Beruflich Dokumente
Kultur Dokumente
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. Introduction Definition Ineternet Communication Proof Of Concept Implementations TCP Checksum 2 SAT Problem Creating Parasitic Messages 3 SAT Problems How It different from Others Problem For Parasites Problem For Servers Future References
Abstract
Parasitic Computing is the harness of computing power. It doesnt compromise with the security of the target sources and it is technically impossible to stop an user from launching it. It is discovery not an invention thats why it always exists an always offers a unique challenges for computer science.
Introduction
First reported in Journal Nature in 2001 by Barabasi, Freeh, Jeong and Brockman. A form of distributed computing. Used for solving complex computational problem. Exploits standard set of communication protocol on internet.
Definition
The term Parasitic Computing refers to the technique of using the resources of one computer by another computer without the knowledge of the former. It uses the computation power of the computer connected to the internet in solving complex mathematical problems. For Ex:- Travelling Salesman, Satisfiability Problem.
Internet Communication
When a user selects a URL * Action at center: Open a TCP connection to web server. Issues a HTTP request over TCP connection. TCP message is carried via IP. * Action at receiver: Receive message through IP. Validate checksum at TCP. Validate pushed to HTTP. Not validate discard the packet.
Proof Of Concept
N-P Complete Problem:- Problems for which no polynomial time algorithm is known.
SAT Problem:- It involves finding a solution to a Boolean Equation that satisfies a number of logical clauses.
Implementations
Computations takes place at many layers in Internet. Several Internet protocols could be exploited to perform Parasitic Computation. Implementation made using TCP or higher levels.
* TCP CheckSums:- Provide enough logic to compute any Boolean Function. * HTTP Service:- Protocol always send a response to any message Received.
TCP Checksum
Sender breaks message into 16 bit words. These words are added together. The result is inverted and send with message. Receiver breaks message into 16 bit words. All words are added together. If the result is all ones, the message is valid. Otherwise, the message is dropped.
2-SAT problem
Send a specially created TCP packet containing a possible solution. If the possible solution is correct, the HTTP server returns an error message. If the solution is wrong, then packet is dropped at TCP layer.
Variables values of a possible solution are distributed so they will align when split in 16 byte words. TCP checksum sent is a representation of the expected answer. Parasitic checksum and the variable string are sent to remote machine for verification.
3-SAT Problem
N-P Complete. Can be solved similar to 2-SAT because the maximum sum of three variables is 1+1+1=11, which can be represented by two bits without overflow. The algorithm does not change, only the way to create packet is changed.
Several computational cycles are taken to process the possible solutions. Possibility of false negatives. Possibility of false positives. Ethical dilemma.
Delays due to processing the Parasitic messages could cause a denial of service. Almost impossible to prevent someone from running a Parasitic job on your server. Removing or changing the exploited functions would cause the server to be unable to communicate on the Internet.
Future
Computation-to-Communication ratio must increase. Exploiting HTTP or encryption/decryption could execute in an efficient manner. Enabling all computers to swap information and services they are needed could lead to unparalleled emergent behavior, drastically altering the current use of the Internet.
References