parasitic computing

parasitic computing
(pair.uh.SIT.ik kawm.pyoo.ting)
n.
Using a series of remote computers to surreptitiously perform calculations that are part of a larger computational problem.
Example Citation:
"Four researchers at the University of Notre Dame have figured out how to use ordinary communications among machines on the Internet to trick Web servers into solving math problems for them. ... Although parasitic computing does not compromise the security of the host, according to the researchers, since it only uses normal Internet communications, it can impact the server's performance. This could turn into a sort of denial of service attack."
— Lynn Greiner, "Infested computers raise ethical questions," Computing Canada, September 21, 2001
Earliest Citation:
"Reliable communication on the Internet is guaranteed by a standard set of protocols, used by all computers. Here we show that these protocols can be exploited to compute with the communication infrastructure, transforming the Internet into a distributed computer in which servers unwittingly perform computation on behalf of a remote node. In this model, which we call 'parasitic computing', one machine forces target computers to solve a piece of a complex computational problem merely by engaging them in standard communication."
— Albert-Laszlo Barabasi, Vincent W. Freeh, Hawoong Jeong, and Jay B. Brockman, "Parasitic computing," Nature, August 30, 2001
Notes:
Unlike computational grid setups (such as the SETI\@home project: http://setiathome.ssl.berkeley.edu/) where people voluntarily offer their computers' idle time to crunch numbers, parasitic computing operates by stealth. It takes advantage of a standard computation — called the checksum by communications nerds — that every Web server on the Internet normally uses as a matter of course to verify that incoming data hasn't been corrupted. Apparently it's possible to take these checksum calculations and use them to solve a tiny piece of a larger problem. Do this with enough computers (the Internet has millions of servers) and you can solve the larger problem in its entirety.
That's the good news. The bad news is that, although messing with a few checksums won't cause a perceptible drop in the performance of the server, hijacking millions or billions of checksum calculations would bring the machine to its digital knees. It's just one more thing to keep Web site administrators chewing their fingernails.
Related Words: Categories:

New words. 2013.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Parasitic computing — is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing… …   Wikipedia

  • Leech (computing) — In computing and specifically on the Internet, being a leech or leecher refers to the practice of benefiting, usually deliberately, from others information or effort but not offering anything in return, or only token offerings in an attempt to… …   Wikipedia

  • List of Internet topics — This page is a list of Internet topics. AlphanumericTOC align=center nobreak= numbers= externallinks= references= top=| A Abilene Network Ad hoc network Address resolution protocol Aggregator (news aggregator) ADSL AirPort All your base are… …   Wikipedia

  • Computación parasitaria — es un paradigma de programación por el cual una aplicación consigue realizar cálculos complejos utilizando interacciones autorizadas sobre otras aplicaciones. Surge a partir de un trabajo publicado en Nature en el año 2000. En el trabajo original …   Wikipedia Español

  • Hacking and Hackers — back hacking beehacker billion laughs biohacker bluejacking bot herder chief hacking officer cr …   New words

  • Internet — altmetrics ambient findability arachnerd bid shielding bitcom black hole resort blog blogosphere …   New words

  • computational grid — n. A large collection of computers linked via the Internet so that their combined processing power can be harnessed to work on difficult or time consuming problems. (Also called community computation.) Example Citation: It s a simple fact: The… …   New words

  • distributed denial of service — adj. Relating to a computer attack that hijacks dozens or sometimes hundreds or computers around the Internet and instructs each of them to inundate a target site with meaningless requests for data. Also: DDoS. Example Citation: Yahoo, Buy.com… …   New words

  • man in the middle attack — n. A computer security breach in which a malicious user intercepts and possibly alters data traveling along a network. (Also: man in the middle attack.) Example Citation: If it delivers what s promised, Funk s Odyssey software will let… …   New words

  • Cuckoo search — (CS) is an optimization algorithm developed by Xin she Yang and Suash Deb in 2009.[1][2] It was inspired by the obligate brood parasitism of some cuckoo species by laying their eggs in the nests of other host birds (of other species). Some host… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”