Web Hosting News

  Home arrow Web Hosting News arrow Page 4 - How Resilient is the Internet?
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

How Resilient is the Internet?
By: Terri Wells
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 1

    Table of Contents:
  • How Resilient is the Internet?
  • Attack and Defense
  • Hackable Majority
  • Securing the Internet's Future

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    How Resilient is the Internet? - Securing the Internet's Future

    (Page 4 of 4 )

    Though the Internet was designed to survive a nuclear attack, it is currently functioning under a load it wasn't designed for. It is suffering under the weight of spammers, hackers, phishers, mobile gadgets, interactive multimedia applications and a variety of Internet-enabled devices - including phones, cars, home appliances and radio frequency identification tags (RFID). While many professionals are working hard to eliminate the problems posed by spammers, hackers, and phishers, not all of the new traffic on the Internet is malicious. But given that the Internet was originally designed with the idea that users were immobile and connected to the Internet via wires, the wireless mobility afforded by many new Internet-enabled devices has increased complexity to a level that some believe the net cannot support.

    We can't actually start from scratch, but some people are doing research that could change the face of the Internet. The National Science Foundation is investing $300 million to $400 million in building something called the Global Environment for Networking Innovation. Computerworld reported that GENI "will be a giant test laboratory stretching across the U.S., complete with wired and wireless computers, routers, switches, management software and subnets of wireless, cellular, sensor and radio devices. It will include a fiber-optic backbone and tail circuits to some 200 universities."

    Those who want to test their ideas will be able to contract for a slice of GENI. Users will be able to trial any sort of networking idea. After these ideas are tested out, researchers might find a way to implement the promising ones onto the Internet we already have. Allison Mankin, a co-manager of GENI, points out one reason why the way we have done things so far, with incremental improvement, is no longer enough: "people have actually proven that it's impossible to prevent denial-of-service attacks with the current Internet. If you want to build a network without denial of service, you have to start over."

    Building a new network, or even changing the current one, runs into some interesting issues. Robert Kahn, co-inventor of TCP/IP, noted that "The reason we don't have security in the current Internet isn't solely a technical matter." What is spam? What is pornography? We may think we know, but that may change depending on who is viewing it. So when you try to introduce a technical solution, you will inevitably run into concerns about privacy and censorship.

    Even with all the hurdles, and the fact that we will probably never have a clean slate, it makes sense to try improving the Internet with this approach. There are many projects involved, some with windows as long as 15 years. We may yet see an Internet with no spam, no viruses, no Trojans, and no back doors one day.

    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.


    - FreedomPop Offering Open Wi-Fi Service
    - Go Daddy Goes to India
    - Netelligent, Savvis Add New Canadian Web Hos...
    - World IPv6 Launch Happens Today
    - IT Teams Struggle to Keep Pace with Malware
    - Lulz Security Hacks CIA, Takes Requests
    - Apple Unveils iCloud
    - Rackspace Introduces Cloud Load Balancers
    - Amazon Offers Cloud Drive, Disses Music Indu...
    - New Android.Pjapps Trojan
    - Copyright Fight over Hurt Locker Downloads I...
    - Data Reveals Many Browsers Remain Unpatched
    - PandaLabs Report - What Happens to Stolen In...
    - Safari Books Online Review
    - Hackers Targeting Human Rights Groups

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap