Notes On The Design Of An Internet Adversary. Rosenthal, D. S. H., Maniatis, P., Roussopoulos, M., Giuli, T. J., & Baker, M. In pages 10, Santa Fe, New Mexico, United States of America, November, 2003. arXiv: cs/0411078
Notes On The Design Of An Internet Adversary [link]Paper  abstract   bibtex   
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an assessment of the capabilities of the adversary. The design typically evolves through a process of simulating both the system and the adversary. This requires the design and implementation of a simulated adversary based on the capability assessment. Consensus on the capabilities of a suitable adversary is not evident. Part of the recent redesign of the protocol used by peers in the LOCKSS digital preservation system included a conservative assessment of the adversary's capabilities. We present our assessment and the implications we drew from it as a step towards a reusable adversary specification.
@inproceedings{rosenthal_notes_2003,
	address = {Santa Fe, New Mexico, United States of America},
	title = {Notes {On} {The} {Design} {Of} {An} {Internet} {Adversary}},
	url = {http://arxiv.org/abs/cs/0411078},
	abstract = {The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an assessment of the capabilities of the adversary. The design typically evolves through a process of simulating both the system and the adversary. This requires the design and implementation of a simulated adversary based on the capability assessment. Consensus on the capabilities of a suitable adversary is not evident. Part of the recent redesign of the protocol used by peers in the LOCKSS digital preservation system included a conservative assessment of the adversary's capabilities. We present our assessment and the implications we drew from it as a step towards a reusable adversary specification.},
	language = {en},
	urldate = {2018-07-09},
	author = {Rosenthal, David S. H. and Maniatis, Petros and Roussopoulos, Mema and Giuli, T. J. and Baker, Mary},
	month = nov,
	year = {2003},
	note = {arXiv: cs/0411078},
	pages = {10},
	file = {}
}

Downloads: 0