Parasitic computing

Parasitic computing

Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program.

The example given by the original paper was two computers communicating over the Internet, under disguise of a standard communications session. The first computer is attempting to solve a large and extremely difficult 3-SAT problem; it has decomposed the original 3-SAT problem in a considerable number of smaller problems. Each of these smaller problems is then encoded as a relation between a checksum and a packet such that whether the checksum is accurate or not is also the answer to that smaller problem. The packet/checksum is then sent to another computer. This computer will, as part of receiving the packet and deciding whether it is valid and well-formed, create a checksum of the packet and see whether it is identical to the provided checksum. If the checksum is invalid, it will then request a new packet from the original computer. The original computer now knows the answer to that smaller problem based on the second computer's response, and can transmit a fresh packet embodying a different sub-problem. Eventually, all the sub-problems will be answered and the final answer easily calculated.

So in the end, the target computer(s) is unaware that it has performed computation for the benefit of the other computer, or even done anything besides have a normal TCP/IP session.

The proof-of-concept is obviously extremely inefficient as the amount of computation necessary to merely send the packets in the first place easily exceeds the computations leached from the other program; and the 3-SAT problem would be solved much more quickly if just analyzed locally. In addition, in practice packets would probably have to be retransmitted occasionally when real checksum errors and network problems occur. However, parasitic computing on the level of checksums is a demonstration of the concept. The authors suggest that as one moves up the application stack, there might come a point where there is a net computational gain to the parasite - perhaps one could break down interesting problems into queries of complex cryptographic protocols using public keys. If there was a net gain, one could in theory use a number of control nodes for which many hosts on the Internet form a distributed computing network completely unawares.

ee also

* Denial of service attack

References

# Parasitic computing, Barabasi et al., "Nature", 412: 894-897 (2000).

External links

* http://www.nd.edu/~parasite
* http://www.szene.ch/parasit/


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • parasitic computing — (pair.uh.SIT.ik kawm.pyoo.ting) n. Using a series of remote computers to surreptitiously perform calculations that are part of a larger computational problem. Example Citation: Four researchers at the University of Notre Dame have figured out how …   New words

  • Leech (computing) — In computing and specifically on the Internet, being a leech or leecher refers to the practice of benefiting, usually deliberately, from others information or effort but not offering anything in return, or only token offerings in an attempt to… …   Wikipedia

  • List of Internet topics — This page is a list of Internet topics. AlphanumericTOC align=center nobreak= numbers= externallinks= references= top=| A Abilene Network Ad hoc network Address resolution protocol Aggregator (news aggregator) ADSL AirPort All your base are… …   Wikipedia

  • Computación parasitaria — es un paradigma de programación por el cual una aplicación consigue realizar cálculos complejos utilizando interacciones autorizadas sobre otras aplicaciones. Surge a partir de un trabajo publicado en Nature en el año 2000. En el trabajo original …   Wikipedia Español

  • Hacking and Hackers — back hacking beehacker billion laughs biohacker bluejacking bot herder chief hacking officer cr …   New words

  • Internet — altmetrics ambient findability arachnerd bid shielding bitcom black hole resort blog blogosphere …   New words

  • computational grid — n. A large collection of computers linked via the Internet so that their combined processing power can be harnessed to work on difficult or time consuming problems. (Also called community computation.) Example Citation: It s a simple fact: The… …   New words

  • distributed denial of service — adj. Relating to a computer attack that hijacks dozens or sometimes hundreds or computers around the Internet and instructs each of them to inundate a target site with meaningless requests for data. Also: DDoS. Example Citation: Yahoo, Buy.com… …   New words

  • man in the middle attack — n. A computer security breach in which a malicious user intercepts and possibly alters data traveling along a network. (Also: man in the middle attack.) Example Citation: If it delivers what s promised, Funk s Odyssey software will let… …   New words

  • Cuckoo search — (CS) is an optimization algorithm developed by Xin she Yang and Suash Deb in 2009.[1][2] It was inspired by the obligate brood parasitism of some cuckoo species by laying their eggs in the nests of other host birds (of other species). Some host… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”