. Akamai, How to Protect Against DDoS Attacks -Stop Denial of Service. https:// www.akamai.com/us/en/resources/protect-against-ddos-attacks.jsp (2016), [Online, pp.2017-2018

T. Bocek and B. Stiller, Smart Contracts ??? Blockchains in the Wings, pp.1-16, 2017.
DOI : 10.1007/978-3-662-49275-8_19

. Cloudfare, Cloudflare advanced ddos protection (2016), https

N. N. Dao, J. Park, M. Park, and S. Cho, A feasible method to combat against ddos attack in sdn network, 2015 International Conference on Information Networking (ICOIN), pp.309-311, 2015.

L. Dridi and M. F. Zhani, SDN-Guard: DoS Attacks Mitigation in SDN Networks, 2016 5th IEEE International Conference on Cloud Networking (Cloudnet), pp.212-217, 2016.
DOI : 10.1109/CloudNet.2016.9

E. Fund, Ether unit converter, 2016.

M. Jonker, A. Sperotto, R. Van-rijswijk-deij, R. Sadre, and A. Pras, Measuring the Adoption of DDoS Protection Services, Proceedings of the 2016 ACM on Internet Measurement Conference, IMC '16, 2016.
DOI : 10.1109/JSAC.2016.2558918

R. Kandoi and M. Antikainen, Denial-of-service attacks in OpenFlow SDN networks, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.2015-1322, 2015.
DOI : 10.1109/INM.2015.7140489

D. Kreutz, F. M. Ramos, P. E. Verissimo, C. E. Rothenberg, S. Azodolmolky et al., Software-Defined Networking: A Comprehensive Survey, Proceedings of the IEEE, vol.103, issue.1, pp.14-76, 2015.
DOI : 10.1109/JPROC.2014.2371999

URL : http://arxiv.org/pdf/1406.0440

S. Mansfield-devine, The growth and evolution of DDoS, Network Security, vol.2015, issue.10, pp.13-20, 2015.
DOI : 10.1016/S1353-4858(15)30092-1

N. Mckeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson et al., OpenFlow, ACM SIGCOMM Computer Communication Review, vol.38, issue.2, pp.69-74, 2008.
DOI : 10.1145/1355734.1355746

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.

K. Nishizuka, L. Xia, J. Xia, D. Zhang, L. Fang et al., Inter-organization cooperative ddos protection mechanism, Draft, 2016.

T. Peng, C. Leckie, and K. Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems, ACM Computing Surveys, vol.39, issue.1, p.3, 2007.
DOI : 10.1145/1216370.1216373

B. Rashidi and C. Fung, CoFence: A collaborative DDoS defence using network function virtualization, 2016 12th International Conference on Network and Service Management (CNSM), 2016.
DOI : 10.1109/CNSM.2016.7818412

R. Sahay, G. Blanc, Z. Zhang, and H. Debar, Towards Autonomic DDoS Mitigation using Software Defined Networking, Proceedings 2015 Workshop on Security of Emerging Networking Technologies, 2015.
DOI : 10.14722/sent.2015.23004

URL : https://hal.archives-ouvertes.fr/hal-01257899

S. Scott-hayward, G. O-'callaghan, and S. Sezer, Sdn Security: A Survey, 2013 IEEE SDN for Future Networks and Services (SDN4FNS), pp.1-7, 2013.
DOI : 10.1109/SDN4FNS.2013.6702553

URL : https://pure.qub.ac.uk/ws/files/16233680/SDNSecuritySurvey_Final.pdf

S. Shin and G. Gu, Attacking software-defined networks, Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, HotSDN '13, pp.165-166, 2013.
DOI : 10.1145/2491185.2491220

J. Steinberger, B. Kuhnert, A. Sperotto, H. Baier, and A. Pras, Collaborative DDoS defense using flow-based security event information, NOMS 2016, 2016 IEEE/IFIP Network Operations and Management Symposium, pp.516-522, 2016.
DOI : 10.1109/NOMS.2016.7502852

T. Velauthapillai, A. Harwood, and S. Karunasekera, Global detection of floodingbased ddos attacks using a cooperative overlay network, Network and System Security (NSS) 4th International Conference on, pp.357-364, 2010.
DOI : 10.1109/nss.2010.68

L. Wei and C. Fung, FlowRanger: A request prioritizing algorithm for controller DoS attacks in Software Defined Networks, 2015 IEEE International Conference on Communications (ICC), pp.5254-5259, 2015.
DOI : 10.1109/ICC.2015.7249158

G. Wood, Ethereum: A secure decentralised generalised transaction ledger, p.7, 2016.

G. Zhang and M. Parashar, Cooperative defence against ddos attacks, Journal of Research and Practice in Information Technology, vol.38, issue.1, pp.69-84, 2006.