SlideShare uma empresa Scribd logo
1 de 36
Parasitic Computing Aritra Mukherjee
If you’re one in a billion in INTERNET..
…..there are millions of people like you.
Who Are Being Used..
In the world of internet, millions of peopleJust like you… And You Will Never Know
Someone else is using your computer
He is slowing your Connection Speed for his own purpose..
No, Its Not Cracking…
You are a victim of Parasitic Computing..
What is Parasitic Computing?
    First Reported in journal ‘Nature’ in 2001 by Barabasi, Freech, feong and Brockman     A form of Distributed Computer Architecture     Used for solving Complex  Computational Problems     Target could never know     Exploit Standard set of communication     protocol in internet.     Potential standard protocols are TCP, HTTP, IP
To know how it works we need to know something first….
How The Communication through Internet is done?
When a user selects a URL…. Actions at Sender     Open a TCP connection to web server     Issues a HTTP request over TCP connection     TCP message is carried via IP
Establishing TCP Connection SYN Time-> SYN+ACK ACK Connection Established Initiator Node Acceptor Node
When a user selects a URL…. Actions at receiver Recieve message through IP     Validate checksum at TCP     Validated pushed to HTTP     Not validated discard the packet
Internet Communication HTTP > TCP > IP > TCP > HTTP
Implementation     Implementation takes place at many layers in internet     Several protocols may be exploited to perform parasitic computing     Implementation made using TCP or higher levels
Implementation Using TCP     TCP Checksum Provide enough logic to compute any Boolean function.     HTTP Service Protocol always send a response to any message received.
TCP Checksum
The Proof of Concept..     Solved 3 SAT problem     Solved other NP- Complete Problems..
How it works…
    A Single home parasite node initiates the computation     Sends a specially created TCP packet containing a possible solution.     If the possible solution is correct, the HTTP server returns an error message.     If the solution is wrong, then packet is dropped at TCP Layer
Creating Parasitic Message     The problem is constructed as the data part     TCP checksum sent is a representation of expected answer     Parasitic checksum and the variable string are sent to the remote machine for verification
Algorithm S= create TCP segments (x1, x2, x3, x4……….x15) S.checksum = checksum for eachx S.data = pad with zeros (x) send S receive answer 	if answer = true write x as a solution
Prototype of Parasitic Computing
Problem for Parasite     Several computational cycles are taken to process the solutions     Possibility of false negative     Possibility of false positive
Problem for Servers     Delay due to the parasitic message could cause a denial of service     Almost impossible to prevent     Removing or changing the exploited functions would cause the server unable to communicate.
Ethics in Parasitic computing
Future…     Computation to communication ratio must increase.     Exploiting HTTP or encryption / decryption could execute in an efficient manner.     The ethical dilemma could lead it to a vulnerable future..
Parasitic Computing logically moves computation onto the communication infrastructure of internet, blurring the distance between computation and communication
References Barabasi et.al. Parasitic Computing, NATURE 412, 30 Aug 2001.   Barabasi et.al. Supplement material for Parasitic Computing: http://www.nd.edu/~parasite/   Barger N. Robert & Crowell R. Charles, The ethics of Parasitic Computing, Sept 2003 : www.nd.edu/~ccrowell/Parasitic%20Computing.pdf Ivars Peterson, Sneaky Calculations, Science News 160, 17 Nov 2001.   www.hindu.com/thehindu/2001/09/13/stories/08130001.htm
Parasitic computing

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Screenless displays ppt
Screenless displays ppt Screenless displays ppt
Screenless displays ppt
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
SCREENLESS DISPLAY
SCREENLESS DISPLAYSCREENLESS DISPLAY
SCREENLESS DISPLAY
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete ppt
 
Diamond chip
Diamond chipDiamond chip
Diamond chip
 
Zigbee technology ppt
Zigbee technology pptZigbee technology ppt
Zigbee technology ppt
 
Brain chips seminar ppt
Brain chips seminar ppt Brain chips seminar ppt
Brain chips seminar ppt
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
 
The future of technology
The future of technologyThe future of technology
The future of technology
 
Green computing ppt
Green computing  pptGreen computing  ppt
Green computing ppt
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
 
3D Internet
3D Internet3D Internet
3D Internet
 
X internet
X internetX internet
X internet
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Information technology seminar topics
Information technology  seminar topicsInformation technology  seminar topics
Information technology seminar topics
 
IoT
IoTIoT
IoT
 

Destaque

PARASITIC COMPUTING
PARASITIC COMPUTINGPARASITIC COMPUTING
PARASITIC COMPUTINGveena jl
 
DATA WAREHOUSING
DATA WAREHOUSINGDATA WAREHOUSING
DATA WAREHOUSINGKing Julian
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology pptdeepakmarndi
 
High Performance Computing
High Performance ComputingHigh Performance Computing
High Performance ComputingDell World
 
High Performance Computing: an Introduction for the Society of Actuaries
High Performance Computing: an Introduction for the Society of ActuariesHigh Performance Computing: an Introduction for the Society of Actuaries
High Performance Computing: an Introduction for the Society of ActuariesAdam DeConinck
 
WattzOn Whole Earth Simulator
WattzOn Whole Earth SimulatorWattzOn Whole Earth Simulator
WattzOn Whole Earth SimulatorRaffi Krikorian
 
Internet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsInternet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsDevanand Hariperumal
 
ULTRA WIDE BAND BODY AREA NETWORK
ULTRA WIDE BAND BODY AREA NETWORKULTRA WIDE BAND BODY AREA NETWORK
ULTRA WIDE BAND BODY AREA NETWORKaravind m t
 
Freenet: The technical part of the solution for Freedom of the Press in the I...
Freenet: The technical part of the solution for Freedom of the Press in the I...Freenet: The technical part of the solution for Freedom of the Press in the I...
Freenet: The technical part of the solution for Freedom of the Press in the I...Arne Babenhauserheide
 
High performance computing
High performance computingHigh performance computing
High performance computingGuy Tel-Zur
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking TechnologyVinayak Hegde
 
Hyper Transport Technology
Hyper Transport TechnologyHyper Transport Technology
Hyper Transport TechnologyRohan Khude
 

Destaque (20)

PARASITIC COMPUTING
PARASITIC COMPUTINGPARASITIC COMPUTING
PARASITIC COMPUTING
 
Rover Technology
Rover TechnologyRover Technology
Rover Technology
 
3d internet
3d internet3d internet
3d internet
 
DATA WAREHOUSING
DATA WAREHOUSINGDATA WAREHOUSING
DATA WAREHOUSING
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
 
WORM INFECTIONS
WORM INFECTIONSWORM INFECTIONS
WORM INFECTIONS
 
High Performance Computing
High Performance ComputingHigh Performance Computing
High Performance Computing
 
High Performance Computing: an Introduction for the Society of Actuaries
High Performance Computing: an Introduction for the Society of ActuariesHigh Performance Computing: an Introduction for the Society of Actuaries
High Performance Computing: an Introduction for the Society of Actuaries
 
WattzOn Whole Earth Simulator
WattzOn Whole Earth SimulatorWattzOn Whole Earth Simulator
WattzOn Whole Earth Simulator
 
Freenet
FreenetFreenet
Freenet
 
Internet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsInternet of things (IOT) | Future Trends
Internet of things (IOT) | Future Trends
 
ULTRA WIDE BAND BODY AREA NETWORK
ULTRA WIDE BAND BODY AREA NETWORKULTRA WIDE BAND BODY AREA NETWORK
ULTRA WIDE BAND BODY AREA NETWORK
 
Freenet: The technical part of the solution for Freedom of the Press in the I...
Freenet: The technical part of the solution for Freedom of the Press in the I...Freenet: The technical part of the solution for Freedom of the Press in the I...
Freenet: The technical part of the solution for Freedom of the Press in the I...
 
High performance computing
High performance computingHigh performance computing
High performance computing
 
Rover technology
Rover technologyRover technology
Rover technology
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
 
Hyper Transport Technology
Hyper Transport TechnologyHyper Transport Technology
Hyper Transport Technology
 
MPEG 4
MPEG 4MPEG 4
MPEG 4
 
Computer clothing
Computer clothingComputer clothing
Computer clothing
 

Semelhante a Parasitic computing

parasitic computing lahari 1.pptx
parasitic computing lahari 1.pptxparasitic computing lahari 1.pptx
parasitic computing lahari 1.pptxLahari973613
 
9271736-Parasitic-computing.ppt for students reference
9271736-Parasitic-computing.ppt for students reference9271736-Parasitic-computing.ppt for students reference
9271736-Parasitic-computing.ppt for students referencePragnyaNandaSabat
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in JavaTushar B Kute
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in JavaTushar B Kute
 
Web Fundaments
Web FundamentsWeb Fundaments
Web Fundamentschungmd
 
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxamrit47
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...YonasBayu1
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 
Communcation systems
Communcation systemsCommuncation systems
Communcation systemsMR Z
 
Pears
PearsPears
Pearsthips
 
Networking and Go: An Engineer's Journey (Strangeloop 2019)
Networking and Go: An Engineer's Journey (Strangeloop 2019)Networking and Go: An Engineer's Journey (Strangeloop 2019)
Networking and Go: An Engineer's Journey (Strangeloop 2019)Sneha Inguva
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in JavaTushar B Kute
 
Internet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MACInternet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MACAsmita Singh
 

Semelhante a Parasitic computing (20)

parasitic computing lahari 1.pptx
parasitic computing lahari 1.pptxparasitic computing lahari 1.pptx
parasitic computing lahari 1.pptx
 
9271736-Parasitic-computing.ppt for students reference
9271736-Parasitic-computing.ppt for students reference9271736-Parasitic-computing.ppt for students reference
9271736-Parasitic-computing.ppt for students reference
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in Java
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in Java
 
Web Fundaments
Web FundamentsWeb Fundaments
Web Fundaments
 
Networking in Java
Networking in JavaNetworking in Java
Networking in Java
 
Unit 8 Java
Unit 8 JavaUnit 8 Java
Unit 8 Java
 
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Mod4
Mod4Mod4
Mod4
 
Sneaky computation
Sneaky computationSneaky computation
Sneaky computation
 
Communcation systems
Communcation systemsCommuncation systems
Communcation systems
 
Pears
PearsPears
Pears
 
NP-lab-manual.docx
NP-lab-manual.docxNP-lab-manual.docx
NP-lab-manual.docx
 
NP-lab-manual (1).pdf
NP-lab-manual (1).pdfNP-lab-manual (1).pdf
NP-lab-manual (1).pdf
 
NP-lab-manual.pdf
NP-lab-manual.pdfNP-lab-manual.pdf
NP-lab-manual.pdf
 
Networking and Go: An Engineer's Journey (Strangeloop 2019)
Networking and Go: An Engineer's Journey (Strangeloop 2019)Networking and Go: An Engineer's Journey (Strangeloop 2019)
Networking and Go: An Engineer's Journey (Strangeloop 2019)
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in Java
 
Internet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MACInternet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MAC
 

Último

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Parasitic computing

  • 2.
  • 3.
  • 4. If you’re one in a billion in INTERNET..
  • 5. …..there are millions of people like you.
  • 6. Who Are Being Used..
  • 7. In the world of internet, millions of peopleJust like you… And You Will Never Know
  • 8. Someone else is using your computer
  • 9. He is slowing your Connection Speed for his own purpose..
  • 10. No, Its Not Cracking…
  • 11. You are a victim of Parasitic Computing..
  • 12. What is Parasitic Computing?
  • 13. First Reported in journal ‘Nature’ in 2001 by Barabasi, Freech, feong and Brockman A form of Distributed Computer Architecture Used for solving Complex Computational Problems Target could never know Exploit Standard set of communication protocol in internet. Potential standard protocols are TCP, HTTP, IP
  • 14. To know how it works we need to know something first….
  • 15. How The Communication through Internet is done?
  • 16. When a user selects a URL…. Actions at Sender Open a TCP connection to web server Issues a HTTP request over TCP connection TCP message is carried via IP
  • 17. Establishing TCP Connection SYN Time-> SYN+ACK ACK Connection Established Initiator Node Acceptor Node
  • 18. When a user selects a URL…. Actions at receiver Recieve message through IP Validate checksum at TCP Validated pushed to HTTP Not validated discard the packet
  • 19. Internet Communication HTTP > TCP > IP > TCP > HTTP
  • 20. Implementation Implementation takes place at many layers in internet Several protocols may be exploited to perform parasitic computing Implementation made using TCP or higher levels
  • 21. Implementation Using TCP TCP Checksum Provide enough logic to compute any Boolean function. HTTP Service Protocol always send a response to any message received.
  • 23. The Proof of Concept.. Solved 3 SAT problem Solved other NP- Complete Problems..
  • 25. A Single home parasite node initiates the computation Sends a specially created TCP packet containing a possible solution. If the possible solution is correct, the HTTP server returns an error message. If the solution is wrong, then packet is dropped at TCP Layer
  • 26. Creating Parasitic Message The problem is constructed as the data part TCP checksum sent is a representation of expected answer Parasitic checksum and the variable string are sent to the remote machine for verification
  • 27. Algorithm S= create TCP segments (x1, x2, x3, x4……….x15) S.checksum = checksum for eachx S.data = pad with zeros (x) send S receive answer if answer = true write x as a solution
  • 29. Problem for Parasite Several computational cycles are taken to process the solutions Possibility of false negative Possibility of false positive
  • 30. Problem for Servers Delay due to the parasitic message could cause a denial of service Almost impossible to prevent Removing or changing the exploited functions would cause the server unable to communicate.
  • 31. Ethics in Parasitic computing
  • 32. Future… Computation to communication ratio must increase. Exploiting HTTP or encryption / decryption could execute in an efficient manner. The ethical dilemma could lead it to a vulnerable future..
  • 33.
  • 34. Parasitic Computing logically moves computation onto the communication infrastructure of internet, blurring the distance between computation and communication
  • 35. References Barabasi et.al. Parasitic Computing, NATURE 412, 30 Aug 2001.   Barabasi et.al. Supplement material for Parasitic Computing: http://www.nd.edu/~parasite/   Barger N. Robert & Crowell R. Charles, The ethics of Parasitic Computing, Sept 2003 : www.nd.edu/~ccrowell/Parasitic%20Computing.pdf Ivars Peterson, Sneaky Calculations, Science News 160, 17 Nov 2001.   www.hindu.com/thehindu/2001/09/13/stories/08130001.htm