Sinkron : Jurnal dan Penelitian Teknik Informatika
Vol. 10 No. 1 (2026): Article Research January 2026

Blockchain and SVM Integration for Distributed DDoS Attack Detection

Hia, Septua Ginta Putra (Unknown)
Hayati, Nur (Unknown)
Hindarto, Djarot (Unknown)
Sani, Asrul (Unknown)



Article Info

Publish Date
03 Jan 2026

Abstract

Rapid developments in information technology have increased dependence on network services, but have also triggered an increase in cyber threats such as Distributed Denial of Service (DDoS). These attacks can paralyze systems by flooding servers with simultaneous fake traffic. Conventional rule-based detection methods are now less effective in dealing with dynamic attack patterns, requiring an adaptive approach based on machine learning. This research develops a Support Vector Machine (SVM) model enhanced with Blockchain technology to improve accuracy and data security in detecting DDoS attacks. The dataset used is CICDDoS2023 from the Canadian Institute for Cybersecurity, which contains various variants of modern DDoS attacks. The research stages include data pre-processing, training the SVM model using the RBF kernel, and integrating Blockchain with training data hash recording through a smart contract using Remix Ethereum to ensure data integrity. Performance evaluation was carried out using accuracy, precision, recall, and F1-score metrics based on the confusion matrix results. The integration of SVM and Blockchain showed an increase in security and detection accuracy compared to conventional SVM models. This approach not only improves the reliability of the DDoS attack detection system, but also creates a transparent and tamper-proof data validation mechanism. The research results are expected to contribute to the development of adaptive, decentralized network security systems with a high level of confidence in attack detection results.

Copyrights © 2026






Journal Info

Abbrev

sinkron

Publisher

Subject

Computer Science & IT

Description

Scope of SinkrOns Scientific Discussion 1. Machine Learning 2. Cryptography 3. Steganography 4. Digital Image Processing 5. Networking 6. Security 7. Algorithm and Programming 8. Computer Vision 9. Troubleshooting 10. Internet and E-Commerce 11. Artificial Intelligence 12. Data Mining 13. Artificial ...