"To competently perform rectifying security service, two critical incident response elements are necessary: information and organization."
― Robert E. Davis
I’m sure a lot of people in the crypto space remember the Decentralized autonomous network (DAO) which was attacked by hackers on June 18, 2016, where about 70 million dollars worth of ether were stolen. Or the PARITY wallet hack where about 30 million dollars were made away with.
These are some of the greatest blockchain hacks of all time.
Blockchain technology has been a wonderful innovation and every day, more businesses migrate to the blockchain. It is decentralized and every one has the right to their own authority in the blockchain economy. This has yielded a lot of advantages but has also yielded a critical disadvantage-security issues.
You see, the regular internet is centralized. There is control over what moves in or out and it’s relatively easy to trace violators.
But the blockchain is different! On the blockchain, people are anonymous which makes tracing of hackers difficult, and autonomous, and are a lot of blockchain users are still inexperienced that they get vulnerable to hacks and exploitations
The conventional internet cybersecurity is not enough for blockchain security. This is why SENTINEL-PROTOCOL is building an internet ecosystem to utilize the decentralized nature of blockchain technology and artificial intelligence to create an ecosystem that will bring together solutions to improve the overall security of the blockchain.
SENTINEL PROTOCOL is a Project aimed at solving the security issues faced by the blockchain.
SENTINEL PROTOCOL has recognized that despite the cryptography and safety of the blockchain itself, There could be defects in its utility which could make it vulnerable to hackers; for example, mistakes in just a single line of code in an app integrated to the blockchain could lead to theft of millions of dollars by hackers
- The Threat reputation database (TRDB) Collects possible malicious data or data of inappropriate/suspicious activity from platforms like exchanges. Information from the SENTINEL PORTAL like hacking events is also stored in the TRDB.
- THE MACHINE LEARNING INTEGRATED SECURITY WALLET (S-WALLET) Receives threat data, analyze and try to detect and prevent the possible outcome, rule out possible precipitating factors of this threat, and immediately take certain actions like filtering or cryptocurrency wallets and URLs.
- THE DISTRIBUTED MALWARE ANALYSIS SANDBOX (D-SANDBOXING): Prevents harm to the servers by taking the programmes for analysis and running them on a virtual machine. This ensures that even if there is a serious threat, it won’t affect the main server.
THE D-SANDBOX is relatively inexpensive and prevents wastage of computer power.
FOR MORE INFORMATION ON THE PROJECT, click on any of the links below
The blockchain is evolving, but it is still like the internet in the 1990s. For the successful evolution of blockchain, security need be ensured. SENTINEL-PROTOCOL is at the forefront of ensuring that.