A link to the paper: Difference between revisions

From Soma-notes
Freetonik (talk | contribs)
 
(182 intermediate revisions by 4 users not shown)
Line 1: Line 1:
=Title=
#REDIRECT [[Internet Attribution: Between Privacy and Cruciality]]
Requirements for Attribution on the Internet
 
=Abstract=
 
=Introduction=
 
=The attribution dilemma=
==What is the attribution problem==
===Rakhim===
 
===Omi===
===Raghad===
===AbdelRahman===
 
==Why we need Attribution==
*DoS
==Attribution Attacks==
* Stepping stone attack
* Forgery
** Identity theft
 
=Requirements for internet attribution system=
(Unstructured draft)
 
* Any potentially destructive act should be traceable to a person (and/or organization, group, etc)
* Traceability should not violate any current privacy-related laws and moral principles
* Attribution mapping should not be a bijection, in other words action should map to persons, but not vice versa
* Traceability information should be distributed
* It should be impossible to collect all traceability data in one place
* Personal data should be stored by trusted authorities (e.g. governments)
* Traceability information and personal data should be separated, a connection to be revealed only when needed
* Attribution system should be incrementally deployable
* Cost of setting up and maintaining the system for a particular body (person, organization, network) should be considerably less than average losses under current lack of attribution (e.g. DoS, identity theft, etc)
 
=Related Work=
2004: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=1437851 This] paper uses both <i>link identification</i> and <i>filtering</i> for achieving IP traceback WITHOUT the presence of high network cooperation.
 
=Requirements=

Latest revision as of 19:56, 11 April 2011