Visible to the public Implementation of Blockchain Based Distributed Web Attack Detection Application

TitleImplementation of Blockchain Based Distributed Web Attack Detection Application
Publication TypeConference Paper
Year of Publication2019
AuthorsTanrıverdi, Mustafa, Tekerek, Adem
Conference Name2019 1st International Informatics and Software Engineering Conference (UBMYK)
Date Publishednov
Keywordsblockchain, blockchain based web attack detection model, Co, command injection attacks, composability, cryptography, Distributed databases, firewalls, Internet, Metrics, pubcrawl, reliability, resilience, Resiliency, signature based detection, signature based detection method, smart contracts, Stakeholders, web application firewalls, Web attack detection, web attack detection application, Web platforms, Web servers, web-based attacks
AbstractIn last decades' web application security has become one of the most important case study of information security studies. Business processes are transferred to web platforms. So web application usage is increased very fast. Web-based attacks have also increased due to the increased use of web applications. In order to ensure the security of web applications, intrusion detection and prevention systems and web application firewalls are used against web based attacks. Blockchain technology, which has become popular in recent years, enables reliable and transparent sharing of data with all stakeholders. In this study, in order to detect web-based attacks, a blockchain based web attack detection model that uses the signature based detection method is proposed. The signature based detection refers to the detection of attacks by looking for specific patterns against known web based attack types, such as Structured Query Language (SQL) Injection, Cross Site Scripting (XSS), Command Injection. Three web servers were used for the experimental study. A blockchain node has been installed with the MultiChain application for each server. Attacks on web applications are detected using the signature list found in the web application as well as detected using the signature list updated on the blockchain. According to the experimental results, the attacks signature detected and defined by a web application are updated in the blockchain lists and used by all web applications.
Citation Keytanriverdi_implementation_2019