Cargando…

A security testing mechanism for detecting attacks in distributed software applications using blockchain

Distributed software applications are one of the most important applications currently used. Rising demand has led to a rapid increase in the number and complexity of distributed software applications. Such applications are also more vulnerable to different types of attacks due to their distributed...

Descripción completa

Detalles Bibliográficos
Autores principales: Algarni, Abdullah, Attaallah, Abdulaziz, Eassa, Fathi, Khemakhem, Maher, Jambi, Kamal, Aljihani, Hosam, Almarhabi, Khalid, Albalwy, Faisal
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9858055/
https://www.ncbi.nlm.nih.gov/pubmed/36662688
http://dx.doi.org/10.1371/journal.pone.0280038
_version_ 1784874003398131712
author Algarni, Abdullah
Attaallah, Abdulaziz
Eassa, Fathi
Khemakhem, Maher
Jambi, Kamal
Aljihani, Hosam
Almarhabi, Khalid
Albalwy, Faisal
author_facet Algarni, Abdullah
Attaallah, Abdulaziz
Eassa, Fathi
Khemakhem, Maher
Jambi, Kamal
Aljihani, Hosam
Almarhabi, Khalid
Albalwy, Faisal
author_sort Algarni, Abdullah
collection PubMed
description Distributed software applications are one of the most important applications currently used. Rising demand has led to a rapid increase in the number and complexity of distributed software applications. Such applications are also more vulnerable to different types of attacks due to their distributed nature. Detecting and addressing attacks is an open issue concerning distributed software applications. This paper proposes a new mechanism that uses blockchain technology to devise a security testing mechanism to detect attacks on distributed software applications. The proposed mechanism can detect several categories of attacks, such as denial-of-service attacks, malware and others. The process starts by creating a static blockchain (Blockchain Level 1) that stores the software application sequence obtained using software testing techniques. This sequence information exposes weaknesses in the application code. When the application is executed, a dynamic blockchain (Blockchain Level 2) helps create a static blockchain for recording the responses expected from the application. Every response should be validated using the proposed consensus mechanism associated with static and dynamic blockchains. Valid responses indicate the absence of attacks, while invalid responses denote attacks.
format Online
Article
Text
id pubmed-9858055
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-98580552023-01-21 A security testing mechanism for detecting attacks in distributed software applications using blockchain Algarni, Abdullah Attaallah, Abdulaziz Eassa, Fathi Khemakhem, Maher Jambi, Kamal Aljihani, Hosam Almarhabi, Khalid Albalwy, Faisal PLoS One Research Article Distributed software applications are one of the most important applications currently used. Rising demand has led to a rapid increase in the number and complexity of distributed software applications. Such applications are also more vulnerable to different types of attacks due to their distributed nature. Detecting and addressing attacks is an open issue concerning distributed software applications. This paper proposes a new mechanism that uses blockchain technology to devise a security testing mechanism to detect attacks on distributed software applications. The proposed mechanism can detect several categories of attacks, such as denial-of-service attacks, malware and others. The process starts by creating a static blockchain (Blockchain Level 1) that stores the software application sequence obtained using software testing techniques. This sequence information exposes weaknesses in the application code. When the application is executed, a dynamic blockchain (Blockchain Level 2) helps create a static blockchain for recording the responses expected from the application. Every response should be validated using the proposed consensus mechanism associated with static and dynamic blockchains. Valid responses indicate the absence of attacks, while invalid responses denote attacks. Public Library of Science 2023-01-20 /pmc/articles/PMC9858055/ /pubmed/36662688 http://dx.doi.org/10.1371/journal.pone.0280038 Text en © 2023 Algarni et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Algarni, Abdullah
Attaallah, Abdulaziz
Eassa, Fathi
Khemakhem, Maher
Jambi, Kamal
Aljihani, Hosam
Almarhabi, Khalid
Albalwy, Faisal
A security testing mechanism for detecting attacks in distributed software applications using blockchain
title A security testing mechanism for detecting attacks in distributed software applications using blockchain
title_full A security testing mechanism for detecting attacks in distributed software applications using blockchain
title_fullStr A security testing mechanism for detecting attacks in distributed software applications using blockchain
title_full_unstemmed A security testing mechanism for detecting attacks in distributed software applications using blockchain
title_short A security testing mechanism for detecting attacks in distributed software applications using blockchain
title_sort security testing mechanism for detecting attacks in distributed software applications using blockchain
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9858055/
https://www.ncbi.nlm.nih.gov/pubmed/36662688
http://dx.doi.org/10.1371/journal.pone.0280038
work_keys_str_mv AT algarniabdullah asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT attaallahabdulaziz asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT eassafathi asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT khemakhemmaher asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT jambikamal asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT aljihanihosam asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT almarhabikhalid asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT albalwyfaisal asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT algarniabdullah securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT attaallahabdulaziz securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT eassafathi securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT khemakhemmaher securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT jambikamal securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT aljihanihosam securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT almarhabikhalid securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain
AT albalwyfaisal securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain