parasitic computing

Post on 15-Apr-2017

164 Views

Category:

Education

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

WELCOME….

SEMINAR ON THE TOPIC…

“PARASITIC COMPUTING..” PRESENTED BY,

ATHULYA.S

CONTENTS...........1.Introduction2.how the Communication through internet is done3.Internet Communication4.Implementation5.Proof of Concept6.Creating parasitic message7.Problem for Servers8.Future9.Conclusion10.Reference

What is Parasitic Computing?

… First Reported in journal

‘Nature’ in 2001 by Barabasi, Freech, feong and Brockman

A form of Distributed Computer Architecture

Used for solving ComplexComputational Problems

Target could never know Exploit Standard set of

communication protocol in internet.

Potential standard protocols are TCP, HTTP, IP

How The Communication through Internet is done?

When a user selects a URL….

Actions at Sender

Open a TCP connection to web server

Issues a HTTP request over TCP connection

TCP message is carried via IP

When a user selects a URL….

Receives message through IP Validate checksum at TCP Validated pushed to HTTP Not validated discard the

packet

Actions at receiver

Implementation

Implementation takes place at many layers in inter net

Several protocols may be exploited to perform parasitic computing

Implementation made using TCP or higher levels

Implementation Using TCP

TCP ChecksumProvide enough logic to compute any

Boolean function. HTTP Service

Protocol always send a response to any message received.

TCP Checksum

How it works…

A Single home parasite node initiates the computation

Sends a specially created TCP packet containing a possible solution.

If the possible solution is correct, the HTTP server returns an error message.

If the solution is wrong, then packet is dropped at TCP Layer

Creating Parasitic Message

The problem is constructed as the data part

TCP checksum sent is a representation of expected answer

Parasitic checksum and the variable string are sent to the remote machine for verification

AlgorithmS= create TCP segments (x1, x2, x3,

x4……….x15)

S.checksum = checksum

for each x

S.data = pad with zeros (x)

send S

receive answer

if answer = true

write x as a solution

Prototype of Parasitic Computing

Problem for Parasite

Several computational cycles are taken to process the solutions

Possibility of false negative

Possibility of false positive

Problem for Servers

Delay due to the parasitic message could cause a denial of service.

Almost impossible to prevent. Removing or changing the exploited

functions would cause the server unable to communicate.

Future…

Computation to communication ratio must increase.

Exploiting HTTP or encryption / decryption could execute in an efficient manner.

The ethical dilemma could lead it to a vulnerable future..

CONCLUSION..

Parasitic Computing logically moves compution onto the communication infrastructure of internet,blurring the distance between compution and communication

References

Barabasi et.al. Parasitic Computing, NATURE 412, 30 Aug 2001.Barabasi et.al. Supplement material for Parasitic Computing: http://www.nd.edu/~parasite/ Barger N. Robert & Crowell R. Charles, The ethics of Parasitic Computing, Sept 2003 : www.nd.edu/~ccrowell/Parasitic%20Computing.pdfIvars Peterson, Sneaky Calculations, Science News 160, 17 Nov 2001.www.hindu.com/thehindu/2001/09/13/stories/08130001.htm

ANY QUESTIONS……????

THANK YOU….

top related