parasitic computing
TRANSCRIPT
WELCOME….
SEMINAR ON THE TOPIC…
“PARASITIC COMPUTING..” PRESENTED BY,
ATHULYA.S
CONTENTS...........1.Introduction2.how the Communication through internet is done3.Internet Communication4.Implementation5.Proof of Concept6.Creating parasitic message7.Problem for Servers8.Future9.Conclusion10.Reference
What is Parasitic Computing?
… First Reported in journal
‘Nature’ in 2001 by Barabasi, Freech, feong and Brockman
A form of Distributed Computer Architecture
Used for solving ComplexComputational Problems
…
Target could never know Exploit Standard set of
communication protocol in internet.
Potential standard protocols are TCP, HTTP, IP
…
How The Communication through Internet is done?
When a user selects a URL….
Actions at Sender
Open a TCP connection to web server
Issues a HTTP request over TCP connection
TCP message is carried via IP
When a user selects a URL….
Receives message through IP Validate checksum at TCP Validated pushed to HTTP Not validated discard the
packet
Actions at receiver
Implementation
Implementation takes place at many layers in inter net
Several protocols may be exploited to perform parasitic computing
Implementation made using TCP or higher levels
Implementation Using TCP
TCP ChecksumProvide enough logic to compute any
Boolean function. HTTP Service
Protocol always send a response to any message received.
TCP Checksum
How it works…
A Single home parasite node initiates the computation
Sends a specially created TCP packet containing a possible solution.
If the possible solution is correct, the HTTP server returns an error message.
If the solution is wrong, then packet is dropped at TCP Layer
Creating Parasitic Message
The problem is constructed as the data part
TCP checksum sent is a representation of expected answer
Parasitic checksum and the variable string are sent to the remote machine for verification
AlgorithmS= create TCP segments (x1, x2, x3,
x4……….x15)
S.checksum = checksum
for each x
S.data = pad with zeros (x)
send S
receive answer
if answer = true
write x as a solution
Prototype of Parasitic Computing
Problem for Parasite
Several computational cycles are taken to process the solutions
Possibility of false negative
Possibility of false positive
Problem for Servers
Delay due to the parasitic message could cause a denial of service.
Almost impossible to prevent. Removing or changing the exploited
functions would cause the server unable to communicate.
Future…
Computation to communication ratio must increase.
Exploiting HTTP or encryption / decryption could execute in an efficient manner.
The ethical dilemma could lead it to a vulnerable future..
CONCLUSION..
Parasitic Computing logically moves compution onto the communication infrastructure of internet,blurring the distance between compution and communication
References
Barabasi et.al. Parasitic Computing, NATURE 412, 30 Aug 2001.Barabasi et.al. Supplement material for Parasitic Computing: http://www.nd.edu/~parasite/ Barger N. Robert & Crowell R. Charles, The ethics of Parasitic Computing, Sept 2003 : www.nd.edu/~ccrowell/Parasitic%20Computing.pdfIvars Peterson, Sneaky Calculations, Science News 160, 17 Nov 2001.www.hindu.com/thehindu/2001/09/13/stories/08130001.htm
ANY QUESTIONS……????
THANK YOU….