Increasing the Robustness of Networked Systems Srikanth Kandula

Total Page:16

File Type:pdf, Size:1020Kb

Increasing the Robustness of Networked Systems Srikanth Kandula Increasing the Robustness of Networked Systems by Srikanth Kandula M.S., University of Illinois at Urbana-Champaign () B.Tech., Indian Institute of Technology, Kanpur () Submitted to the Department of Electrical Engineering and Computer Science in partial ful llment of the requirements for the degree of Doctor of Philosophy at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY February © Srikanth Kandula, MMIX. All rights reserved. e author hereby grants to MIT permission to reproduce and distribute publicly paper and electronic copies of this thesis document in whole or in part. Author............................................. ................. Department of Electrical Engineering and Computer Science September , Certi edby......................................... ................. Dina Katabi Associate Professor esis Supervisor Acceptedby......................................... ................ Terry P.Orlando Chairman, Department Committee on Graduate Students Increasing the Robustness of Networked Systems by Srikanth Kandula Submitted to the Department of Electrical Engineering and Computer Science on February, , in partial ful llment of the requirements for the degree of Doctor of Philosophy Abstract What popular news do you recall about networked systems? You’ve probably heard about the several hour failure at Amazon’s computing utility that knocked down many startups for several hours, or the attacks that forced the Estonian government web-sites to be inaccessible for several days, or you may have observed inexplicably slow responses or errors from your favorite web site. Needless to say, keeping networked systems robust to attacks and failures is an increasingly signi cant problem. Why is it hard to keep networked systems robust? We believe that uncontrollable in- puts and complex dependencies are the two main reasons. e owner of a web-site has little control on when users arrive; the operator of an ISP has little say in when a ber gets cut; and the administrator of a campus network is unlikely to know exactly which switches or le-servers may be causing a user’s sluggish performance. Despite unpredictable or mali- cious inputs and complex dependencies we would like a network to self-manage itself, i.e., diagnose its own faults and continue to maintain good performance. is dissertation presents a generic approach to harden networked systems by distin- guishing between two scenarios. For systems that need to respond rapidly to unpredictable inputs, we design online solutions that re-optimize resource allocation as inputs change. For systems that need to diagnose the root cause of a problem in the presence of complex sub- system dependencies, we devise techniques to infer these dependencies from packet traces and build functional representations that facilitate reasoning about the most likely causes for faults. We present a few solutions, as examples of this approach, that tackle an important class of network failures. Speci cally, we address () re-routing trac around congestion when trac spikes or links fail in internet service provider networks, () protecting web- sites from denial of service attacks that mimic legitimate users and () diagnosing causes of performance problems in enterprises and campus-wide networks. rough a combination of implementations, simulations and deployments, we show that our solutions advance the state-of-the-art. esis Supervisor: Dina Katabi Title: Associate Professor Contents Prior Published Work Acknowledgments Introduction . Robustness as a Resource Management Problem ............... .. Online Trac Engineering ...................... .. Protecting Against Denial-of-Service Attacks that Mimic Legitimate Requests ................................ . Robustness as a Learning Problem ...................... .. Learning Communication Rules ................... .. Localizing Faults and Performance Problems ............ Defending Against DDoS Attacks at Mimic Flash Crowds . Overview .................................... . reat Model .................................. . Separating Legitimate Users from Attackers ................. .. Activating the Authentication Mechanism .............. .. CAPTCHA-Based Authentication .................. .. Authenticating Users Who Do Not Answer CAPTCHAs ...... .. Criterion to Distinguish Legitimate Users and Zombies ....... . Managing Resources Eciently ........................ .. Results of the Analysis ......................... .. Adaptive Admission Control ..................... . Security Analysis ................................ . Kill-Bots System Architecture ......................... . Evaluation ................................... .. Experimental Environment ...................... .. Microbenchmarks ........................... .. Kill-Bots under Cyberslam ...................... .. Kill-Bots under Flash Crowds ..................... .. Bene t from Admission Control ................... .. User Willingness to Solve Puzzles ................... . Related Work .................................. . Generalizing & Extending Kill-Bots ...................... . Limitations & Open Issues ........................... . Conclusion ................................... Responsive Yet Stable Trac Engineering . Overview .................................... . Problem Formalization ............................. . TeXCP Design ................................. .. Path Selection ............................. .. Probing Network State ........................ .. e Load Balancer ........................... .. Preventing Oscillations and Managing Congestion ......... .. Shorter Paths First ........................... . Analysis ..................................... . Performance .................................. .. Topologies & Trac Demands .................... .. Metric ................................. .. Simulated TE Techniques ....................... .. Comparison With the OSPF Optimizer ............... .. Comparison With MATE ....................... .. TeXCP Convergence Time ...................... .. Number of Active Paths ........................ .. Automatic Selection of Shorter Paths ................. . Implementation & Deployment ........................ . Related Work .................................. . Further Discussion ............................... . Concluding Remarks .............................. Learning Communication Rules . Overview .................................... . Learning Communication Rules ........................ .. From Dependency to Association .................. .. Signi cance of a Communication Rule ................ .. Generic Communication Rules .................... . Algorithms to Mine for Rules ......................... .. Composing Communication Rules .................. .. Towards a Streaming Solution .................... . Evaluation ................................... .. Dataset ................................. .. Metrics ................................. .. Nature of the Rule-Mining Problem ................. .. Evaluation in Controlled Settings ................... .. Micro-Evaluation ........................... .. Case Study: Patterns in the Enterprise ................ .. Case: Patterns in the LabEnterprise .................. .. Case: Patterns on the Lab’s Access Link ................ .. Case Study: Rules for HotSpot Traces ................ . Discussion ................................... . Related Work .................................. . Conclusion ................................... Localizing Faults and Performance Problems . Overview .................................... . Related Work .................................. . e Inference Graph Model .......................... .. e Inference Graph .......................... .. Fault Localization on the Inference Graph .............. . e Sherlock System .............................. .. Constructing the Inference Graph .................. .. Fault Localization Using Ferret .................... . Implementation ................................ . Evaluation ................................... .. Micro-Evaluation ........................... .. Evaluation of Field Deployment ................... .. Comparing Sherlock with Prior Approaches ............. .. Time to Localize Faults ........................ .. Impact of Errors in Inference Graph ................. .. Modeling Redundancy Techniques .................. .. Summary of Results .......................... . Discussion ................................... . Conclusions .................................. Concluding Remarks Appendix A. Analysing Kill-Bots ............................... B. Interaction between Admission Control and Re-transmissions ....... C. Stability of e Kill-Bots Controller ...................... D. Proof of TeXCP Stability due to Explicit Feedback .............. E. Proof of TeXCP Load Balancer Convergence ................. F. Value of Preferring Shorter Paths in TeXCP .................. G. Propagating State for Meta-Nodes in Sherlock ................ Bibliography Prior Published Work is thesis builds on some prior published work. Chapter contains joint work with Dina Katabi, Matthias Jacob and Arthur Berger pub- lished at NSDI’ []. Chapter contains joint work with Dina Katabi, Bruce Davie and Anna Charny that was published at SIGCOMM’ []. Chapter contains joint work with Ranveer Chandra and Dina Katabi published at SIGCOMM’ []. Chapter builds on Sherlock [], joint work with Victor Bahl, Ranveer Chandra, Albert
Recommended publications
  • The Operational Aesthetic in the Performance of Professional Wrestling William P
    Louisiana State University LSU Digital Commons LSU Doctoral Dissertations Graduate School 2005 The operational aesthetic in the performance of professional wrestling William P. Lipscomb III Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_dissertations Part of the Communication Commons Recommended Citation Lipscomb III, William P., "The operational aesthetic in the performance of professional wrestling" (2005). LSU Doctoral Dissertations. 3825. https://digitalcommons.lsu.edu/gradschool_dissertations/3825 This Dissertation is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Doctoral Dissertations by an authorized graduate school editor of LSU Digital Commons. For more information, please [email protected]. THE OPERATIONAL AESTHETIC IN THE PERFORMANCE OF PROFESSIONAL WRESTLING A Dissertation Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Doctor of Philosophy in The Department of Communication Studies by William P. Lipscomb III B.S., University of Southern Mississippi, 1990 B.S., University of Southern Mississippi, 1991 M.S., University of Southern Mississippi, 1993 May 2005 ©Copyright 2005 William P. Lipscomb III All rights reserved ii ACKNOWLEDGMENTS I am so thankful for the love and support of my entire family, especially my mom and dad. Both my parents were gifted educators, and without their wisdom, guidance, and encouragement none of this would have been possible. Special thanks to my brother John for all the positive vibes, and to Joy who was there for me during some very dark days.
    [Show full text]
  • A Double Horizon Defense Design for Robust Regulation of Malicious Traffic
    University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering August 2006 A Double Horizon Defense Design for Robust Regulation of Malicious Traffic Ying Xu University of Pennsylvania, [email protected] Roch A. Guérin University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/ese_papers Recommended Citation Ying Xu and Roch A. Guérin, "A Double Horizon Defense Design for Robust Regulation of Malicious Traffic", . August 2006. Copyright 2006 IEEE. In Proceedings of the Second IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm 2006). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/ese_papers/190 For more information, please contact [email protected]. A Double Horizon Defense Design for Robust Regulation of Malicious Traffic Abstract Deploying defense mechanisms in routers holds promises for protecting infrastructure resources such as link bandwidth or router buffers against network Denial-of-Service (DoS) attacks. However, in spite of their efficacy against bruteforce flooding attacks, existing outer-basedr defenses often perform poorly when confronted to more sophisticated attack strategies.
    [Show full text]
  • Speeding up Correlation Search for Binary Data
    Speeding up Correlation Search for Binary Data Lian Duan and W. Nick Street [email protected] Management Sciences Department The University of Iowa Abstract Finding the most interesting correlations in a collection of items is essential for problems in many commercial, medical, and scientific domains. Much previous re- search focuses on finding correlated pairs instead of correlated itemsets in which all items are correlated with each other. Though some existing methods find correlated itemsets of any size, they suffer from both efficiency and effectiveness problems in large datasets. In our previous paper [10], we propose a fully-correlated itemset (FCI) framework to decouple the correlation measure from the need for efficient search. By wrapping the desired measure in our FCI framework, we take advantage of the desired measure’s superiority in evaluating itemsets, eliminate itemsets with irrelevant items, and achieve good computational performance. However, FCIs must start pruning from 2-itemsets unlike frequent itemsets which can start the pruning from 1-itemsets. When the number of items in a given dataset is large and the support of all the pairs cannot be loaded into the memory, the IO cost O(n2) for calculating correlation of all the pairs is very high. In addition, users usually need to try different correlation thresholds and the cost of processing the Apriori procedure each time for a different threshold is very high. Consequently, we propose two techniques to solve the efficiency problem in this paper. With respect to correlated pair search, we identify a 1-dimensional monotone prop- erty of the upper bound of any good correlation measure, and different 2-dimensional monotone properties for different types of correlation measures.
    [Show full text]
  • Here Is a Printable
    James Rosario is a film critic, punk rocker, librarian, and life-long wrestling mark. He grew up in Moorhead, Minnesota/Fargo, North Dakota going to as many punk shows as possible and trying to convince everyone he met to watch his Japanese Death Match and ECW tapes with him. He lives in Asheville, North Carolina with his wife and two kids where he writes his blog, The Daily Orca. His favorite wrestlers are “Nature Boy” Buddy Rogers, The Sheik, and Nick Bockwinkel. Art Fuentes lives in Orange County, Califonia and spends his days splashing ink behind the drawing board. One Punk’s Guide is a series of articles where Razorcake contributors share their love for a topic that is not traditionally considered punk. Previous Guides have explored everything from pinball, to African politics, to outlaw country music. Razorcake is a bi-monthly, Los Angeles-based fanzine that provides consistent coverage of do-it-yourself punk culture. We believe in positive, progressive, community-friendly DIY punk, and are the only bona fide 501(c)(3) non-profit music magazine in America. We do our part. One Punk’s Guide to Professional Wrestling originally appeared in Razorcake #101, released in December 2017/January 2018. Illustrations by Art Fuentes. Original layout by Todd Taylor. Zine design by Marcos Siref. Printing courtesy of Razorcake Press, Razorcake.org ONE PUNK’S GUIDE TO PROFESSIONAL WRESTLING ’ve been watching and following professional wrestling for as long as I can remember. I grew up watching WWF (World Wrestling IFederation) Saturday mornings in my hometown of Moorhead, Minn.
    [Show full text]
  • Narrative Change in Professional Wrestling: Audience Address and Creative Authority in the Era of Smart Fans
    Georgia State University ScholarWorks @ Georgia State University Communication Dissertations Department of Communication 1-6-2017 Narrative Change in Professional Wrestling: Audience Address and Creative Authority in the Era of Smart Fans Christian Norman Follow this and additional works at: https://scholarworks.gsu.edu/communication_diss Recommended Citation Norman, Christian, "Narrative Change in Professional Wrestling: Audience Address and Creative Authority in the Era of Smart Fans." Dissertation, Georgia State University, 2017. https://scholarworks.gsu.edu/communication_diss/77 This Dissertation is brought to you for free and open access by the Department of Communication at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Communication Dissertations by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. NARRATIVE CHANGE IN PROFESSIONAL WRESTLING: AUDIENCE ADDRESS AND CREATIVE AUTHORITY IN THE ERA OF SMART FANS by CHRISTIAN NORMAN Under the Direction of Nathan Atkinson, PhD ABSTRACT This dissertation project provides a methodological contribution to the field of critical rhetoric by positioning narrative theory as a powerful yet underutilized tool for examining the power dynamic between producer and consumer in a participatory media context. Drawing on theories of author and audience from rhetorical narratology, this study shows how producers of media texts provide rhetorical cues to audiences that allow them to reassert their power in the form of creative authority vis-à-vis consumers. The genre of professional wrestling serves as an ideal text for examining such power dynamics, as WWE has adapted to changing fan participatory behaviors throughout its sixty-year history. Focusing on pivotal moments in which WWE altered its narrative address to its audience in order to reassert its control over the production process, this study demonstrates the utility of narrative theory for understanding how creative authority shows power at work in media texts.
    [Show full text]
  • Mining Web User Behaviors to Detect Application Layer Ddos Attacks
    JOURNAL OF SOFTWARE, VOL. 9, NO. 4, APRIL 2014 985 Mining Web User Behaviors to Detect Application Layer DDoS Attacks Chuibi Huang1 1Department of Automation, USTC Key laboratory of network communication system and control Hefei, China Email: [email protected] Jinlin Wang1, 2, Gang Wu1, Jun Chen2 2Institute of Acoustics, Chinese Academy of Sciences National Network New Media Engineering Research Center Beijing, China Email: {wangjl, chenj}@dsp.ac.cn Abstract— Distributed Denial of Service (DDoS) attacks than TCP or UDP-based attacks, requiring fewer network have caused continuous critical threats to the Internet connections to achieve their malicious purposes. The services. DDoS attacks are generally conducted at the MyDoom worm and the CyberSlam are all instances of network layer. Many DDoS attack detection methods are this type attack [2, 3]. focused on the IP and TCP layers. However, they are not suitable for detecting the application layer DDoS attacks. In The challenges of detecting the app-DDoS attacks can this paper, we propose a scheme based on web user be summarized as the following aspects: browsing behaviors to detect the application layer DDoS • The app-DDoS attacks make use of higher layer attacks (app-DDoS). A clustering method is applied to protocols such as HTTP to pass through most of extract the access features of the web objects. Based on the the current anomaly detection systems designed access features, an extended hidden semi-Markov model is for low layers. proposed to describe the browsing behaviors of web user. • Along with flooding, App-DDoS traces the The deviation from the entropy of the training data set average request rate of the legitimate user and uses fitting to the hidden semi-Markov model can be considered as the abnormality of the observed data set.
    [Show full text]
  • New Leads Heat up Cold Case Senior Sarah Szoka Decorates Her Advi- Sory’S Christmas Tree During Their Toys for Claybrook Missing
    Wrestlepalooza! ‘Patriot’ Teachers hashes out reveal their JC wrestlers dominate the mats at seasonal event truth on teenage marijuana identities SPORTS 16 IN-DEPTH 8 LIFESTYLE 4 The John Carroll School 703 E. Churchville Rd. Bel Air, MD 21014 theDecember 2010 patriotCheck out JCPATRIOT.COM for the latest news and updates Volume 46 Issue 3 Advisories focus on holiday outreach Photo by Jenny Hottle Photo by Kristin Marzullo New leads heat up cold case Senior Sarah Szoka decorates her advi- sory’s Christmas tree during their Toys for Claybrook missing. mystery of Claybrook’s death “really hits Jenny Hottle, Caroline Spath Tots collection. Advisories are working to On March 10, an off-duty police of- you forever.” Online Chief, Multimedia Editor support families this holiday season. ficer was walking his dog when he found While no signs of a struggle were re- Twenty-seven years after the unsolved Claybrook strangled. She was propped up portedly found at the scene of the body, Grace Kim murder of a JC student, recent news tips against a fence less than a mile from her investigators remain unsure as to whether Managing Editor and an ABC 2 News cold case segment home, in a field now known as the Trails Claybrook was killed onsite or placed there have brought attention to the case. at Gleneagles development, located behind later, according to Brad Helm, the Bel Air Advisories have hung their lights and Jennifer Claybrook, class of ’86, was a Maple View Drive in Bel Air. Police Department detective who is cur- even trimmed their trees.
    [Show full text]
  • Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
    THE NATIONAL ACADEMIES PRESS This PDF is available at http://nap.edu/12651 SHARE Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities DETAILS 390 pages | 6x9 | PAPERBACK ISBN 978-0-309-13850-5 | DOI 10.17226/12651 AUTHORS BUY THIS BOOK William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors; Committee on Offensive Information Warfare; National Research Council FIND RELATED TITLES Visit the National Academies Press at NAP.edu and login or register to get: – Access to free PDF downloads of thousands of scientific reports – 10% off the price of print titles – Email or social media notifications of new titles related to your interests – Special offers and discounts Distribution, posting, or copying of this PDF is strictly prohibited without written permission of the National Academies Press. (Request Permission) Unless otherwise indicated, all materials in this PDF are copyrighted by the National Academy of Sciences. Copyright © National Academy of Sciences. All rights reserved. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of CYBerattacK CapaBILITIes William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Editors Committee on Offensive Information Warfare Computer Science and Telecommunications Board Division on Engineering and Physical Sciences Copyright National Academy of Sciences. All rights reserved. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities THE NATIONAL ACADEMIES PRESS 500 Fifth Street, N.W. Washington, DC 20001 NOTICE: The project that is the subject of this report was approved by the Gov- erning Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engi- neering, and the Institute of Medicine.
    [Show full text]
  • An Examination of WWE Wrestling Isamu Horiuchi Claremont Graduate University
    Claremont Colleges Scholarship @ Claremont CGU Theses & Dissertations CGU Student Scholarship 2012 Stylizing, Commodifying, and Disciplining Real Bodies: An Examination of WWE Wrestling Isamu Horiuchi Claremont Graduate University Recommended Citation Horiuchi, Isamu. (2012). Stylizing, Commodifying, and Disciplining Real Bodies: An Examination of WWE Wrestling. CGU Theses & Dissertations, 55. http://scholarship.claremont.edu/cgu_etd/55. doi: 10.5642/cguetd/55 This Open Access Dissertation is brought to you for free and open access by the CGU Student Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in CGU Theses & Dissertations by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. Stylizing, Commodifying, and Disciplining Real Bodies: An Examination of WWE Wrestling A dissertation submitted to the Faculty of Claremont Graduate University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Cultural Studies by Isamu Horiuchi Claremont Graduate University, 2012 © Copyright Isamu Horiuchi, 2012 All rights reserved. APPROVAL OF THE REVIEW COMMITTEE This dissertation has been duly read, reviewed, and critiqued by the Committee listed below, which hereby approves the manuscript of Isamu Horiuchi as fulfilling the scope and quality requirements for meriting the degree of Doctor of Philosophy in Cultural Studies. Henry Krips, Chair Claremont Graduate University Professor of Cultural Studies Andrew W. Mellon All-Claremont Chair of Humanities Alexandra Juhasz, Member Pitzer College Professor of Media Studies Kathleen Fitzpatrick, Member Pomona College Professor of Media Studies Abstract Stylizing, Commodifying, and Disciplining Real Bodies: An Examination of WWE wrestling by Isamu Horiuchi Claremont Graduate University: 2012 This dissertation examines professional wrestling in the U.S., in particular, live and television shows produced by the World Wrestling Entertainment (WWE).
    [Show full text]
  • Building Ambitious Us Subnational Climate Initiatives: Embracing Dignity and the Tradition of Civic Engagement
    BUILDING AMBITIOUS US SUBNATIONAL CLIMATE INITIATIVES: EMBRACING DIGNITY AND THE TRADITION OF CIVIC ENGAGEMENT A Thesis submitted to the Faculty of The School of Continuing Studies and of The Graduate School of Arts and Sciences in partial fulfillment of the requirements for the degree of Doctor of Liberal Studies By Cyd Slayton, M.F.A Georgetown University Washington, D.C. April 2018 Copyright 2018 by Cyd Slayton All Rights Reserved ii BUILDING AMBITIOUS US SUBNATIONAL CLIMATE INITIATIVES: EMBRACING DIGNITY AND THE TRADITION OF CIVIC ENGAGEMENT Cyd Slayton, M.F.A. DLS Chair: Thomas Kerch, Ph.D. ABSTRACT The human activity of emitting greenhouse gasses (GHGs) is contributing to the intensification of extreme weather, according to nearly all climate scientists. Already, atmospheric concentrations of the three most heat-trapping greenhouse gasses (GHGs)— carbon dioxide, methane, and nitrous oxide—are “unprecedented for at least 800,000 years.”1 As a result, heat waves, droughts, floods, cyclones, wildfires, and rising seas are more frequent and powerful. While the planet will survive the climate catastrophes, a destabilized atmosphere threatens all species, including our own. Over the past 25 years, total GHG emissions have continued to rise, despite international and bilateral climate treaties. Generally, the US has refused to ratify treaties that appear to impinge on national sovereignty, including the Kyoto Protocol with its “top 1 IPCC Working Groups I, II and III, Climate Change 2014: Synthesis Report , Contribution to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change, eds. R.K. Pachauri and L.A. Meyer (Geneva: IPCC, 2014), 4, accessed March 2, 2018, https://www.ipcc.ch/pdf/assessment- report/ar5/syr/AR5_SYR_FINAL_SPM.pdf.
    [Show full text]
  • AUGUST 2005 43 Your Defense Is Offensive STEVE MANZUIK EDITOR ;Login: Is the Official WORKPLACE Rik Farrow Magazine of the [email protected] USENIX Association
    A UGUST 2005 VOLUME 30 NUMBER 4 THE USENIX MAGAZINE OPINION Musings RIK FARROWS Conference Password Sniffing ABE SINGER SYSADMIN The Inevitability of Xen JON CROWCROFT, KEIR FRASER, STEVEN HAND, IAN PRATT, AND ANDREW WARFIELD Secure Automated File Transfer MARK MCCULLOUGH SAN vs. NAS for Oracle: A Tale of Two Protocols ADAM LEVIN Practical Perl ADAM TUROFF ISPadmin ROBERT HASKINS L AW Primer on Cybercrime Laws DANI EL L. APPELMAN SECURITY Forensics for System Administrators SEAN PEISERT Your Defense Is Offensive STEVE MANZUIK WORKPLACE Marketing after the Bubble EMILY W. SALUS AND PETER H. SALUS BOOK REVIEWS Book Reviews RIK FAROWS USENIX NOTES SAGE Update DAVID PARTER ...and much more CONFERENCES 2005 USENIX Annual Technical Conference 2nd Symposium on Networked Systems Design and Implementation (NSDI ’05) 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004) The Advanced Computing Systems Association Upcoming Events INTERNET MEASUREMENT CONFERENCE 2005 4TH USENIX CONFERENCE ON FILE AND (IMC ’05) STORAGE TECHNOLOGIES (FAST ’05) Sponsored by ACM SIGCOMM in cooperation with USENIX Sponsored by USENIX in cooperation with ACM SIGOPS, IEEE Mass Storage Systems Technical Committee (MSSTC), OCTOBER 19–21, 2005, NEW ORLEANS, LA, USA and IEEE TCOS http://www.usenix.org/imc05 DECEMBER 14–16, 2005, SAN FRANCISCO, CA, USA http://www.usenix.org/fast05 ACM/IFIP/USENIX 6TH INTERNATIONAL MIDDLEWARE CONFERENCE 3RD SYMPOSIUM ON NETWORKED SYSTEMS NOVEMBER 28–DECEMBER 2, 2005, GRENOBLE, FRANCE DESIGN AND IMPLEMENTATION (NSDI ’06) http://middleware05.objectweb.org
    [Show full text]
  • Funkhouser, C, Baldwin.S, Prehistoric Digital Poetry. Anarchaeologyof
    Prehistoric Digital Poetry MODERN AND CONTEMPORARY POETICS Series Editors Charles Bernstein Hank Lazer Series Advisory Board Maria Damon Rachel Blau DuPlessis Alan Golding Susan Howe Nathaniel Mackey Jerome McGann Harryette Mullen Aldon Nielsen Marjorie Perloff Joan Retallack Ron Silliman Lorenzo Thomas Jerry Ward Prehistoric Digital Poetry An Archaeology of Forms, 1959–1995 C. T. FUNKHOUSER THE UNIVERSITY OF ALABAMA PRESS Tuscaloosa Copyright © 2007 The University of Alabama Press Tuscaloosa, Alabama 35487-0380 All rights reserved Manufactured in the United States of America Typeface: Minion ∞ The paper on which this book is printed meets the minimum requirements of American National Standard for Information Sciences-Permanence of Paper for Printed Library Materials, ANSI Z39.48-1984. Library of Congress Cataloging-in-Publication Data Funkhouser, Chris. Prehistoric digital poetry : an archaeology of forms, 1959–1995 / C. T. Funkhouser. p. cm. — (Modern and contemporary poetics) Includes bibliographical references and index. ISBN-13: 978-0-8173-1562-7 (cloth : alk. paper) ISBN-10: 0-8173-1562-4 (cloth : alk. paper) ISBN-13: 978-0-8173-5422-0 (pbk. : alk. paper) ISBN-10: 0-8173-5422-0 (pbk. : alk. paper) 1. Computer poetry—History and criticism. 2. Computer poetry—Technique. 3. Interactive multimedia. 4. Hypertext systems. I. Title. PN1059.C6F86 2007 808.10285—dc22 2006037512 Portions of I-VI by John Cage have been reprinted by permission of Harvard University Press, Cambridge, Mass, pp. 1, 2, 5, 103, 435. Copyright © 1990 by the President and Fellows of Harvard College. To my comrades in the present and to cybernetic literary paleontologists of the mythic future “The poem is a machine,” said that famous man, and so I’m building one.
    [Show full text]