Analysis of vulnerability factors of WEB 3.0 technology

O. V. Vyshnivskyi,
DOI: https://doi.org/10.31673/2518-7678.2023.020909
2023-01-01
Abstract:The article is devoted to critical aspects during the implementation of Web-3.0 technology. The task is set: based on the analysis of the implementation of Web-3.0 technology to solve a number of tasks, namely: blockchain-based decentralization; creation of general accessibility; increasing trust in sites; increasing the security of personal information from hackers; ensuring true ownership of authors' information; lack of censorship; improvement of social interaction; use of the Internet of Things is compatible with virtual or augmented reality; application of artificial intelligence � consider a zero-day exploit for Web-3.0. A zero-day exploit indicates that the vendor or developer has just become aware of the vulnerability and has "zero days" to fix it. A zero-day attack occurs as a result of attackers exploiting a vulnerability (critical points) before the developers managed to fix it. To solve this problem in the article: a description of the main differences between the Web-3.0 construction architecture and Web-2.0 is made; the analysis of the tasks of Oprah Winfrey Network of the Web-3.0 architecture was carried out; consider the possibilities of: external interface (design and interface of web applications), server part (based on decentralized technologies, primarily dApp, which uses the advantages of blockchain: transparency, reliability and immutability of data.), database (stores data about users, their messages , tags and comments); an analysis of possible threats and vulnerabilities due to the introduction of Web-3.0 technology before the start of the zero-day exploit was performed. Based on the performed analysis, the following conclusions are drawn: that the vulnerability is related to scalability, limited transaction throughput and computing power, security, complexity, compatibility; that Web-3.0 creates many conditions that can be useful to people, but the introduction of new Web-3.0 capabilities leads to the emergence of new threats or vulnerabilities that can be used by attackers to harm people. This requires considering the possible impact of threats, identifying possible vulnerabilities in Web-3.0 technology before the start of a zero-day exploit, that is, it requires the need to investigate the possibility of the appearance of new vulnerabilities.
What problem does this paper attempt to address?