Skip to content
Architecture
Security Overlay

Security Overlay

A security overlay defends against cyber threats—particularly DDoS attacks—and enhances privacy. In traditional setups, a single vendor (e.g., a major cloud security provider) sits between the Internet and the origin servers, filtering malicious traffic. A decentralized security overlay distributes this filtering function among many nodes, making it harder for attackers to target or bypass a single point.


Security Layer Concepts

Global Anycast DDoS Scrubbing

Distributed nodes detect and mitigate malicious traffic close to the attack source. This disperses the load, preventing any single node from being overwhelmed.

Encrypted Relay & Origin Shielding

By routing user requests through secure overlay nodes, the real IP of the origin remains hidden. Attackers can't trivially direct traffic to the origin server.

Reputation-Based Filtering

Nodes and traffic streams build reputation scores. Malicious or suspicious traffic is flagged or blacklisted through on-chain mechanisms.

Programmable Security Rules

Each node can host a local WAF or intrusion detection system. Rules can be updated in real time as threats evolve.

On-Chain Incentives & Slashing

Nodes that accurately filter out bad traffic earn additional rewards; false positives or misbehavior risk being penalized.

Distributed Attack Absorption

Multiple nodes absorb traffic from large-scale botnets, making volumetric attacks less effective.

Security Layer Benefits

No Single Point of Failure

A globally distributed overlay means attackers must overwhelm many scrubbing nodes, which is far more complex in a decentralized setting.

Enhanced Privacy

The overlay can mask user and server metadata, preventing targeted man-in-the-middle attacks.

Reduced Downtime

Even if a subset of nodes is hit, the network automatically reroutes legitimate traffic through healthy scrubbing nodes.