Researchers toy with 'parasitic' computing

Why use your own computer when you can make use of other people's? Researchers at the University of Notre Dame in Indiana have demonstrated "parasitic" computing -- using other people's servers to do your own processing, they said in an article in this week's Nature magazine.

The process is similar to that used by the likes of SETI@home (Search for Extraterrestrial Intelligence), which uses the processing power of millions of desktop PCs to scan data from a radio telescope in the hope of finding signs of life in outer space, said Nature in an introduction.

The difference with parasitic computing is that the Notre Dame researchers did not ask for permission from the server owners. However, they did not have to hack to gain direct access to anyone's computer but used the infrastructure of the Internet itself to create a virtual machine.

Researchers Albert-Lásló Barabási, Vincent Freeh, Hawoong Jeong and Jay Brockman hijacked the infrastructure to show what is possible using the Internet, said Nature.

A data validation program called a checksum is used, which runs on the TCP (Transmission Control Protocol (TCP) connection between Internet-connected computers. It forces the connected Web servers to solve a specific mathematical problem, the researchers said.

The protocols are in place to ensure reliable communication but they can be exploited to compute with the communication infrastructure, turning the Internet into a distributed computer. Servers will then unwittingly perform computation on behalf of an uninvited user, solving complex computational problems when they engage in standard communication and without being aware they are doing so.

In the event, it was more difficult and more time-consuming to process the information this way than to use the university's own computers, the researchers said, but the experiment shows interesting possibilities for using the Internet, and raises important ethical questions about the use of other people's computers.

It also raises legal questions about the use of other people's servers.

As with anything Internet-related, "the first is the question of jurisdiction," said Michael Aikenhead, a lecturer at the University of Durham, U.K.'s Centre for Law and Computing.

"Who actually tries any offense that might have occurred?" he said. If servers in North America, Europe and Asia are affected, each jurisdiction may treat the activity differently.

"In terms of U.K. law, I've not heard of any situation directly on point and find it difficult to see how the law could prevent such activity. The Computer Misuse Act 1990 Section 1 is aimed at 'unauthorized access to computer material.' The complication arises as to whether the access is unauthorized given that the servers are connected to the public Internet."

The same difficulty applies to other sections of the Act, such as Section 3 which prohibits unauthorized modification of computer material or any activity that impairs the operation of a computer, he said.

The situation raises questions of what a server owner actually consents to by connecting the server to the Internet, Aikenhead said.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gillian Law

PC World
Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Bitdefender 2019

This Holiday Season, protect yourself and your loved ones with the best. Buy now for Holiday Savings!

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?