gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] gzz/Documentation/misc/hemppah-progradu researc...


From: Hermanni Hyytiälä
Subject: [Gzz-commits] gzz/Documentation/misc/hemppah-progradu researc...
Date: Mon, 10 Feb 2003 09:17:46 -0500

CVSROOT:        /cvsroot/gzz
Module name:    gzz
Changes by:     Hermanni Hyytiälä <address@hidden>      03/02/10 09:17:46

Modified files:
        Documentation/misc/hemppah-progradu: research_problems 

Log message:
        More security issues

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/research_problems.diff?tr1=1.50&tr2=1.51&r1=text&r2=text

Patches:
Index: gzz/Documentation/misc/hemppah-progradu/research_problems
diff -u gzz/Documentation/misc/hemppah-progradu/research_problems:1.50 
gzz/Documentation/misc/hemppah-progradu/research_problems:1.51
--- gzz/Documentation/misc/hemppah-progradu/research_problems:1.50      Mon Feb 
10 08:20:08 2003
+++ gzz/Documentation/misc/hemppah-progradu/research_problems   Mon Feb 10 
09:17:46 2003
@@ -256,8 +256,10 @@
 Robustness:                            How well system performs under hostile  
        Self-tuning, backup links, use
                                        attacks/in the case of severe failure ? 
        diverse routing paths
                                        
-Quality of Service, QoS:               The system cannot promise the quality 
of        
-                                       service in all cases
+Quality of Service, QoS:               The system cannot promise the quality 
of        If needed, use Network proximity 
+                                       service in all cases                    
        for better network performance
+                                                                               
        (bandwidth, latency, jitter, packet 
+                                                                               
        loss)
                                        
 Data availability:                     Data might be temporary unavailable, or 
lost    Data caching, data replication
                                        permanently
@@ -267,18 +269,18 @@
 Anonymity:                             Anonymity cannot be provided in all     
        Remailers
                                        cases
                        
-Malicious nodes:                       There are malicious nodes in the 
system,        Detect
-                                       how we are able to discover them ?
+Malicious nodes:                       There are malicious nodes in the 
system,        Create invariants for node behaviour,
+                                       how we are able to discover them ?      
        verify invariants
                                        
-Mutual distrust:                       Nobody trust anybody, this is a problem
+Mutual distrust:                       Nobody trust anybody, this is a problem 
        Reputation methods
 
-Lack of motivation to cooperate:       All participants do not behave
+Lack of motivation to cooperate:       All participants do not behave          
        
                                        like they should be, instead they go 
for 
                                        own profit
                                        
-Heterogeneity:                         There are different kind of nodes       
        
-                                       in the system, in light of bandwidth
-                                       and computing power
+Heterogeneity:                         There are different kind of nodes       
        Super peers, cluster (broadcasting),
+                                       in the system, in light of bandwidth    
        additional layer upn DHT, structural
+                                       and computing power                     
        simplicity (DHTs)
                                        
 Network proximity:                     Can we take account the underlying      
        Global Network Positioning, Lighthouse
                                        network's properties better when 
forming        technique, trianqulated heuristics
@@ -300,21 +302,21 @@
                                        is needed for better interoperability 
between
                                        different systems
                                        
-Access Control:                                Can we define access control 
levels
+Access Control:                                Can we define access control 
levels             -                                               -
                                        in peer-to-peer network ?
                                        
-System in flux:                                Nodes join and leave system 
constantly:         Half-life phenomenon
+System in flux:                                Nodes join and leave system 
constantly:         Half-life phenomenon (analysis)
                                        load balancing, efficiency ?
                                        
-Inconsistent behaviour:                        Hostile node could act 
correctly with 
+Inconsistent behaviour:                        Hostile node could act 
correctly with           Public keys, digital signatures                 Not 
practical approach
                                        its neighbors, but incorrectly with 
other
                                                                                
-Hostile groups:                                Joining node may join parallel 
network, 
-                                       formed a group of hostile nodes
+Hostile groups:                                Joining node may join parallel 
network,         Use trusted nodes, based on
+                                       formed a group of hostile nodes         
        history information
                                        
-External threats:                      Viruses, troijans, sniffers
-
-Overlay construction:                  Hostile node controls the construction  
        Cryptography    
+External threats:                      Viruses, troijans, sniffers             
        
+                                                                               
        
+Illegal overlay construction:          Hostile node(s) controls the 
construction       Cryptography    
                                        of the network
 
 at each hop, querier knows that the lookup is supposed to get "closer". The 
querier should check this so that




reply via email to

[Prev in Thread] Current Thread [Next in Thread]