Difference between revisions of "Distributed OS: Winter 2011"

From Soma-notes
Jump to navigation Jump to search
Line 24: Line 24:
*recognize that "bad" behavior is always possible.  "good" behavior is enforced through incentives and sanctions.
*recognize that "bad" behavior is always possible.  "good" behavior is enforced through incentives and sanctions.
*rules will change.  Even rules for rule changes will change. Need a "living document" governing how rules are chosen and enforced.
*rules will change.  Even rules for rule changes will change. Need a "living document" governing how rules are chosen and enforced.
==Scenarios==
===Stopping DDoS===
===Stopping phishing===
===Limiting the spread of malware===
===Bandwidth hogs===

Revision as of 15:13, 18 January 2011

Readings

January 13, 2011: CCR (two papers)

January 18, 2011: OceanStore and Pond

Internet Governance

Problems to Solve

  • Attack computers with almost no consequences
    • DDoS
    • botnets
    • capture and analyze private traffic
    • distribute malware
    • tampering with traffic
    • Unauthorized access to data and resources
    • Impersonate computers, individuals, applications
    • Fraud, theft
    • regulate behavior

Design Principles

  • subjects of governance: programs and computers
  • bind programs and computers to humans & human organizations, but recognize binding is imperfect
  • recognize that "bad" behavior is always possible. "good" behavior is enforced through incentives and sanctions.
  • rules will change. Even rules for rule changes will change. Need a "living document" governing how rules are chosen and enforced.

Scenarios

Stopping DDoS

Stopping phishing

Limiting the spread of malware

Bandwidth hogs