Distributed OS: Winter 2011: Difference between revisions
Mike Preston (talk | contribs) |
|||
Line 37: | Line 37: | ||
===4: Bandwidth hogs=== | ===4: Bandwidth hogs=== | ||
Group members: Mike Preston |
Revision as of 02:57, 19 January 2011
Readings
January 13, 2011: CCR (two papers)
January 18, 2011: OceanStore and Pond
Internet Governance
Problems to Solve
- Attack computers with almost no consequences
- DDoS
- botnets
- capture and analyze private traffic
- distribute malware
- tampering with traffic
- Unauthorized access to data and resources
- Impersonate computers, individuals, applications
- Fraud, theft
- regulate behavior
Design Principles
- subjects of governance: programs and computers
- bind programs and computers to humans & human organizations, but recognize binding is imperfect
- recognize that "bad" behavior is always possible. "good" behavior is enforced through incentives and sanctions.
- rules will change. Even rules for rule changes will change. Need a "living document" governing how rules are chosen and enforced.
Scenarios
1: Stopping DDoS
Group members: Seyyed, Andrew Schoenrock, Thomas McMahon
2: Stopping phishing
Group members: Waheed Ahmed
3: Limiting the spread of malware
Group members: keith, Andrew
4: Bandwidth hogs
Group members: Mike Preston