[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst
From: |
Hermanni Hyytiälä |
Subject: |
[Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst |
Date: |
Fri, 06 Jun 2003 04:33:10 -0400 |
CVSROOT: /cvsroot/storm
Module name: storm
Branch:
Changes by: Hermanni Hyytiälä <address@hidden> 03/06/06 04:33:10
Modified files:
doc/pegboard/attacking_gisp--hemppah: peg.rst
Log message:
better abstract
CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/storm/storm/doc/pegboard/attacking_gisp--hemppah/peg.rst.diff?tr1=1.6&tr2=1.7&r1=text&r2=text
Patches:
Index: storm/doc/pegboard/attacking_gisp--hemppah/peg.rst
diff -u storm/doc/pegboard/attacking_gisp--hemppah/peg.rst:1.6
storm/doc/pegboard/attacking_gisp--hemppah/peg.rst:1.7
--- storm/doc/pegboard/attacking_gisp--hemppah/peg.rst:1.6 Fri Jun 6
04:27:53 2003
+++ storm/doc/pegboard/attacking_gisp--hemppah/peg.rst Fri Jun 6 04:33:10 2003
@@ -5,8 +5,8 @@
:Authors: Hermanni Hyytiälä
:Date-Created: 2003-06-05
-:Last-Modified: $Date: 2003/06/06 08:27:53 $
-:Revision: $Revision: 1.6 $
+:Last-Modified: $Date: 2003/06/06 08:33:10 $
+:Revision: $Revision: 1.7 $
:Status: Incomplete
.. :Stakeholders:
@@ -21,7 +21,8 @@
In this document we mean with "peer" as an entity which is able to do a
(limited/simplified/modified) number of regular GISP peer's functionalies
in a way which may be harmful for the GISP network w.r.t. performance
-and redundancy.
+and redundancy. The harmfulness of a peer be a consequence of the fact
+that a peer is faulty, or a peer is wilfully malicious.
Disclaimer
==========
@@ -35,16 +36,16 @@
For determining whether GISP is resilient against hostile attack,
we want the answers to the following questions:
+- Does GISP have *obvious* exploits ?
+
+- If there are exlpoits, how easily they can be used by an
+ hostile peer ?
+
- Is GISP resilient against (hostile) attacks or not ?
- How severe implications attacks may cause ?
- How well GISP is able to re-organise after a (hostile) attack ?
-
-- Does GISP have *obvious* exploits ?
-
-- If there are exlpoits, how easily they can be used by an
- hostile peer ?
Simulation method
==================
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/05
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/05
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/05
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/05
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst,
Hermanni Hyytiälä <=
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/10
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/10
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/10