Distributed OS: Winter 2011: Difference between revisions
Line 29: | Line 29: | ||
===1: Stopping DDoS=== | ===1: Stopping DDoS=== | ||
Group members: Seyyed | Group members: Seyyed, Andrew S. | ||
===2: Stopping phishing=== | ===2: Stopping phishing=== |
Revision as of 00:41, 19 January 2011
Readings
January 13, 2011: CCR (two papers)
January 18, 2011: OceanStore and Pond
Internet Governance
Problems to Solve
- Attack computers with almost no consequences
- DDoS
- botnets
- capture and analyze private traffic
- distribute malware
- tampering with traffic
- Unauthorized access to data and resources
- Impersonate computers, individuals, applications
- Fraud, theft
- regulate behavior
Design Principles
- subjects of governance: programs and computers
- bind programs and computers to humans & human organizations, but recognize binding is imperfect
- recognize that "bad" behavior is always possible. "good" behavior is enforced through incentives and sanctions.
- rules will change. Even rules for rule changes will change. Need a "living document" governing how rules are chosen and enforced.
Scenarios
1: Stopping DDoS
Group members: Seyyed, Andrew S.
2: Stopping phishing
Group members: Waheed Ahmed
3: Limiting the spread of malware
Group members: keith, Andrew