Cargando…
A security testing mechanism for detecting attacks in distributed software applications using blockchain
Distributed software applications are one of the most important applications currently used. Rising demand has led to a rapid increase in the number and complexity of distributed software applications. Such applications are also more vulnerable to different types of attacks due to their distributed...
Autores principales: | , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9858055/ https://www.ncbi.nlm.nih.gov/pubmed/36662688 http://dx.doi.org/10.1371/journal.pone.0280038 |
_version_ | 1784874003398131712 |
---|---|
author | Algarni, Abdullah Attaallah, Abdulaziz Eassa, Fathi Khemakhem, Maher Jambi, Kamal Aljihani, Hosam Almarhabi, Khalid Albalwy, Faisal |
author_facet | Algarni, Abdullah Attaallah, Abdulaziz Eassa, Fathi Khemakhem, Maher Jambi, Kamal Aljihani, Hosam Almarhabi, Khalid Albalwy, Faisal |
author_sort | Algarni, Abdullah |
collection | PubMed |
description | Distributed software applications are one of the most important applications currently used. Rising demand has led to a rapid increase in the number and complexity of distributed software applications. Such applications are also more vulnerable to different types of attacks due to their distributed nature. Detecting and addressing attacks is an open issue concerning distributed software applications. This paper proposes a new mechanism that uses blockchain technology to devise a security testing mechanism to detect attacks on distributed software applications. The proposed mechanism can detect several categories of attacks, such as denial-of-service attacks, malware and others. The process starts by creating a static blockchain (Blockchain Level 1) that stores the software application sequence obtained using software testing techniques. This sequence information exposes weaknesses in the application code. When the application is executed, a dynamic blockchain (Blockchain Level 2) helps create a static blockchain for recording the responses expected from the application. Every response should be validated using the proposed consensus mechanism associated with static and dynamic blockchains. Valid responses indicate the absence of attacks, while invalid responses denote attacks. |
format | Online Article Text |
id | pubmed-9858055 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-98580552023-01-21 A security testing mechanism for detecting attacks in distributed software applications using blockchain Algarni, Abdullah Attaallah, Abdulaziz Eassa, Fathi Khemakhem, Maher Jambi, Kamal Aljihani, Hosam Almarhabi, Khalid Albalwy, Faisal PLoS One Research Article Distributed software applications are one of the most important applications currently used. Rising demand has led to a rapid increase in the number and complexity of distributed software applications. Such applications are also more vulnerable to different types of attacks due to their distributed nature. Detecting and addressing attacks is an open issue concerning distributed software applications. This paper proposes a new mechanism that uses blockchain technology to devise a security testing mechanism to detect attacks on distributed software applications. The proposed mechanism can detect several categories of attacks, such as denial-of-service attacks, malware and others. The process starts by creating a static blockchain (Blockchain Level 1) that stores the software application sequence obtained using software testing techniques. This sequence information exposes weaknesses in the application code. When the application is executed, a dynamic blockchain (Blockchain Level 2) helps create a static blockchain for recording the responses expected from the application. Every response should be validated using the proposed consensus mechanism associated with static and dynamic blockchains. Valid responses indicate the absence of attacks, while invalid responses denote attacks. Public Library of Science 2023-01-20 /pmc/articles/PMC9858055/ /pubmed/36662688 http://dx.doi.org/10.1371/journal.pone.0280038 Text en © 2023 Algarni et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Algarni, Abdullah Attaallah, Abdulaziz Eassa, Fathi Khemakhem, Maher Jambi, Kamal Aljihani, Hosam Almarhabi, Khalid Albalwy, Faisal A security testing mechanism for detecting attacks in distributed software applications using blockchain |
title | A security testing mechanism for detecting attacks in distributed software applications using blockchain |
title_full | A security testing mechanism for detecting attacks in distributed software applications using blockchain |
title_fullStr | A security testing mechanism for detecting attacks in distributed software applications using blockchain |
title_full_unstemmed | A security testing mechanism for detecting attacks in distributed software applications using blockchain |
title_short | A security testing mechanism for detecting attacks in distributed software applications using blockchain |
title_sort | security testing mechanism for detecting attacks in distributed software applications using blockchain |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9858055/ https://www.ncbi.nlm.nih.gov/pubmed/36662688 http://dx.doi.org/10.1371/journal.pone.0280038 |
work_keys_str_mv | AT algarniabdullah asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT attaallahabdulaziz asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT eassafathi asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT khemakhemmaher asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT jambikamal asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT aljihanihosam asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT almarhabikhalid asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT albalwyfaisal asecuritytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT algarniabdullah securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT attaallahabdulaziz securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT eassafathi securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT khemakhemmaher securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT jambikamal securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT aljihanihosam securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT almarhabikhalid securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain AT albalwyfaisal securitytestingmechanismfordetectingattacksindistributedsoftwareapplicationsusingblockchain |