Distributed OS: Winter 2011: Difference between revisions
No edit summary |
|||
Line 34: | Line 34: | ||
Group members: Waheed Ahmed | Group members: Waheed Ahmed | ||
===3: Limiting the spread of malware=== | ===3: Limiting the spread of malware=== | ||
Group members: keith | Group members: keith, Andrew | ||
===4: Bandwidth hogs=== | ===4: Bandwidth hogs=== |
Revision as of 21:59, 18 January 2011
Readings
January 13, 2011: CCR (two papers)
January 18, 2011: OceanStore and Pond
Internet Governance
Problems to Solve
- Attack computers with almost no consequences
- DDoS
- botnets
- capture and analyze private traffic
- distribute malware
- tampering with traffic
- Unauthorized access to data and resources
- Impersonate computers, individuals, applications
- Fraud, theft
- regulate behavior
Design Principles
- subjects of governance: programs and computers
- bind programs and computers to humans & human organizations, but recognize binding is imperfect
- recognize that "bad" behavior is always possible. "good" behavior is enforced through incentives and sanctions.
- rules will change. Even rules for rule changes will change. Need a "living document" governing how rules are chosen and enforced.
Scenarios
1: Stopping DDoS
Group members: Seyyed
2: Stopping phishing
Group members: Waheed Ahmed
3: Limiting the spread of malware
Group members: keith, Andrew