Analysis of threats and risks in the Web3 ecosystem in the security context

Authors

DOI:

https://doi.org/10.20535/2411-1031.2023.11.2.293824

Keywords:

blockchain, vulnerabilities, decentralization, information security, information protection, smart contracts, Web3, NFT

Abstract

This research article discusses current and promising issues in the field of cybersecurity, in particular, the analysis of potential threats and risks of Web3 development. Web3 is a new generation of the Internet based on blockchain technology, decentralization, cryptography, and smart contracts. This approach aims to improve security, privacy, and user rights in the virtual environment, but without proper understanding, it can carry the opposite risk. The article begins with an analysis of recent research and issues. The authors discuss potential threats and risks, including possible attacks on decentralization protocols, censorship manipulation, attacks on blockchain protocols, attempts to break the consensus system, and unfair smart contract transactions. The article discusses a number of vulnerabilities and attacks that can harm the new Web 3.0 technology. The article describes new threats to the privacy of users and their digital assets, including the use of anonymization technologies and countermeasures by criminal organizations or government agencies. The article also emphasizes the importance of discussing the legal aspects of Web3 integration, finding an optimal balance between the regulation of the digital space and users' rights to privacy and autonomy. Global challenges require international cooperation and standardization of regulatory rules in this area. The results of the study demonstrate that a conscious approach to analyzing Web3 threats is the key to building a secure future for the Internet. This article contributes to the dissemination of information and knowledge about possible risks, opens up new horizons for scientific research, practical implementation of cybersecurity measures, and political dialogue in the Web3 era.

Author Biographies

Anastasiia Tolkachova, Lviv Polytechnic National University, Lviv

student, department of information security

Andrian Piskozub, Lviv Polytechnic National University, Lviv

PhD. in engineering, associate professor, department of information security

References

Y. Sompolinsky, and A. Zohar, “Secure high-rate transaction processing in bitcoin”, in Proc. International Conference on Financial Cryptography and Data Security (FC), San Juan, Puerto Rico, 2015, pp. 507-527. doi: https://doi.org/10.1007/978-3-662-47854-7_32.

O. Yashchyk, I. Tverdokhlib, Y. Franko, and M. Ozhha, “Using blockchain technology for security automation of management of educational documents”, Scientific Issues Ternopil Nat. Pedagogical University. Series: Pedagogy, vol. 1, iss. 2, pp. 113-120, 2023. doi: https://doi.org/10.25128/2415-3605.22.2.14.

H. Hevko, O. Yashchyk, T. Savchyn, and L. Hiltai, “Cyber security in decentralized web 3.0 internet ecosystem”, Scientific Issues Ternopil Nat. Pedagogical University. Series: Pedagogy, vol. 1, iss. 1, pp. 61-68, 2023. doi: https://doi.org/10.25128/2415-3605.23.1.8.

K. Nekit, “Advantages and disadvantages of smart-contracts as the basis for the emergence of ownership”, Nat. Tech. Univ. Ukraine Journal. Political Science. Sociology. Law, vol. 3, iss. 47, pp. 101-105, 2020, doi: https://doi.org/10.20535/2308-5053.2020.3(47).229494.

M. Ragnedda, and G. Destefanis, Blockchain and Web 3. 0: Social, Economic, and Technological Challenges. Abingdon, UK: Taylor & Francis Group, 2019.

“Cybersecurity in web 3.0: A new way of protecting systems”, Strike: Continuous Security & Pentesting. [Online]. Available: https://strike.sh/blog/web3.0-cybersecurity. Accessed on: Aug. 19, 2023.

“Smart contract security challenges”, Web3 University – Your Guide to Blockchain Development. [Online]. Available: https://www.web3.university/tracks/create-a-smart-contract/smart-contract-security-challenges. Accessed on: Sep. 19, 2023.

J. Groopman, “Web 3.0 security risks: What you need to know”, TechTarget. [Online]. Available: https://www.techtarget.com/searchsecurity/tip/Top-3-Web3-security-and-business-risks. Accessed on: Sep. 19, 2023.

K. Huang, and W. Ma, Blockchain and Web3: Building the Cryptocurrency, Privacy, and Security Foundations of the Metaverse. Hoboken, NJ, USA: Wiley & Sons, 2022.

Ethereum. [Online]. Available: https://ethereum.org/uk. Accessed on: Sep. 19, 2023.

“Security on the Web3: Best Practices for a Privacy-Driven Future”, Binance Blog. [Online]. Available: https://www.binance.com/uk-UA/blog/ecosystem/безпека-у-web3-найкращі-практики-для-майбутнього-орієнтованого-на-конфіденційність-3731431418476279097. Accessed on: Sep. 19, 2023.

R. Browne, “Web inventor Tim Berners-Lee wants us to 'ignore' Web3: 'Web3 is not the web at all’”, CNBC. [Online]. Available: https://www.cnbc.com/2022/11/04/web-inventor-tim-berners-lee-wants-us-to-ignore-web3.html. Accessed on: Sep. 19, 2023.

N. Ivanenko, “Tim berners-lee calls cryptocurrency “dangerous” and compares it to gambling”, Mezha.Media. [Online]. Available: https://mezha.media/en/2023/02/20/tim-berners-lee-calls-cryptocurrency-dangerous-and-compares-it-to-gambling. Accessed on: Sep. 19, 2023.

J. J. DeLuccia, The NFT & Crypto Currency Security Guide: Must Have Knowledge to Navigate, Purchase, Own, and Trade in the World of Cryptocurrency. Independently published, 2022.

G. Radelchuk, and M. Khoroshun, “Concepts of designing a decentralized payment system with its own digital currency based on the ethereum blockchain platform”, Bulletin of KhNU. Technical of science, vol. 1, iss. 4, pp. 89-93, 2020. doi: https://doi.org/10.31891/2307-5732-2020-287-4-89-93.

P. Kravchenko, B. Skryabin, and O. Dubinina. Blockchain and decentralized systems, Kharkiv, Ukraine: PROMART, 2020.

P. de Filippi, and A. Wright, “Blockchain and the law: The rule of code”, Cambridge, Mass, USA: Harvard University Press, 2018, doi: https://doi.org/10.1111/1468-2230.12459.

R. Taş, “Smart contract security vulnerabilities”, Erzincan University Journal of Science and Technology, vol. 16, iss. 1, pp. 196-211, 2023. doi: https://doi.org/10.18185/erzifbed.1105551.

“Social networks have turned artificial intelligence into a brat and a racist”, Correspondent.net. [Online]. Available: https://ua.korrespondent.net/lifestyle/3656008-sotsmerezhi-zrobyly-zi-shtuchnoho-intelektu-khama-i-rasysta. Accessed on: Sep. 23, 2023.

Published

2023-12-28

How to Cite

Tolkachova, A., & Piskozub, A. (2023). Analysis of threats and risks in the Web3 ecosystem in the security context. Collection "Information Technology and Security", 11(2), 227–238. https://doi.org/10.20535/2411-1031.2023.11.2.293824

Issue

Section

CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION