Ecosystem — Part 3

  • SharkGate Security Plugin For Websites (“SharkGate Plugin”)
  • SharkGate Website Threat Defence Database (“WTDD”)
  • SharkGate blockchain-based AI (“Deep Sea”)

The SharkGate Plugin

RULES TYPES

  • Innate Immunity Rules — Rules that require no additional “training” to do their jobs. The plugin continually updates with these rules as they become available. On the first release, these will contain industry standard rules for each type of Website plus thousands of rules developed in-house over the last 4 years by the SharkGate firewall and OneHourSiteFix malware scanner. SharkGate and OneHourSiteFix are already keeping vast amounts of websites clean from infection, so even on release 1.0, these innate rules will provide a very strong protection indeed.
  • Adaptive (Acquired) Immunity Rules — Produced by SharkGate Plugin’s AI and by the Blockchain AI ‘Deep Sea’ from contributed data on the network. These rules learn and improve upon exposure to attacks. The advantages of the adaptive rules are that they are able to adapt and protect from new types of attack as they emerge. These rules will be running on all sites from day one, but will not come into full force until they have gained the experience necessary for optimal attack and malware protection. The feedback of these rules to Deep Sea also enables further Innate rules to be created at a later date. Although the formation of global threat memory and experience from these rules occurs 24/7 throughout the life of the blockchain, it is expected the most rapid gain will be in the first years of the chain.

IMMUNITY CREATION TYPES

  • Natural (Acquired) Distributed Attack Immunity — This is a long-term active memory that is acquired by ‘Deep Sea’ based on attacks against any of the websites on the distributed network. With the ecosystem building the collective intelligence from each attack. it means all other sites worldwide are then equipped to mount a strong response if such attacks are detected again. This type of immunity is ‘adaptive’ because it occurs during the lifetime of the blockchain as an adaptation to attacks and prepares the cybersecurity system for such future challenges.
  • Artificially Acquired Distributed Attack Immunity — This is when threat payloads from selected nodes, oracle sources (e.g. external threat database, consensus agreed on attack scripts, etc.) are run against the system for it to learn from and improve the overall immunity. This works in the same way the active immunity of a human body would be generated artificially through vaccination.

--

--

--

All websites of the world working together to enable the future of website cybersecurity. SharkGate - An incentivised ai-powered website hacker protection

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Welcome to Avatu!

MultiVAC’s April 2022 Monthly Project Report

Welcome to Cartesi HQ

Welcome to Cartesi HQ

SpeakerHeads litepaper v1.0

StaFi rFIS Original Validator Recruitment Campaign

Transient Seed complete, Private to closely follow

Ethereum ditching Solidity for Vyper?

MultiVAC Monthly Report for August 2020: Listing on Uniswap, DApp developing and testing

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
SharkGate Token

SharkGate Token

All websites of the world working together to enable the future of website cybersecurity. SharkGate - An incentivised ai-powered website hacker protection

More from Medium

Introduction of Toppy Marketplace

Block Chain

What Is An AMM?

The New Era of Stablecoin-VirgoX & OUSD AMA Recap