Website Threat Defence Database

Solution: Part 2 of 3

Ecosystem – Part 2

The SharkGate Ecosystem protects websites against current and next-generation cyber threats. The core components of the Ecosystem are:

  • SharkGate Security Plugin For Websites (“SharkGate Plugin”)
  • SharkGate Website Threat Defence Database (“WTDD”)
  • SharkGate blockchain-based AI (“Deep Sea”)

These 3 components form the basis of our unique approach exclusively dedicated to protecting websites and constantly evolving the ecosystem for website cyber threat protection. This Ecosystem will finally provide the solution to protect websites against current and next-generation threats.

In this post we will describe the second of these parts “The Website Threat Defence Database (WTDD)”.


SharkGate’s Website Threat Defence Database

The Threat Defence Database (“WTDD”) is an open, decentralized cybersecurity threat intelligence store powered by the blockchain. It becomes more intelligent and robust with each website that joins the network and as more existing threat data feeds and data providers join the ecosystem. We expect the WTDD to eventually become the World’s largest repository of threat intelligence for the security of websites.

Data Usage

WTDD provides data to the rest of the SharkGate ecosystem. With key usages such as..

  • A Big Data feed to the SharkGate AI – Vast amounts of data is collected on the distributed network which is then processed by “Deep Sea” building the long-term hacker immunity of the whole SharkGate ecosystem and thus every site protected by it.
  • Feed and arm the SharkGate Plugins – The plugins continually receive updates from the WTDD. Updating with the latest firewall rules, malware signatures, hacker fingerprints produced by “Deep Sea”.
  • An open repository for the universal benefit – A publicly accessible store of threat intelligence solely dedicated to website cyber attacks. Offers programmatic access to the data allowing a fastmoving marketplace for organizations and other security vendors.

Data Privacy

Collected data passes through an anonymization and extraction process to pull relevant attributes that are then normalized and processed before placement in the WTDD.

Data Stores

The WTDD stores a vast amount of relevant threat defense data. The following is some
examples of the data stored…

  • Firewall Rules
  • Malicious IPs
  • Hacker Fingerprints (e.g. Agents, referers, networks, etc.)
  • Hacker Payloads
  • Spam Visitors
  • Malicious File Updates (e.g attack shells, file upload scripts, cyrptominers, etc.)
  • Scanner Rules
  • Infected Plugins
  • Infected Themes

Storing vasts amount of data on the blockchain directly is not wise with the current blockchain implementations. So the storage for the WTDD will be the InterPlanetary File System (IPFS) with the hash values stored on the blockchain. Data consumers (websites, AI nodes, etc) will pull the data from the closest sources to their locations.

Data Access

The data stored in the WTDD will be free for personal. However, organizations that wish to utilize this information for their security products and solutions will need to pay a fee (using our tokenomics model). The marketplace for the paid data provided by WTDD is exclusively powered via automated smart contracts. Access to the collected samples and their attributes will be available programmatically via APIs conforming to industry standard formats (e.g. JSON, etc.) and a set of SDK’s will be created.

Download Whitepaper

There is no denying there is a desperate need for a new way to protect sites from hackers. Think about how Google transformed the search economy. Think about how Uber and Airbnb transformed their sectors. SharkGate is now doing the same for website cybersecurity. Further information about the existing crisis and our solution to the problem can be found in our whitepaper.


Join Our Mailing List