Estimators are already dynamic. The fixed number of points wanders around the keyspace in order to have more coverage in areas that need it most. Estimators deliberately carry relatively low resolution in order to encourage specialization, or that was my impression - you could ask Ian, he designed it.
On Wed, Oct 29, 2003 at 06:52:10PM -0800, pineapple wrote: > I hate to reply to my own message, it's embarrassing > :) If you think my suggestion is totally out to > lunch, please say so. I can handle some constructive > criticism. > > ----- Original Message ----- > From: "pineapple" <[EMAIL PROTECTED]> > To: <[EMAIL PROTECTED]> > Sent: Wednesday, October 29, 2003 12:34 AM > Subject: [freenet-dev] Re: Frost and Routing - > solution ? How about dynamicestimators? > > > > This problem is due to having fewer estimators than > > keys in the keyspace (due to resource constraints :) > > and interpolating between estimators. The attack is > > exploiting this interpolation. I propose using > > dynamic estimators to thwart this attack. If an > > estimator is "moving" a lot it is either due to > dnf's > > or the data being found nearby. In either case, it > > may be a good idea to spawn one or more NEW > estimators > > near the old one. This way NGR can > ddynamicallyscale > > it's precision in certain parts of the keyspace if > > there happens to be a lot of keys in that area or > the > > new estimators can act as a "wall" to thwart the > > attack. Another idea is to have the estimators > "move" > > faster, but I think this would introduce more noise > > into NGR. Maybe we could analyze the amount of NGR > > noise and add more estimators if there is too much > > noise. Just some thoughts. > > > > ----- Original Message ----- > > From: "Toad" <[EMAIL PROTECTED]> > > To: "Discussion of development issues" > > <[EMAIL PROTECTED]> > > Sent: Tuesday, October 28, 2003 5:22 PM > > Subject: Re: [freenet-dev] Re: Frost and Routing - > > solution ? > > I have a better attack. You are targetting a > > particular area of the > > keyspace. Request a long stream of random keys very > > close to the target > > key. They will all DNF, and reduce the pDNF in that > > area of each node > > the node routes the request to, until the estimator > is > > so low that it > > tries a different node. Keep on requesting and you > can > > effectively > > eliminate the node's ability to route requests in > that > > region... I have > > no idea how to fight this attack :(. Anyone have any > > reason why it > > wouldn't work? > > > > > __________________________________ > Do you Yahoo!? > Exclusive Video Premiere - Britney Spears > http://launch.yahoo.com/promos/britneyspears/ > _______________________________________________ > Devl mailing list > [EMAIL PROTECTED] > http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl -- Matthew J Toseland - [EMAIL PROTECTED] Freenet Project Official Codemonkey - http://freenetproject.org/ ICTHUS - Nothing is impossible. Our Boss says so.
signature.asc
Description: Digital signature
_______________________________________________ Devl mailing list [EMAIL PROTECTED] http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl
