2023
DOI: 10.1371/journal.pone.0280038
|View full text |Cite
|
Sign up to set email alerts
|

A security testing mechanism for detecting attacks in distributed software applications using blockchain

Abstract: Distributed software applications are one of the most important applications currently used. Rising demand has led to a rapid increase in the number and complexity of distributed software applications. Such applications are also more vulnerable to different types of attacks due to their distributed nature. Detecting and addressing attacks is an open issue concerning distributed software applications. This paper proposes a new mechanism that uses blockchain technology to devise a security testing mechanism to d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…The increasing demand has led to a rapid increase in the number and complexity of distributed software applications. However, such applications are more vulnerable to different types of attacks due to their distributed nature [74], [75].…”
Section: The Need For Software Securitymentioning
confidence: 99%
See 3 more Smart Citations
“…The increasing demand has led to a rapid increase in the number and complexity of distributed software applications. However, such applications are more vulnerable to different types of attacks due to their distributed nature [74], [75].…”
Section: The Need For Software Securitymentioning
confidence: 99%
“…Therefore, the authors suggested a need for a stronger focus on the tasks and activities surrounding coding. On their part, the authors in [75] have developed a new mechanism that uses blockchain technology [88] to devise a security testing mechanism to detect attacks on distributed software applications. This technique can detect several categories of attacks, such as denial-of-service attacks, malware and others.…”
Section: Techniques and Approaches To Software Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…Aims to identify vulnerabilities and weaknesses in software systems. Includes techniques such as penetration testing, vulnerability scanning, code reviews, and security-focused testing methodologies [162]. By uncovering vulnerabilities, organizations can address them before deploying the software.…”
Section: Security Testingmentioning
confidence: 99%