | UDP flood | ICMP | Redundancy P2P | Rumour | Precision | Recall | F1-score | Precision | Recall | F1-score | Precision | Recall | F1-score | Precision | Recall | F1-score | Precision | Recall | F1-score |
| 10 | 90.9 | 73.4 | 81.2 | 94.4 | 69.4 | 80 | 96.7 | 80.3 | 87.7 | 97.4 | 67.4 | 79.7 | 93.4 | 78.1 | 85.1 | 20 | 91.2 | 79.7 | 85.1 | 95.2 | 73.6 | 83 | 95.8 | 83.7 | 89.3 | 96.8 | 75.3 | 84.7 | 93.8 | 83.4 | 88.3 | 30 | 92.7 | 85.6 | 89.0 | 95.5 | 79.2 | 86.6 | 95.4 | 89.6 | 92.4 | 95.3 | 82.5 | 88.4 | 94.2 | 85.6 | 89.7 | 40 | 93.3 | 90.2 | 91.7 | 95.3 | 84.1 | 89.4 | 95.2 | 91.4 | 93.3 | 96.4 | 87.3 | 91.6 | 94.7 | 87.1 | 90.6 | 50 | 95.4 | 93.5 | 94.4 | 94.8 | 88.5 | 91.5 | 94.8 | 94.9 | 94.8 | 96.5 | 91.2 | 93.8 | 95.7 | 90.5 | 92.8 |
|
|