gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst


From: Hermanni Hyytiälä
Subject: [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst
Date: Fri, 06 Jun 2003 07:45:06 -0400

CVSROOT:        /cvsroot/storm
Module name:    storm
Branch:         
Changes by:     Hermanni Hyytiälä <address@hidden>      03/06/06 07:45:05

Modified files:
        doc/pegboard/attacking_gisp--hemppah: peg.rst 

Log message:
        updates

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/storm/storm/doc/pegboard/attacking_gisp--hemppah/peg.rst.diff?tr1=1.10&tr2=1.11&r1=text&r2=text

Patches:
Index: storm/doc/pegboard/attacking_gisp--hemppah/peg.rst
diff -u storm/doc/pegboard/attacking_gisp--hemppah/peg.rst:1.10 
storm/doc/pegboard/attacking_gisp--hemppah/peg.rst:1.11
--- storm/doc/pegboard/attacking_gisp--hemppah/peg.rst:1.10     Fri Jun  6 
05:35:30 2003
+++ storm/doc/pegboard/attacking_gisp--hemppah/peg.rst  Fri Jun  6 07:45:05 2003
@@ -5,8 +5,8 @@
 
 :Authors:  Hermanni Hyytiälä
 :Date-Created: 2003-06-05
-:Last-Modified: $Date: 2003/06/06 09:35:30 $
-:Revision: $Revision: 1.10 $
+:Last-Modified: $Date: 2003/06/06 11:45:05 $
+:Revision: $Revision: 1.11 $
 :Status:   Incomplete
 
 .. :Stakeholders:
@@ -16,24 +16,32 @@
 .. Affect-PEGs:
 
 This PEG document briefly describes the attack methods used by a "killer" 
-program against the GISP P2P software. The program is used to test GISP's
-robustness against hostile attacks.  
+program against the GISP P2P software. The program is intended to be used
+to test GISP's robustness against hostile attacks.  
 
-In this document we mean with "peer" as an entity which is able to do a 
+In this document we mean with "hostile peer" as an entity which is able to do 
a 
 (limited/simplified/modified) number of regular GISP peer's functionalies
 in a way which may be harmful for the GISP network w.r.t. performance
-and redundancy. The harmfulness of a peer be a consequence of the fact
-that a peer is faulty, or a peer is wilfully malicious. 
+and redundancy. The harmfulness of a peer is a consequence of the fact
+that a peer is wilfully malicious. 
 
 Disclaimer
 ==========
 This program is only used for research purposes and
 the goal is to improve GISP's resilience against hostile attacks.
 
+Additionally, the author of GISP has stated that he will address 
+attacks as they become a problem. This inclines to think 
+that writing an attack program will get the author to address 
+that attacks.
+
 
 Research problems
 =================
 
+GISP does not appear to address the attacks against DHT systems
+described in Ref_1_ and Ref_2_.
+
 For determining whether GISP is resilient against hostile attack, 
 we want the answers to the following questions:
 
@@ -80,7 +88,7 @@
 By using above scenarios, we want to clarify GISP's properties with regard to 
research 
 questions.
 
-*=We start the simulation process with these scenarios.  
+\*=We start the simulation process with these scenarios.  
   
 Issues
 ======
@@ -95,3 +103,6 @@
 No changes are required to the Storm implementation
 codebase.
 
+
+.. _Ref_1: http://www.cs.rice.edu/Conferences/IPTPS02/173.pdf    
+.. _Ref_2: 
http://dcslab.snu.ac.kr/~buggy/p2p/paper/security/Pastry%20--%20Security%20for%20structured%20peer-to-peer%20overlay%20networks.pdf




reply via email to

[Prev in Thread] Current Thread [Next in Thread]