Wa0001.

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

Seminar on

PARASITIC COMPUTING
Pravara Rural Education Society’s
Sir Visvesvaraya Institute of Technology ,Nashik

Department of Information Technology Engineering


Seminar Presentation on
Parasitic computing

Presented by:-Rajbhar Abhishek Rajesh


Guided by :-Mr.Dinesh B.Ghorpade
Content
 INTRODUCTION
 INTERNET OF COMMUNICATION
 ESTABLISHING A TCP CONNECTION
 NET COMMUNICATION
 IMPLEMENTATION USING TCP
 TCP CHECKSUM
 ADVANTAGES
 DISADVANTAGES
 HOW IT DIFFER FROM OTHERS
 CONCLUSIONS
 REFERENCES
Introduction
 The net is a fertile place where new ideas/products
surface quite often.
 We have already come across many innovative ideas such
as Peer-to-Peer file sharing, distributed computing etc.
 Parasitic computing is a new in this category
Internet of communication
When a user select a URL
ACTIONS AT CENTER
 Open a tcp connection to a web server
 Issues a http request of TCP Connections
 TCP message is carried via IP

ACTIONS AT RECEIVER
 Recive message through IP
 Vallidated Pussed to HTTP
 Non Vallidated Discard the packet
ESTABLISHING A TCP CONNECTION
INTERNET COMMUNICATION

 To implement the concept of


parasitic computing We can choose
the exploit processing to
therotically any of these layers but
below TCP layers it is no very
benificial
IMPLEMENTATION USING TCP
TCP Checksum provide enough logic to compute any boolean functions HTTPS
Service Protocol always send a Response to any message received
till now there has been only one implementation, which has exploited this
concept of parasitic computing. Idea is to use some feature of the protocol in
such a manner that remote machines respond to the request unknowingly that
they are involved in solving a complex problem and they believe that they are
responding to a simple application request over TCP connection.
implementation one first needs to have a brief idea of
TCP checksum.
TCP CHECKSUM

 The checksum field is the one's complement of the one's complement sum of
all words in the header and text.
 If a segment contains an odd number of header and text octets to be check
summed, the last octet is padded on the right with zeros to form a word for
checksum purposes.
 The pad is not transmitted as part of the segment. While computing the
checksum, the checksum field itself is replaced with zeros.
 information is carried in the Internet Protocol and is transferred across the
TCP/Network interface in the arguments or results of calls by the TCP on the
IP.
ADVANTAGES

 Server side parasitic computation determines the fake


clients. (i.e. – clients with similar IP address requesting
the server)
 At schools ,colleges and workplaces admin monitoring is
achieved.
 Computational capacity of Remote computer is analysed.
Disadvantage

 Trust Relationship is breaked.


 Denial of service attack without breaking security law.
 Remote target computer’s ability to communicate with
rest of the internet is eliminated.
How it differ from other

 Clusters computing
 In cluster computing many computers pool on their
resources willingly
 Parasitic computing does not require Willingness of any
target machine
 It is not cracking
Conclusion

 TCP layer can be exploited and also cannot guarantee correctness of result
due to False-positive and False-negative.
 At present , parasitic computing may be slow technique to solve, but it could
be used to load heavy request on server and get the solution for its problem.
Refrence

 www.google.com
 www.wikipedia.com
Thank you

You might also like