Tuesday, October 3, 2017

Gladius Network - Decentralized CDN and DDoS Protection on the Blockchain


Gladius’ goal is to create a fully decentralized, peer to peer, serverless node network to connect bandwidth pools to websites looking for DDoS protection and expedited content delivery. Anyone with a computer can download and run the Gladius peer client in the background to rent out their unused bandwidth and earn Gladius Tokens (GLA). Large pools with hundreds, if not thousands, of nodes will then be able to handle a continuous stream of requests to validate website connections and block and malicious activity.

Client nodes can be started up on any Linux, Windows, or MacOS machine and will automatically run in the background when you choose. Users will be part of localized verification pools. Every website request a user validates will earn them Gladius Tokens. In turn, users can sell these tokens back to websites to create an economic cycle that promotes the growth of the Gladius Network.

Websites looking for protection will simply be able to create an account on Gladius’ website, acquire Gladius Tokens, and then request services in a matter of clicks. Once a website is part of the Gladius network, a live request graph will be available to monitor connections, protection, and speed deltas.

The entire platform will progress in 3 steps which can be seen in Section 4. First we have the proof of concept stage that will showcase all of the basic functions of the network while not actually going into official production mode. Then, after our token sale, we will have a closed production period where anyone can download and run the client node. However, only approved websites can purchase protection since the network and pools will still be in early growth stages. Once the Gladius Network can support a large attacks and the core tech is improved, we will enter the next stage. The Gladius Network will then allow anyone to purchase services from the various pools.




Gladius Platform

Gladius’ goal is to create a fully decentralized, peer to peer, serverless node network to connect bandwidth and storage pools to websites looking for DDoS protection and expedited content delivery. Anyone with a computer can download and run the Gladius peer client in the background to rent out their unused bandwidth and storage space and earn Gladius Tokens (GLA). Large pools with hundreds, if not thousands, of nodes will then be able to handle a continuous stream of requests to validate website connections and block malicious activity.

Client nodes can be started up on any Linux, Windows, or MacOS machine and will automatically run in the background when you choose. Users will be part of localized verification pools. Every website request a user validates will earn them Gladius Tokens. In turn, users can sell these tokens back to websites to create an economic cycle that promotes the growth of the Gladius Network.

DDoS Protection Market
It has become increasingly obvious that any business today looking to compete requires a strong internet presence. This unfortunately creates more opportunity for attacks and thus protection, like that offered from Gladius, is required.

Research has shown that the increased vulnerability to DDoS attacks is one of the main forces that push the growing market for internet security solutions:

  • Growing risk of cyber attacks
    As the world becomes more connected by the internet, valuable information and services also come under greater risk of attack. DDoS attacks have become more and more common in recent years and the stakes have greatly increased. This increased threat results in the quick expansion of security solutions to deal with and prevent DDoS attacks.
  • Unfavorable market conditions
    While the need for DDoS protection as a concept is excellent, the solutions available are not. DDoS protection is often very expensive and has varying degrees of success. The lack of a reliable and cheap solution creates a need for new players in the DDoS protection business.
  • Government interest
    Numerous attacks to private industries and government databases in past years has brought more attention to defending government information. This has increased the demand for proper protection from DDoS attacks.

The Gladius Network Architecture

  1. Ethereum Blockchain Acts as a centralized database for storing the proxies and their associated service providers. There is a cost associated with being added to the database
  2. Custom proxy A series of clients act as a distributed traffic validator while keeping the protected service hidden from the exterior. These nodes will also be able to cache site content and be part of the Gladius CDN as points of presence.
  3. Protected & Enhanced service Simply changes their nameservers to the ones associated with the custom proxy to enable protection. These services are negotiated with a smart contract.




Details of Token Sales

ICO Begins: November 24, 2017
ICO Expires: December 31, 2017
  • NAME : GLADIUS
  • SYMBOL : GLA
  • TOKEN PRICE : 1 ETH = 500 GLA
  • SUPORT TOKEN : ERR20
  • Total Supply : 48,200,000 GLA
  • Hard Cap : $12,500,000

More Info

Website : https://gladius.io/
Whitepaper : https://gladius.io/pdf/gladius-whitepaper.pdf
Facebook : https://www.facebook.com/gladiusio
Twitter : https://twitter.com/gladiusIO
Telegram : https://t.me/gladiusio
Medium : https://medium.com/@gladiusio

Author : mriansa
https://bitcointalk.org/index.php?action=profile;u=886049
Share This
Previous Post
Next Post