Assignment Document

complemented correct solution, masquerading as the TCP checksum,

Pages:

Preview:


  • "complemented correct solution, masquerading as the TCP checksum, to form a 16-bit unitaryvalue, just as would occur if normal packet data had been transmitted without error. In responseto a unitary sum, the host?s TCP layer passed the packet up to t..

Preview Container:


  • "complemented correct solution, masquerading as the TCP checksum, to form a 16-bit unitaryvalue, just as would occur if normal packet data had been transmitted without error. In responseto a unitary sum, the host?s TCP layer passed the packet up to the HTTP application layer, actingas if the packet were not “corrupted.” However, because the packet?s message was artificial andthus unintelligible to the host, it was prompted to send a response back to the parasitic TICCsaying it did not understand the message. This returned response was an indication to the parasitethat the candidate solution was, in fact, a correct one, a decision made automatically, butunwittingly, by the host in response to the “artificial” packet. Messages containing an incorrectsolution failed the checksum test on the host and were presumed to be corrupt; therefore, noresponse was sent back to the parasite as per the standard behavior of TCP. 1314 ISSUES IN PARASITIC COMPUTINGBasic protocols are exploited by parasitic computing to use resources of remote computerwithout any authentication as messages are exchanged based on a trust relationship. As it usesbasic Internet protocols one cannot stop anyone from launching it. Disrupting functions used byparasitic computing will eliminate remote computers ability to communicate with rest of theInternet! It can cause delay in services of the remote computer (denial of service attacks). Italso causes problems in Internet service. It can clog the network and effectively bring theInternet down. It never compromises the security of the computer as it sends standard packetsand no malicious packets and also one has many other efficient ways of hacking than usingstandard protocols functions. It probably never breaks any law, but it still leads to certain ethicalissues. For the parasite, it may not be the best way to solve as it takes large number of computationalcycles to process the possible solution but it introduces the way in which common protocols, likeTCP, can be exploited. Also it cannot guarantee the correctness of the result due to the possibilityof false negatives and false positives. So at present parasitic computing may be a slow techniqueto solve, but it could be used to load heavy requests on a server and also get the solution for itsproblem. So, It does raise the question for future by exploiting TCP layer. Does this harm other remote computers?These imperatives, abstracted from Commandments 1 and 2, clearly position as unethical anyform of “malware” or other type of covert exploitation of computer resources with harmfulpurpose or consequences. Benign forms of exploitation without mal-intent, like the Barabasi etal. (2001) demonstration of parasitic computing, would seem under this mandate to be aninstance of “no harm, no foul.” One difficulty here, however, lies with the assessment of harm.Directly harmful effects to a user as a result of someone else?s covert exploitation are one 15 "

Why US?

Because we aim to spread high-quality education or digital products, thus our services are used worldwide.
Few Reasons to Build Trust with Students.

128+

Countries

24x7

Hours of Working

89.2 %

Customer Retention

9521+

Experts Team

7+

Years of Business

9,67,789 +

Solved Problems

Search Solved Classroom Assignments & Textbook Solutions

A huge collection of quality study resources. More than 18,98,789 solved problems, classroom assignments, textbooks solutions.

Scroll to Top