You are on page 1of 1

In an attack scenario Ethereum Virtual machine use to multiple domains to invoke functions

Or operating to trusted IP addresses of an attack.The security policies depends on IP addresses whitelist


or blacklist in particular domain.Developed the smart contracts using both types of lists.Use of a gossip-
based protocol on design and standardization to reduce the complexity of storage infrastructure.IETF
proposal are the high level comparison an existing infrastructure of blockchain and smart contracts. This
proposal worked only a significant number of attacks.This approach can costly when the attacks are the
large number. This architecture low when the data stored in smart contract by using IP
addressing.Multiple domains use to enable DDoS mitigation and architecture of smart contracts.  

You might also like