{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:08:31Z","timestamp":1772554111995,"version":"3.50.1"},"reference-count":75,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>Hyperledger Fabric (HLF) is a leading permissioned blockchain platform designed for enterprise applications. However, it faces significant security risks from Denial-of-Service (DoS) attacks targeting its core components. This study systematically investigated network-level DoS attack vectors against HLF, with a focus on threats to its ordering service, Membership Service Provider (MSP), peer nodes, consensus protocols, and architectural dependencies. In this research, we performed experiments on an HLF test bed to demonstrate how compromised components can be exploited to launch DoS attacks and degrade the performance and availability of the blockchain network. Key attack scenarios included manipulating block sizes to induce latency, discarding blocks to disrupt consensus, issuing malicious certificates via MSP, colluding peers to sabotage validation, flooding external clients to overwhelm resources, misconfiguring Raft consensus parameters, and disabling CouchDB to cripple data access. The experimental results reveal severe impacts on the availability, including increased latency, decreased throughput, and inaccessibility of the ledger. Our findings emphasize the need for proactive monitoring and robust defense mechanisms to detect and mitigate DoS threats. Finally, we discuss some future research directions, including lightweight machine learning tailored to HLF, enhanced monitoring by aggregating logs from multiple sources, and collaboration with industry stakeholders to deploy pilot studies of security-enhanced HLF in operational environments.<\/jats:p>","DOI":"10.3390\/jcp5030039","type":"journal-article","created":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T12:10:31Z","timestamp":1751285431000},"page":"39","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Denial-of-Service Attacks on Permissioned Blockchains: A Practical Study"],"prefix":"10.3390","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9358-6834","authenticated-orcid":false,"given":"Mohammad","family":"Pishdar","sequence":"first","affiliation":[{"name":"CoinFa Research Lab, Tehran 11369, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0781-6503","authenticated-orcid":false,"given":"Yixing","family":"Lei","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Galway, H91 TK33 Galway, Ireland"}]},{"given":"Khaled","family":"Harfoush","sequence":"additional","affiliation":[{"name":"School of Computer Science, North Carolina State University, Raleigh, NC 27606, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1541-0972","authenticated-orcid":false,"given":"Jawad","family":"Manzoor","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Galway, H91 TK33 Galway, Ireland"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"key":"ref_1","unstructured":"Buterin, V. (2025, June 19). A Next-Generation Smart Contract and Decentralized Application Platform Ethereum White Paper; Ethereum: 2014. Available online: https:\/\/ethereum.org\/en\/whitepaper."},{"key":"ref_2","unstructured":"Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System, Quill Publishing."},{"key":"ref_3","unstructured":"King, S., and Nadal, S. (2012). Ppcoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake, Procon Ltd.. Self-Published Paper, August."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D., and Pustogarov, I. (2014, January 3\u20137). Deanonymisation of clients in Bitcoin P2P network. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA.","DOI":"10.1145\/2660267.2660379"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Xu, X., Weber, I., Staples, M., Zhu, L., Bosch, J., Bass, L., Pautasso, C., and Rimba, P. (2017, January 3\u20137). A taxonomy of blockchain-based systems for architecture design. Proceedings of the 2017 IEEE International Conference on Software Architecture (ICSA), Gothenburg, Sweden.","DOI":"10.1109\/ICSA.2017.33"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"164908","DOI":"10.1109\/ACCESS.2019.2950872","article-title":"Privacy-preserving solutions for blockchain: Review and challenges","volume":"7","author":"Bernabe","year":"2019","journal-title":"IEEE Access"},{"key":"ref_7","unstructured":"Anglen, J. (2025, April 09). Enterprise Blockchain Guide: Transformative Use Cases and Implementation Strategies. Available online: https:\/\/www.rapidinnovation.io\/post\/blockchain-in-enterprise-use-cases-and-implementation."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","article-title":"Blockchain challenges and opportunities: A survey","volume":"14","author":"Zheng","year":"2018","journal-title":"Int. J. Web Grid Serv."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"96538","DOI":"10.1109\/ACCESS.2022.3205019","article-title":"A Comprehensive Review of Denial of Service Attacks in Blockchain Ecosystem and Open Challenges","volume":"10","author":"Chaganti","year":"2022","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Mirkin, M., Ji, Y., Pang, J., Klages-Mundt, A., Eyal, I., and Juels, A. (2020, January 9\u201313). Bdos: Blockchain denial-of-service. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event.","DOI":"10.1145\/3372297.3417247"},{"key":"ref_11","unstructured":"Yaish, A., Qin, K., Zhou, L., Zohar, A., and Gervais, A. (2024, January 14\u201316). Speculative {Denial-of-Service} Attacks In Ethereum. Proceedings of the 33rd USENIX Security Symposium (USENIX Security 24), Philadelphia, PA, USA."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"170309","DOI":"10.1109\/ACCESS.2024.3499350","article-title":"A Denial-of-Service Attack Based on Selfish Mining and Sybil Attack in Blockchain Systems","volume":"12","author":"Zhang","year":"2024","journal-title":"IEEE Access"},{"key":"ref_13","unstructured":"IBM (2025, May 25). IBM Food Trust\u2014Food Logistics on Blockchain. Available online: https:\/\/www.ibm.com\/docs\/en\/food-trust?topic=overview."},{"key":"ref_14","unstructured":"Vitasek, K., Bayliss, J., Owen, L., and Srivastava, N. (2025, June 19). How Walmart Canada Uses Blockchain to Solve Supply-Chain Challenges. Available online: https:\/\/hbr.org\/2022\/01\/how-walmart-canada-uses-blockchain-to-solve-supply-chain-challenges."},{"key":"ref_15","unstructured":"Hurley, D. (2025, May 25). Blockchain for Patient and HCP Data Rights Management: Lessons from an Enterprise Install. Telehealth and Medicine Today. Available online: https:\/\/telehealthandmedicinetoday.com\/index.php\/journal\/article\/view\/125."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Thakkar, P., Nathan, S., and Viswanathan, B. (2018, January 25\u201328). Performance benchmarking and optimizing hyperledger fabric blockchain platform. Proceedings of the 2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Milwaukee, WI, USA.","DOI":"10.1109\/MASCOTS.2018.00034"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3335","DOI":"10.1109\/TIFS.2022.3202696","article-title":"SDoS: Selfish mining-based denial-of-service attack","volume":"17","author":"Wang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_18","unstructured":"Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., and Danezis, G. (2019, January 21\u201323). SoK: Consensus in the age of blockchains. Proceedings of the 1st ACM Conference on Advances in Financial Technologies, Zurich, Switzerland."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1007\/s12083-019-00850-z","article-title":"Performance analysis of Hyperledger Fabric platform: A hierarchical model approach","volume":"13","author":"Jiang","year":"2020","journal-title":"Peer-Netw. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Putz, B., and Pernul, G. (2019). Trust Factors and Insider Threats in Permissioned Distributed Ledgers: An Analytical Study and Evaluation of Popular DLT Frameworks. Transactions on Large-Scale Data-and Knowledge-Centered Systems XLII, Springer.","DOI":"10.1007\/978-3-662-60531-8_2"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Wang, C., and Chu, X. (December, January 29). Performance characterization and bottleneck analysis of hyperledger fabric. Proceedings of the 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), Singapore.","DOI":"10.1109\/ICDCS47774.2020.00165"},{"key":"ref_22","unstructured":"De Angelis, S., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., and Sassone, V. (2018, January 18). PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain. Proceedings of the CEUR Workshop Proceedings, CEUR-WS, Torino, Italy."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., and Manevich, Y. (2018, January 23\u201326). Hyperledger fabric: A distributed operating system for permissioned blockchains. Proceedings of the Thirteenth EuroSys Conference (EuroSys \u201918), Porto, Portugal.","DOI":"10.1145\/3190508.3190538"},{"key":"ref_24","first-page":"14","article-title":"Corda: An introduction","volume":"1","author":"Brown","year":"2016","journal-title":"R3 CEV August"},{"key":"ref_25","unstructured":"(2025, April 09). J.P. Morgan Chase. Quorum Whitepaper v0.2. Available online: https:\/\/github.com\/Consensys\/quorum\/blob\/master\/docs\/Quorum%20Whitepaper%20v0.2.pdf."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H. (2017, January 25\u201330). An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA.","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref_27","unstructured":"Groopman, J. (2025, April 09). Permissioned vs. Permissionless Blockchains: Key Differences. Published by TechTarget. Available online: https:\/\/www.techtarget.com\/searchcio\/tip\/Permissioned-vs-permissionless-blockchains-Key-differences."},{"key":"ref_28","unstructured":"Toumia, S.B., Berger, C., and Reiser, H.P. (2021). Evaluating blockchain application requirements and their satisfaction in Hyperledger Fabric. arXiv."},{"key":"ref_29","unstructured":"Hyperledger Fabric Documentation (2025, April 10). Fabric CA User\u2019s Guide. Available online: https:\/\/hyperledger-fabric-ca.readthedocs.io\/en\/latest\/users-guide.html."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"032022","DOI":"10.1088\/1742-6596\/1802\/3\/032022","article-title":"Research on practical byzantine fault tolerant consensus algorithm based on blockchain","volume":"1802","author":"Zheng","year":"2021","journal-title":"J. Phy. Conf. Ser."},{"key":"ref_31","unstructured":"Ongaro, D., and Ousterhout, J. (2014, January 19\u201320). In search of an understandable consensus algorithm. Proceedings of the 2014 USENIX annual technical conference (USENIX ATC 14), Philadelphia, PA, USA."},{"key":"ref_32","unstructured":"Kreps, J., Narkhede, N., and Rao, J. (2011, January 12\u201316). Kafka: A distributed messaging system for log processing. Proceedings of the NetDB, Athens, Greece."},{"key":"ref_33","unstructured":"Hyperledger Fabric Documentation (2025, April 10). Writing Your First Chaincode. Available online: https:\/\/hyperledger-fabric.readthedocs.io\/en\/latest\/chaincode4ade.html."},{"key":"ref_34","unstructured":"Hyperledger Fabric Documentation (2025, April 10). Transaction Flow. Available online: https:\/\/hyperledger-fabric.readthedocs.io\/en\/latest\/txflow.html."},{"key":"ref_35","unstructured":"Hyperledger Fabric Documentation (2025, April 10). CouchDB as the State Database. Available online: https:\/\/hyperledger-fabric.readthedocs.io\/en\/latest\/couchdb_as_state_database.html."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Dabholkar, A., and Saraswat, V. (2019, January 22\u201324). Ripping the fabric: Attacks and mitigations on hyperledger fabric. Proceedings of the Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, Thanjavur, India.","DOI":"10.1007\/978-981-15-0871-4_24"},{"key":"ref_37","unstructured":"Carlos, D., and Urmila, N. (2021). Hyperledger Fabric 2.0 Architecture Security Report, Cloud Security Alliance. Technical Report."},{"key":"ref_38","unstructured":"Jayadev, V., Moradpoor, N., and Petrovski, A. (August, January 30). Assessing the Performance of Ethereum and Hyperledger Fabric Under DDoS Attacks for Cyber-Physical Systems. Proceedings of the 19th International Conference on Availability, Reliability and Security, Vienna, Austria."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Giuliari, G., Sonnino, A., Frei, M., Streun, F., Kokoris-Kogias, L., and Perrig, A. (2024, January 1\u20135). An empirical study of consensus protocols\u2019 dos resilience. Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, Singapore.","DOI":"10.1145\/3634737.3656997"},{"key":"ref_40","unstructured":"Rasolroveicy, M., and Fokaefs, M. (2022, January 15\u201317). Impact of DDoS Attacks on the Performance of Blockchain Consensus as an loT Data Registry: An Empirical Study. Proceedings of the CASCON, Toronto, ON, Canada."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Battisti, J.H., Batista, V.E., Koslovski, G.P., Pillon, M.A., Miers, C.C., Marques, M.A., Simpl\u00edcio, M., and Kreutz, D. (2023, January 4\u20136). Performance analysis of the Raft consensus algorithm on Hyperledger Fabric and Ethereum on cloud. Proceedings of the 2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Naples, Italy.","DOI":"10.1109\/CloudCom59040.2023.00035"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/3529113.3529134","article-title":"Efficient and DoS-resistant consensus for permissioned blockchains","volume":"49","author":"Chen","year":"2022","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"101050","DOI":"10.1016\/j.pmcj.2019.101050","article-title":"Vulnerabilities on hyperledger fabric","volume":"59","author":"Andola","year":"2019","journal-title":"Pervasive Mob. Comput."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Nie, Y., He, X.W., Cai, W.L., and Liu, Z.H. (2021, January 11\u201313). Improve the security of Hyperledger Fabric by dynamically selecting endorsing peers. Proceedings of the 2021 6th International Symposium on Computer and Information Processing Technology (ISCIPT), Changsha, China.","DOI":"10.1109\/ISCIPT53667.2021.00139"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Zheng, S., Yin, C., and Wu, B. (October, January 30). Malicious Conspiracy on Permissioned Blockchain to Mount Denial-of-endorsement Attacks. Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom), New York, NY, USA.","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00217"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"102674","DOI":"10.1016\/j.simpat.2022.102674","article-title":"Joint modeling of hyperledger fabric and sybil attack: Petri net approach","volume":"122","author":"Kumar","year":"2023","journal-title":"Simul. Model. Pract. Theory"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1109\/TDSC.2024.3428549","article-title":"Manipulated Transaction Collision Attack on Execute-Order-Validate Blockchain","volume":"22","author":"Zhang","year":"2024","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"5692820","DOI":"10.1155\/2022\/5692820","article-title":"A DDoS-Attack Detection Method Oriented to the Blockchain Network Layer","volume":"2022","author":"Dai","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Li, C., Huo, D., Wang, Y., Wang, S., Deng, Y., Zhou, Q., and Wang, Y. (2024, January 8\u201310). A deep learning based detection scheme towards DDos Attack in permissioned blockchains. Proceedings of the 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Tianjin, China.","DOI":"10.1109\/CSCWD61410.2024.10580421"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Chen, D., Lin, J., and Lu, Z. (2024, January 6\u20138). Static Analysis Detection of Hyperledger Fabric Read-Write Logic Vulnerability. Proceedings of the Blockchain and Web3 Technology Innovation and Application Exchange Conference, Guangzhou, China.","DOI":"10.1007\/978-981-97-9412-6_13"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Chiras, A., Peratikou, A., and Stavrou, S. (2024, January 28\u201329). Increasing Security of Containerized Blockchain using SDN. Proceedings of the 2024 Panhellenic Conference on Electronics & Telecommunications (PACET), Thessaloniki, Greece.","DOI":"10.1109\/PACET60398.2024.10497057"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Putz, B., and Pernul, G. (2020, January 2\u20136). Detecting Blockchain Security Threats. Proceedings of the 2020 IEEE International Conference on Blockchain (Blockchain), Rhodes, Greece.","DOI":"10.1109\/Blockchain50366.2020.00046"},{"key":"ref_53","unstructured":"Vulert Security Database (2025, April 11). Denial of Service in Hyperledger Fabric Peer. Available online: https:\/\/vulert.com\/vuln-db\/bitnami-hyperledger-fabric-peer-146139."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Melo, C., Gon\u00e7alves, G., Silva, F.A., and Soares, A. (2024, January 26\u201329). Performance Modeling and Evaluation of Hyperledger Fabric: An Analysis Based on Transaction Flow and Endorsement Policies. Proceedings of the 2024 IEEE Symposium on Computers and Communications (ISCC), Paris, France.","DOI":"10.1109\/ISCC61673.2024.10733701"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Bappy, F.H., Islam, T., Hasan, K., Park, J.S., and Caicedo, C. (2024, January 8\u201312). Impact of Conflicting Transactions in Blockchain: Detecting and Mitigating Potential Attacks. Proceedings of the GLOBECOM 2024\u20142024 IEEE Global Communications Conference, Cape Town, South Africa.","DOI":"10.1109\/GLOBECOM52923.2024.10901049"},{"key":"ref_56","unstructured":"Hyperledger Fabric Documentation (2025, April 10). Membership Service Provider (MSP). Available online: https:\/\/hyperledger-fabric.readthedocs.io\/en\/latest\/membership\/membership.html."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Dey, S. (2018, January 19\u201321). Securing Majority-Attack in Blockchain Using Machine Learning and Algorithmic Game Theory: A Proof of Work. Proceedings of the 2018 10th Computer Science and Electronic Engineering (CEEC), Colchester, UK.","DOI":"10.1109\/CEEC.2018.8674185"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Brotsis, S., Kolokotronis, N., Limniotis, K., Bendiab, G., and Shiaeles, S. (2020, January 18\u201323). On the security and privacy of hyperledger fabric: Challenges and open issues. Proceedings of the 2020 IEEE World Congress on Services (SERVICES), Beijing, China.","DOI":"10.1109\/SERVICES48979.2020.00049"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/TSMC.2019.2895471","article-title":"Performance analysis of the raft consensus algorithm for private blockchains","volume":"50","author":"Huang","year":"2019","journal-title":"IEEE Trans. Syst. Man, Cybern. Syst."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Wang, S., Yang, M., Zhang, Y., Luo, Y., Ge, T., Fu, X., and Zhao, W. (2021, January 7\u201310). On private data collection of hyperledger fabric. Proceedings of the 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), Washington, DC, USA.","DOI":"10.1109\/ICDCS51616.2021.00083"},{"key":"ref_61","unstructured":"National Vulnerability Database (2025, April 15). CVE-2022-24706, Available online: https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-24706."},{"key":"ref_62","unstructured":"National Vulnerability Database (2025, April 15). CVE-2017-12635, Available online: https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-12635."},{"key":"ref_63","unstructured":"National Vulnerability Database (2025, April 15). CVE-2018-11769, Available online: https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-11769."},{"key":"ref_64","first-page":"189","article-title":"On the impact of denial-of-service attacks against Hyperledger Fabric","volume":"139","author":"Anglano","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_65","unstructured":"Ramos, J.F., Cumba, H.L., Camargo, J.R., and Penha, R.G. (2020, January 18\u201320). Analysis of vulnerabilities in permissioned blockchain platforms: A case study with Hyperledger Fabric. Proceedings of the 2020 IEEE Latin-American Conference on Communications (LATINCOM), Virtual Conference."},{"key":"ref_66","unstructured":"Hyperledger Fabric (2025, June 12). Remote Denial of Service in Hyperledger Fabric Gateway. Available online: https:\/\/github.com\/hyperledger\/fabric\/security\/advisories\/GHSA-qj6r-fhrc-jj5r."},{"key":"ref_67","unstructured":"uptycs (2025, June 12). The Foundations of Hybrid Cloud Security. Available online: https:\/\/www.uptycs.com\/blog\/foundations-of-hybrid-cloud-security."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Hua, S., Zhang, S., Pi, B., Sun, J., Yamashita, K., and Nomura, Y. (2020, January 3\u20136). Reasonableness discussion and analysis for Hyperledger Fabric configuration. Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada.","DOI":"10.1109\/ICBC48266.2020.9169444"},{"key":"ref_69","unstructured":"Tenable (2025, June 12). CouchDB Privilege Escalation. Available online: https:\/\/www.tenable.com\/plugins\/nessus\/182208."},{"key":"ref_70","first-page":"tyaa015","article-title":"Cybersecurity Research Ethics: A Taxonomy of Issues for Research Design","volume":"6","author":"Rauchberger","year":"2020","journal-title":"J. Cybersecur."},{"key":"ref_71","unstructured":"Hyperledger Fabric Documentation (2025, April 10). Using configtx.yaml to Build a Channel Configuration. Available online: https:\/\/hyperledger-fabric.readthedocs.io\/en\/latest\/create_channel\/create_channel_config.html."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"3879","DOI":"10.1109\/TSC.2023.3293724","article-title":"BlockMeter: An Application Agnostic Performance Measurement Framework for Private Blockchain Platforms","volume":"16","author":"Alom","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_73","unstructured":"Extropy Research (2025, April 11). Attack Surfaces of Hyperledger Fabric. Available online: https:\/\/cosimo.gitbook.io\/ethereum-security\/blockchain-misc\/attack-surfaces-of-hyperledger-fabric."},{"key":"ref_74","unstructured":"Hyperledger Fabric Documentation (2025, April 10). Configuring and Operating a Raft Ordering Service. Available online: https:\/\/hyperledger-fabric.readthedocs.io\/en\/latest\/raft_configuration.html."},{"key":"ref_75","unstructured":"Nguyen, M.Q., Loghin, D., and Dinh, T.T.A. (2021). Understanding the scalability of Hyperledger Fabric. arXiv."}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/5\/3\/39\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:02:08Z","timestamp":1760032928000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/5\/3\/39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":75,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["jcp5030039"],"URL":"https:\/\/doi.org\/10.3390\/jcp5030039","relation":{},"ISSN":["2624-800X"],"issn-type":[{"value":"2624-800X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,30]]}}}