Website Threat Defence Database

Solution: Part 2 of 3

Ecosystem – Part 2

The SharkGate Ecosystem protects websites against current and next-generation cyber threats. The core components of the Ecosystem are:

  • SharkGate Security Plugin For Websites (“SharkGate Plugin”)
  • SharkGate Website Threat Defence Database (“WTDD”)
  • SharkGate blockchain-based AI (“Deep Sea”)

These 3 components form the basis of our unique approach exclusively dedicated to protecting websites and constantly evolving the ecosystem for website cyber threat protection. This Ecosystem will finally provide the solution to protect websites against current and next-generation threats.

In this post we will describe the second of these parts “The Website Threat Defence Database (WTDD)”.

The WTDD

SharkGate’s Website Threat Defence Database

The Website Threat Defence Database (WTDD) is a cybersecurity threat intelligence store. It becomes more intelligent and robust with each website that joins the network and as more threat data providers join the ecosystem. We expect the WTDD to eventually become the world’s largest repository of threat intelligence for the security of websites.

Data Usage

WTDD provides data to the rest of the SharkGate ecosystem. With key usages such as..

  • A Big Data feed to the SharkGate AI – Vast amounts of data is collected to SharkGate’s network (SharkNet) which is then processed by “Deep Sea” building the long-term hacker immunity of the whole SharkGate ecosystem and thus every site protected by it.
  • Feed and arm the SharkGate Plugins – The plugins continually receive updates from the WTDD. Updating with the latest firewall rules, malware signatures, hacker fingerprints, etc. produced by “Deep Sea”.

  • A repository for universal benefit – A store of threat intelligence solely dedicated to website cyber-attacks. Offers programmatic access to the data allowing a fast-moving marketplace for organizations and other security vendors.

Data Privacy

Collected data passes through an anonymization and extraction process to pull relevant attributes that are then normalized and processed before placement in the WTDD.

Data Stores

The WTDD stores a vast amount of relevant threat defense data. The following is some
examples of the data stored…

  • Firewall Rules
  • Malicious IPs
  • Hacker Fingerprints (agents, referrers, networks, etc.)

  • Hacker Payloads
  • Spam Visitors
  • Malicious File Updates (attack shells, file upload scripts, cryptominers, etc.)

  • Scanner Rules
  • Infected Plugins
  • Infected Themes

Data Access

The data stored in the WTDD will be available for security organizations to be utilized in their products and services as a paid monthly subscription. The data is served programmatically via APIs conforming to industry standard formats (JSON, etc.) and a set of SDK’s. We are also generating a monthly report from the data, which anyone can subscribe to, also as a monthly paid subscription.