36

Click here to load reader

Parasitic computing

Embed Size (px)

Citation preview

Page 1: Parasitic computing

Parasitic ComputingAritra Mukherjee

Page 2: Parasitic computing
Page 3: Parasitic computing
Page 4: Parasitic computing

If you’re one in a billion in INTERNET..

Page 5: Parasitic computing

…..there are millions of people like you.

Page 6: Parasitic computing

Who Are Being Used..

Page 7: Parasitic computing

In the world of internet, millions of peopleJust like you…

And You Will Never K

now

Page 8: Parasitic computing

Someone else is using your computer

Page 9: Parasitic computing

He is slowing your Connection Speed for his own purpose..

Page 10: Parasitic computing

No, Its Not Cracking…

Page 11: Parasitic computing

You are a victim of Parasitic Computing..

Page 12: Parasitic computing

What is Parasitic Computing?

Page 13: Parasitic computing

First Reported in journal ‘Nature’ in 2001 by Barabasi, Freech, feong and Brockman

A form of Distributed Computer Architecture

Used for solving Complex Computational Problems

Target could never know

Exploit Standard set of communication protocol in internet.

Potential standard protocols are TCP, HTTP, IP

Page 14: Parasitic computing

To know how it works we need to know something first….

Page 15: Parasitic computing

How The Communication through Internet is done?

Page 16: Parasitic computing

When a user selects a URL….

Actions at Sender

Open a TCP connection to web server

Issues a HTTP request over TCP connection

TCP message is carried via IP

Page 17: Parasitic computing

Establishing TCP Connection

Initiator Node

Acceptor Node

Connection Established

SYN

SYN+ACK

ACK

Time→

Page 18: Parasitic computing

When a user selects a URL….

Actions at receiver

Recieve message through IP

Validate checksum at TCP

Validated pushed to HTTP

Not validated discard the packet

Page 19: Parasitic computing

Internet Communication

HTTP > TCP > IP > TCP > HTTP

Page 20: Parasitic computing

Implementation Implementation takes place at

many layers in internet

Several protocols may be exploited to perform parasitic computing

Implementation made using TCP or higher levels

Page 21: Parasitic computing

Implementation Using TCP

TCP Checksum

Provide enough logic to compute any Boolean function.

HTTP Service

Protocol always send a response to any message received.

Page 22: Parasitic computing

TCP Checksum

Page 23: Parasitic computing

The Proof of Concept..

Solved 3 SAT problem

Solved other NP- Complete Problems..

Page 24: Parasitic computing

How it works…

Page 25: Parasitic computing

A Single home parasite node initiates the computation

Sends a specially created TCP packet containing a possible solution.

If the possible solution is correct, the HTTP server returns an error message.

If the solution is wrong, then packet is dropped at TCP Layer

Page 26: Parasitic computing

Creating Parasitic Message

The problem is constructed as the data part

TCP checksum sent is a representation of expected answer

Parasitic checksum and the variable string are sent to the remote machine for verification

Page 27: Parasitic computing

Algorithm

S= create TCP segments (x1, x2, x3, x4……….x15)S.checksum = checksumfor each x

S.data = pad with zeros (x)send Sreceive answerif answer = true

write x as a solution

Page 28: Parasitic computing

Prototype of Parasitic Computing

Page 29: Parasitic computing

Problem for Parasite

Several computational cycles are taken to process the solutions

Possibility of false negative

Possibility of false positive

Page 30: Parasitic computing

Problem for Servers

Delay due to the parasitic message could cause a denial of service

Almost impossible to prevent

Removing or changing the exploited functions would cause the server unable to communicate.

Page 31: Parasitic computing

Ethics in Parasitic computing

Page 32: Parasitic computing

Future…

Computation to communication ratio must increase.

Exploiting HTTP or encryption / decryption could execute in an efficient manner.

The ethical dilemma could lead it to a vulnerable future..

Page 33: Parasitic computing
Page 34: Parasitic computing

Parasitic Computing logically moves computation onto the communication infrastructure of internet, blurring the distance between computation and communication

Page 35: Parasitic computing

References

Barabasi et.al. Parasitic Computing, NATURE 412, 30 Aug 2001. Barabasi et.al. Supplement material for Parasitic Computing: http://www.nd.edu/~parasite/ Barger N. Robert & Crowell R. Charles, The ethics of Parasitic Computing, Sept 2003 : www.nd.edu/~ccrowell/Parasitic%20Computing.pdf

Ivars Peterson, Sneaky Calculations, Science News 160, 17 Nov 2001. www.hindu.com/thehindu/2001/09/13/stories/08130001.htm

Page 36: Parasitic computing