[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst
From: |
Hermanni Hyytiälä |
Subject: |
[Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst |
Date: |
Fri, 06 Jun 2003 07:45:06 -0400 |
CVSROOT: /cvsroot/storm
Module name: storm
Branch:
Changes by: Hermanni Hyytiälä <address@hidden> 03/06/06 07:45:05
Modified files:
doc/pegboard/attacking_gisp--hemppah: peg.rst
Log message:
updates
CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/storm/storm/doc/pegboard/attacking_gisp--hemppah/peg.rst.diff?tr1=1.10&tr2=1.11&r1=text&r2=text
Patches:
Index: storm/doc/pegboard/attacking_gisp--hemppah/peg.rst
diff -u storm/doc/pegboard/attacking_gisp--hemppah/peg.rst:1.10
storm/doc/pegboard/attacking_gisp--hemppah/peg.rst:1.11
--- storm/doc/pegboard/attacking_gisp--hemppah/peg.rst:1.10 Fri Jun 6
05:35:30 2003
+++ storm/doc/pegboard/attacking_gisp--hemppah/peg.rst Fri Jun 6 07:45:05 2003
@@ -5,8 +5,8 @@
:Authors: Hermanni Hyytiälä
:Date-Created: 2003-06-05
-:Last-Modified: $Date: 2003/06/06 09:35:30 $
-:Revision: $Revision: 1.10 $
+:Last-Modified: $Date: 2003/06/06 11:45:05 $
+:Revision: $Revision: 1.11 $
:Status: Incomplete
.. :Stakeholders:
@@ -16,24 +16,32 @@
.. Affect-PEGs:
This PEG document briefly describes the attack methods used by a "killer"
-program against the GISP P2P software. The program is used to test GISP's
-robustness against hostile attacks.
+program against the GISP P2P software. The program is intended to be used
+to test GISP's robustness against hostile attacks.
-In this document we mean with "peer" as an entity which is able to do a
+In this document we mean with "hostile peer" as an entity which is able to do
a
(limited/simplified/modified) number of regular GISP peer's functionalies
in a way which may be harmful for the GISP network w.r.t. performance
-and redundancy. The harmfulness of a peer be a consequence of the fact
-that a peer is faulty, or a peer is wilfully malicious.
+and redundancy. The harmfulness of a peer is a consequence of the fact
+that a peer is wilfully malicious.
Disclaimer
==========
This program is only used for research purposes and
the goal is to improve GISP's resilience against hostile attacks.
+Additionally, the author of GISP has stated that he will address
+attacks as they become a problem. This inclines to think
+that writing an attack program will get the author to address
+that attacks.
+
Research problems
=================
+GISP does not appear to address the attacks against DHT systems
+described in Ref_1_ and Ref_2_.
+
For determining whether GISP is resilient against hostile attack,
we want the answers to the following questions:
@@ -80,7 +88,7 @@
By using above scenarios, we want to clarify GISP's properties with regard to
research
questions.
-*=We start the simulation process with these scenarios.
+\*=We start the simulation process with these scenarios.
Issues
======
@@ -95,3 +103,6 @@
No changes are required to the Storm implementation
codebase.
+
+.. _Ref_1: http://www.cs.rice.edu/Conferences/IPTPS02/173.pdf
+.. _Ref_2:
http://dcslab.snu.ac.kr/~buggy/p2p/paper/security/Pastry%20--%20Security%20for%20structured%20peer-to-peer%20overlay%20networks.pdf
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/05
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/05
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/05
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/05
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst,
Hermanni Hyytiälä <=
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/10
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/10
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/10
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/10