LevelNet ICO details
Start Date: 2018-5-25
End date: 2018-6-1
- Category: Big Data, Platform, Software
- Token: LVL
- Platform: Ethereum
- Type: Utility
- Initial price: 1 LVL = 0.01 USD
- Bonus: Token Bonus by Collected Amount: 0 - $1.5m 10% $1.5m - $5m 7% $5m - $7m 5% $7m - $12m 3% Token Bonus by Time: First week 10% WhiteList Bonus: Whitelist members 15%
- Accepting: BTC ETH Fiat LTC
- Soft cap: 1.5M USD
- Hard cap: 12M USD
- Site: LevelNet site
- Twitter: https://twitter.com/LevelNetwork
- Facebook: https://www.facebook.com/levelnetwork/
- Github: https://github.com/ahiatsevich/cav-token
- Reddit: https://www.reddit.com/user/LevelNetwork/
- Bitcointalk: https://bitcointalk.org/index.php?topic=2212642
- Medium: https://medium.com/@LevelNetwork
- Telegram: https://t.me/levelnet_ico
LevelNet – New Endpoint Security Protocol: One for All & All for One
LevelNet integrates virtually all existing anti-virus technologies into one simple, user-friendly application. This distributed system enables participants to share threat data globally and in real time, allowing for the entire system to become much smarter, much faster, than any single security cybersecurity provider can today. LevelNet signi cantly boosts the capabilities of any user installed anti-virus program. If a user does not have any security applications installed, LevelNet can take advantage of its distributed network platform and act as a self-standing application.
Today’s cybersecurity solutions are limited. As one of the main providers nds a threat, it will often take signi cant time for that knowledge to be distributed to the total system. New malware takes advantage of this window of time to infect the greatest number of devices. LevelNet creates an integrated, global, and immediately responsive system to stop more malware earlier than it was heretofore possible.
The Problem: A World of Outdated Cybersecurity Solutions
The 2017 Global Cybersecurity market is valued at more than $400 billion1 , with the consumer antivirus segment alone valued at $25 billion. Usage of the internet is becoming ever more omnipresent, with markets such as IoT are driving ever more connectivity. Growth in the cybersecurity sector is significant and sustained, with an estimated CAGR (Compound Annual Growth Rate) of 9.5% between 2016 and 20212 . Such a high-value market coupled with sustained growth is ideal for investors looking for a lucrative value proposition.
The main opportunities in the consumer cybersecurity marketplace reside in the weaknesses created by an industry focused on existing threats, not future malware. Cybercrime evolves rapidly, and any system designed to face this threat must be designed to evolve rapidly. However, the monolithic nature of institutions tasked with this problem makes it difficult for them to offer the flexibility needed to surmount these challenges both quickly and efficiently.
An Emphasis on Future Threats
Traditional methods of virus protection rely on users installing anti-virus software. It searches and identifies malware using a database of signatures the provider has to compare to.
Files with executable code are analyzed, and their threat level is determined using a heuristic analysis method. These heuristic decisions are made using a previously developed algorithm, which is frequently left lagging in updates. Standard signatures are not used with the heuristic method.
A more advanced method of protection is code emulation. Here a virtual machine (VM) simulates the CPU and memory management systems then it executes the code on the VM in order to look for unintended or unaccounted for effects. This enables one to test and observe the effects of malicious code without making the non-virtual machine vulnerable. Additionally, with behavioral analysis technology, one can evaluate entire sequences of actions from the malware, thereby significantly increasing the efficiency of the anti-virus software.
These measures may be sufficient for prevention of known cyber-threats, but they are are not adequate for emerging malware. Virus protection often requires prompt and regular, regardless of particular software capabilities or which method they employ. Otherwise, the risk of security breaches increases significantly.
High Costs for Consumers
The cost to consumers is usually in the range of $50+ per year, with relatively low threat detection efficacy. No individual anti-virus product can offer “ideal protection.” Vendors specialize in a particular threat type, and enterprise solutions involve much more resource intensive processes such as emulation that are too expensive and time consuming for the consumer market. The average Industry-leading detection rates for anti-virus companies today are not more than 95% reactively and 80% proactively:
Other statistics are even less encouraging:
- “The best antivirus software catches only 5% of new online threats” – by Harvard Business Review “
- The Antivirus industry has a dirty little secret that they really don’t want anyone to know. Despite the claims of their marketing departments, their products are not all that effective in the real world. Best performances in the industry are between 80% and 90% against threats out there in the wild at any time, and their protection against ransomware is very bad”
- “One well known, major antivirus industry player is routinely scoring no better than 80% reactive combined with a 70% proactive”
At the same time, Cyber-security does not come cheap – a typical Kaspersky Labs, NOD32, or Symantec product cost around $50 annually. LevelNet plans to offer a $0.99 annual cost for its premium service. Companies today spend upwards of 25% of their IT budget on Cyber-security. The market is hungry for solutions that can improve quality and lower the cost footprint.
How it Works
The LevelNet system provides cybersecurity measures against suspected files/viruses/threats detected by any of the anti-virus/cybersecurity software applications present on the LevelNet network. Suspicious files, viruses, and threats can be quarantined/deleted regardless of whether there is installed antivirus software at the particular endpoint.
It is essentially a network where each user exchanges information about IT security incidents (viruses and any other computer threats) detected on their device with other users in real time. This above process is done to prevent an attack directed at any device connected to the network. Network users agree to exchange such information beforehand.
Threat detection is performed by monitoring the response of security systems installed on the user’s device. The response is analyzed by the client programs that are located both on the user device and outside of it on other nodes of the network. After the analysis is completed, users are notified of the threat. Users receive threat notifications in the form of prepared bundles of information with various network protocols in place.
The source of the notification can be either the user device with an installed client program or other network nodes carrying functional features of the program responsible for notifications. The client program then blocks the threat for all notified users via specialized program features, i.e., alerts, other features then scan for the sources of the various threats.