An Implementation of Signature Detection Technique to Address Software Threats Attack in Web using Blockchain Technology
Internet of Things (IoT) are becoming more common. Despite this, IoT solutions must overcome a number of important obstacles in order to continue to meet the growing demand for linked devices and the services they deliver. Security and privacy issues concerning IoT devices, as well as the data they collect, generate, and process, should be addressed by IoT solutions because of the potential importance and key attributes. Blockchain technology has recently become more popular among IoT solutions. As a result of blockchain technology, which has been increasingly popular over the past several years, all stakeholders can share data in a transparent way. As a result, this research provides a blockchain-based web assault detection model that leverages the signature-based detection method for detecting web attack. An attack can be detected and avoided by checking for patterns against recognised web-based attack types such as SQL Injection, Cross-Site Scripting (XSS), and Command Injection (CI). A total of three web servers were used in the Blockchain nodes and the Multichain application have been installed on each server. Web application threats are detected using both the web application's signature list and the blockchain's signature list. The results of the experiment reveal that the risks signatures recognised and specified by a web application are updated in the blockchain lists and utilised by all web applications.