Parasitic computing is a concept that uses the computing resources of machines connected to the internet without authorization. It works by exploiting open internet protocols to force remote computers to solve parts of complex computational problems through standard communication, without the remote computers being aware that they are performing computation for another node. While it differs from cluster computing which uses shared resources willingly, parasitic computing could potentially harness significant distributed computing power from idle resources across the internet. However, it also raises issues around computers being utilized without consent.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
Parasitic computing is a concept that uses the computing resources of machines connected to the internet without authorization. It works by exploiting open internet protocols to force remote computers to solve parts of complex computational problems through standard communication, without the remote computers being aware that they are performing computation for another node. While it differs from cluster computing which uses shared resources willingly, parasitic computing could potentially harness significant distributed computing power from idle resources across the internet. However, it also raises issues around computers being utilized without consent.
Parasitic computing is a concept that uses the computing resources of machines connected to the internet without authorization. It works by exploiting open internet protocols to force remote computers to solve parts of complex computational problems through standard communication, without the remote computers being aware that they are performing computation for another node. While it differs from cluster computing which uses shared resources willingly, parasitic computing could potentially harness significant distributed computing power from idle resources across the internet. However, it also raises issues around computers being utilized without consent.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
Parasitic computing is a concept that uses the computing resources of machines connected to the internet without authorization. It works by exploiting open internet protocols to force remote computers to solve parts of complex computational problems through standard communication, without the remote computers being aware that they are performing computation for another node. While it differs from cluster computing which uses shared resources willingly, parasitic computing could potentially harness significant distributed computing power from idle resources across the internet. However, it also raises issues around computers being utilized without consent.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
ABSTRACT use the resources of machines that are connected on the Internet. This technology Reliable communication on the Internet exploits open Internet protocols to use the is guaranteed by a standard set of resources of remote machines. As the name protocols, used by all computers. Here suggests, the machine that requires the we show that these protocols can be services of others does not need to be authorized by exploited to compute with the the latter. Any machine, which is communication infrastructure, connected to the Internet, has to carry out minimum transforming the Internet into a processing of any packet they distributed computer in which servers receive without any authorization. This concept is exploited by parasitic computing in unwittingly perform computation on order to make use of computing powers of remote behalf of a remote node. In this model, machines and web servers all around which we call 'parasitic computing', one the globe. So one cannot really stop their machines machine forces target computers to solve from being utilized in this manner. a piece of a complex computational How it differs from cluster computing? problem merely by engaging them in Parasitic computing differs from cluster computing. standard communication. Consequently, Cluster computing is an idea in the target computers are unaware that which many computers pool in their resources they have performed computation for the willingly to create a cumulative power benefit of a commanding node. As equivalent to that of a supercomputer capable of experimental evidence of the principle of solving complex computational parasitic computing, we harness the problems. In contrast, parasitic computing does not power of several web servers across the require the willingness of any target globe, which—unknown to them—work machine to participate in the problem solving. This together to solve an NP complete way one can make use of many problem2. distributed resources across the Internet, which is otherwise remaining idle. Also if one divides the task in such a manner that no computer is overloaded remote machine performance won’t deteriorate much and our task will be also be accomplished. Introduction It is not cracking. Parasitic computing though works without authorization it is entirely different from THE NET is a fertile place where new the concept of cracking. In cracking data is sent to ideas/products surface quite often. We have the remote computer with malicious already come across many innovative ideas such as intentions and in order to corrupt some resource of Peer-to-Peer file sharing, distributed the remote machine whereas in this computing and the like. Parasitic computing, which case we are utilizing those resources for a harnesses the computing power of constructive purpose and also accessing only machines that spread across the Net to accomplish those parts of remote machines, which are made complex computing tasks, is new in open on the Internet and that is done this category. The successor to distributed without any malicious intentions but it can cause computing has opened up a whole new can of delay of services in the remote worms. It works by exploiting a weakness in the machines as resources are being utilized without the TCP/IP system's error checking system. knowledge of the owner. The problem is that forcing target machines into performing calculations puts a greater load on them than a regular packet would, and the CONCLUSION: The question of where server owner has not agreed to take research on parasitic computing is headed is an part - in effect the technique is stealing processing interesting one from power, but without breaking any laws. several perspectives. From an efficiency standpoint, Although the technique is too slow to have much as noted above, some attention could be practical value at present, it does raise focused on how the overall paradigm can be questions for the future. The report discusses the improved along the lines noted by Barabasi et al. technical aspects of what has already (2001): “To make the model viable, the been carried out and the related issues. computation-to-communication ratio must increase until the computation exported by the parasitic node DETAILS OF PARASITIC is larger than the amount of cycles required by the node to solve the problem itself COMPUTING instead of sending it to the target” (p. 897). One way to do this, as noted by Freeh (2002), is to • Barabasi et.al. Supplement material for Parasitic increase the number of packets sent by a Computing : parasite to a single host. Such an approach also http://www.nd.edu/~parasite/ would increase the importance of dealing with • Barger N. Robert & Crowell R. Charles,The ethics the reliability problems associated with parasitic of Parasitic computing (i.e., false negatives and false Computing, Sept 2003 : positives). In terms of the TCP/IP vulnerability www.nd.edu/~ccrowell/Parasitic%20Computing.pdf exploited by parasitic computing, Freeh (2002) • Ivars Peterson, Sneaky Calculations, Science has noted that more work is needed to better define News 160, 17 Nov 2001. and understand the viability and level of • threat associated with various forms of exploitation www.hindu.com/thehindu/2001/09/13/stories/08130 inherent in Internet protocols. Finally, with 001.htm respect to a justification for parasitic computing,