Revisiting Parasitic Computing: Ethical and Technical Dimensions in Resource Optimization

Authors

  • Godfrey Oise Department of Computing, College of Computing and Natural Science, Wellspring University, Benin City, Edo State, Nigeria
  • Clement Nwabuokei Department of Computer Science, Delta State College of Education, Mosugar, Delta State, Nigeria
  • Richard IGBUNU Department of Computer Science, Delta State College of Education, Mosugar, Delta State, Nigeria
  • Prosper EJENARHOME Department of Computer Science, Delta State University, Abraka, Delta State, Nigeria

DOI:

https://doi.org/10.26740/vubeta.v2i3.38786

Keywords:

Parasitic Computing, TCP/IP Protocols, Unauthorized Resource Utilization, Distributed Computing

Abstract

Parasitic computing is a provocative concept enabling one system to offload computational tasks to remote hosts without explicit consent by exploiting communication protocols such as TCP/IP. While initially demonstrated as a conceptual hack, its implications for distributed computing, ethics, and resource optimization remain underexplored in modern contexts. This study revisits the original parasitic computing model, focusing on operational feasibility, technical efficiency, and ethical boundaries. We implement a Python-based simulation that encodes logical operations (AND, OR) into TCP packets by manipulating checksum fields—a core mechanism of the parasitic approach. We conducted over 6,000 packet transmissions across various network latency conditions using loopback and LAN environments to measure success rates, response times, and failure thresholds. Results show that logical operations can succeed under low-latency conditions with over 94% accuracy, but performance degrades sharply under higher round-trip times, dropping below 70%. These findings suggest parasitic computing may be technically viable within tightly controlled environments but face significant limitations in broader network applications. The researchers critically examine ethical considerations, emphasizing the risks of unauthorized computation, resource exploitation, and potential security breaches. This study contributes a reproducible methodology and empirical data, offering a renewed perspective on parasitic computing’s technical boundaries and future potential. It further calls for responsible experimentation and proposes hybrid models combining parasitic techniques with legitimate distributed computing frameworks and new safeguards to detect and mitigate unintended abuses. The paper proposes directions for improving protocol resilience and computational fairness in open networks.

Author Biographies

Godfrey Oise, Department of Computing, College of Computing and Natural Science, Wellspring University, Benin City, Edo State, Nigeria

Oise Godfrey Perfectson is a lecturer in the Department of Computing, Wellspring University, Benin City, Edo State, Nigeria. He received the BSc and M.Sc from the University of Benin in 2019 and 2022 respectively. He is mainly researching software engineering, artificial intelligence, and information technology. He can be contacted at
Email: godfrey.oise@wellspringuniversity.edu.ng.
Orcid: https://orcid.org/0009-0006-4393-7874

Clement Nwabuokei, Department of Computer Science, Delta State College of Education, Mosugar, Delta State, Nigeria


Clement Nwabuokei is Computer Science Lecturer at Delta State College of Education Mosogar, Delta State Nigeria. B.Sc, M.Sc Computer Science ,University of Benin,  2014 and 2019 respectively, PGDE (University of Port Harcourt , 2023). Diploma in computer Engineering (University of Benin, 2007) Research Interest in Software Engineering, Expert Systems

Richard IGBUNU, Department of Computer Science, Delta State College of Education, Mosugar, Delta State, Nigeria

Department of Computer Science, Delta State College of Education, Mosugar, Delta State, Nigeria

Prosper EJENARHOME, Department of Computer Science, Delta State University, Abraka, Delta State, Nigeria

Department of Computer Science, Delta State University, Abraka, Delta State, Nigeria

References

[1] S. Lawrence and C. L. Giles, “Accessibility of information on the web,” Nature, vol. 400, no. 6740, pp. 107–107, 1999. https://doi.org/10.1038/21987

[2] R. N. Barger and C. R. Crowell, “Ethics of ‘Parasitic Computing’: Fair Use or Abuse of TCP/IP Over the Internet,” Information Security and Ethics, H. Nemati, Ed., IGI Global, pp. 3600–3611, 2008. http://dx.doi.org/10.4018/9781591404910.ch009

[3] A.-L. Barabási, V. W. Freeh, H. Jeong, and J. B. Brockman, “Parasitic computing,” Nature, vol. 412, no. 6850, pp. 894–897, 2001. http://dx.doi.org/10.1038/35091039

[4] J. Stone and C. Partridge, “When the CRC and TCP checksum disagree,” Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Stockholm Sweden: ACM, pp. 309–319, 2000. http://dx.doi.org/10.1145/347059.347561

[5] V. Kokoouline, C. H. Greene, and B. D. Esry, “Mechanism for the destruction of H3+ ions by electron impact,” Nature, vol. 412, no. 6850, pp. 891–894, 2001. http://dx.doi.org/10.1038/35091025

[6] Changli Jiao and L. Schwiebert, “Error masking probability of 1’s complement checksums,” Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495), Scottsdale, AZ, USA: IEEE, pp. 505–510, 2001. http://dx.doi.org/10.1109/ICCCN.2001.956312

[7] T. C. Maxino and P. J. Koopman, “The Effectiveness of Checksums for Embedded Control Networks,” IEEE Trans. Dependable and Secure Comput., vol. 6, no. 1, pp. 59–72, 2009. https://doi.org/10.1109/TDSC.2007.70216

[8] R. Suppi, M. Solsona, and E. Luque, “Web-based distributed computing using Parasite,” Eleventh Euromicro Conference on Parallel, Distributed and Network-Based Processing, Genova, Italy: IEEE, pp. 467–474, 2003. https://doi.org/10.1109/EMPDP.2003.1183627

[9] P. Koopman, K. Driscoll, and B. Hall, “Selection of Cyclic Redundancy Code and Checksum Algorithms to Ensure Critical Data Integrity,” p. 1941278 Bytes, 2015. https://doi.org/10.21949/m80j-4169

[10] K. Tsubouchi, T. Teraoka, H. Gomi, and M. Shimosaka, “Parasitic Location Logging: Estimating Users’ Location from Context of Passersby,” IEEE International Conference on Pervasive Computing and Communications, Austin, TX, pp. 1–10, 2020. https://doi.org/10.1109/PerCom45495.2020.9127381

[11] N. G. Bardis, N. Doukas, and O. P. Markovskyi, “Double burst error correction method: Case of interference incidents during data transmission in wired channels,” 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), Daejeon, Korea (South): IEEE, pp. 192–196, 2011. http://dx.doi.org/10.1109/DEST.2011.5936624

[12] J. Stone, M. Greenwald, C. Partridge, and J. Hughes, “Performance of checksums and CRCs over real data,” IEEE/ACM Trans. Networking, vol. 6, no. 5, pp. 529–543, 1998. https://doi.org/10.1109/90.731187

[13] M. A. Alrshah, M. A. Al-Maqri, and M. Othman, “Elastic-TCP: Flexible Congestion Control Algorithm to Adapt for High-BDP Networks,” IEEE Systems Journal, vol. 13, no. 2, pp. 1336–1346, 2019. https://doi.org/10.1109/JSYST.2019.2896195

[14] J. Alvarez-Horcajo, D. Lopez-Pajares, I. Martinez-Yelmo, J. A. Carral, and J. M. Arco, “Improving Multipath Routing of TCP Flows by Network Exploration,” IEEE Access, vol. 7, pp. 13608–13621, 2019. http://dx.doi.org/10.1109/ACCESS.2019.2893412

[15] M. Balany and C. Partridge, “Is It Time to Upgrade From CRC-32?,” NOMS 2024-2024 IEEE Network Operations and Management Symposium, Seoul, Korea, Republic of: IEEE, pp. 1–5, 2024. https://doi.org/10.1109/NOMS59830.2024.10575104

[16] S. Shannigrahi and C. Partridge, “Big Data, Transmission Errors, and the Internet,” Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), Porto, Portugal: IEEE, pp. 142–145, 2023. https://doi.org/10.1109/DSN-S58398.2023.00040

[17] Y. Xin et al., “Data Integrity Error Localization in Networked Systems with Missing Data,” IEEE International Conference on Communications, Seoul, Korea, Republic of: IEEE, pp. 341–346, 2022. http://dx.doi.org/10.48550/arXiv.2207.02102

[18] F. Zhang and M. Hu, “Mitigate Parasitic Resistance in Resistive Crossbar-based Convolutional Neural Networks,” arXiv, 2019. https://doi.org/10.48550/arXiv.1912.08716

[19] S. LF and S. R, “How Turing parasites expand the computational landscape of digital life,” 2019. https://doi.org/10.1103/PhysRevE.108.044407

[20] S. Kasarapu, S. Shukla, and S. M. P. Dinakarrao, “Optimizing Malware Detection in IoT Networks: Leveraging Resource-Aware Distributed Computing for Enhanced Security,” arXiv, 2024. https://doi.org/10.48550/arXiv.2404.10012

[21] K. Lalitha, V. Balakumar, S. Yogesh, K. M. Sriram, and V. Mithilesh, “Enhancing the Gain of Micro Strip Antenna with Cross-Shaped Parasitic Element for Microwave Imaging Applications,” International Conference on Communication and Signal Processing (ICCSP), Chennai, India: IEEE, pp. 1482–1485, 2020. https://doi.org/10.1109/ICCSP48568.2020.9182080

[22] M. Musch, C. Wressnegger, M. Johns, and K. Rieck, “Web-based Cryptojacking in the Wild,” arXiv, 2018. https://doi.org/10.48550/arXiv.1808.09474

[23] Roy. P. K., “Committee on Technical Assessment of the Feasibility and Implications of Quantum Computing, Computer Science and Telecommunications Board, Intelligence Community Studies Board, Division on Engineering and Physical Sciences, and National Academies of Sciences, Engineering, and Medicine, ” Quantum Computing: Progress and Prospects. Washington, D.C.: National Academies Press, 2019, p. 25196. http://dx.doi.org/10.17226/25196

[24] A. Y. Daeef, A. Al-Naji, and J. Chahl, “Features Engineering for Malware Family Classification Based API Call,” Computers, vol. 11, no. 11, p. 160, 2022. http://dx.doi.org/10.3390/computers11110160

[25] J. M. Pittman and S. Alaee, “To What Extent Are Honeypots and Honeynets Autonomic Computing Systems?,” arXiv, 2023. https://doi.org/10.48550/arXiv.2307.11038

[26] L. Baumann, E. Heftrig, H. Shulman, and M. Waidner, “The Master and Parasite Attack,” arXiv, 2021. https://doi.org/10.1109/DSN48987.2021.00029

[27] B. N. Taha, “An Investigation of Quantum and Parallel Computing Effects on Malware Families Classification,” JASTT, vol. 4, no. 02, pp. 101–112, 2023. http://dx.doi.org/10.38094/jastt42153

[28] Michael Agbaje, “Parasitic Computing: Problems And Ethical Consideration,” International Journal of Advance Research, IJOAR .org, vol. 1, no. 11, 2019.

[29] S. C. Parija and A. Poddar, “Artificial intelligence in parasitic disease control: A paradigm shift in health care,” Tropical Parasitology, vol. 14, no. 1, pp. 2–7, 2024. https://doi.org/10.4103/tp.tp_66_23

[30] P. Zhang, J. Zhu, Y. Chen, and X. Jiang, “End-to-End Physical Layer Authentication for Dual-Hop Wireless Networks,” IEEE Access, vol. 7, pp. 38322–38336, 2019. https://doi.org/10.1109/ACCESS.2019.2906699

[31] B. Kakkar, M. Goyal, P. Johri, and Y. Kumar, “Artificial Intelligence-Based Approaches for Detection and Classification of Different Classes of Malaria Parasites Using Microscopic Images: A Systematic Review,” Arch Computat Methods Eng, vol. 30, no. 8, pp. 4781–4800, 2023. https://doi.org/10.1007/s11831-023-09959-0

[32] K. Seetharam and B. Chunchure, “Analysis of Different Routing Protocols for Wireless Dense Network,” International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bangalore, India: IEEE, Mar. 2020, pp. 740–742. http://dx.doi.org/10.1109/ICIMIA48430.2020.9074913

[33] P. Koopman, “An Improved Modular Addition Checksum Algorithm,” arXiv, 2023. http://dx.doi.org/10.48550/arXiv.2304.13496

[34] V. Ciric, N. Vidojkovic, N. Gavrilovic, and I. Milentijevic, “The Concept of Consumer IP Address Preservation Behind the Load Balancer,” Zooming Innovation in Consumer Technologies Conference (ZINC), Novi Sad, Serbia: IEEE, pp. 58–61, 2020. https://doi.org/10.1109/ZINC50678.2020.9161809

[35] B. Ahmad, A. Khalid Kiani, S. Ur Rehman, Y. Huang, and Z. Yang, “Multicast Multipath TCP for Reliable Communication in Wireless Scenarios,” IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Zhangjiajie, China: IEEE, pp. 2212–2217, 2019. http://dx.doi.org/10.1109/HPCC/SmartCity/DSS.2019.00307

[36] A. B. Abdulkareem, “Effect of Node Speed and Packet Size on the Performance of the Modifications Transmission Control Protocol,” International Conference on Developments in eSystems Engineering (DeSE), Kazan, Russia: IEEE, pp. 363–369, 2019. http://dx.doi.org/10.4206/aus.2019.n26.2.26

[37] Y. Cao, L. Zeng, Q. Liu, G. Lei, M. Huang, and H. Wang, “Receiver-Assisted Partial-Reliable Multimedia Multipathing Over Multi-Homed Wireless Networks,” IEEE Access, vol. 7, pp. 177675–177689, 2019. http://dx.doi.org/10.1109/ACCESS.2019.2958986

[38] N. V. Kondratyev, M. G. Persova, Y. I. Koshkina, and D. S. Kiselev, “Approach to distributed computing system development for three-dimensional geoelectromagnetic problem solving,” International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE), Novosibirsk, Russia: IEEE, pp. 259–262, 2016. http://dx.doi.org/10.1109/ACCESS.2019.2958986

[39] P. G. Shah, X. Huang, and D. Sharma, “Algorithm Based on One’s Complement for Fast Scalar Multiplication in ECC for Wireless Sensor Network,” International Conference on Advanced Information Networking and Applications Workshops, Perth, Australia, pp. 571–576, 2010. https://doi.org/10.1109/WAINA.2010.48

[40] R. Xing et al., “Deciphering the Enigma of Satellite Computing with COTS Devices: Measurement and Analysis,” arXiv, 2024. https://doi.org/10.48550/arXiv.2401.03435

[41] N. Anantrasirichai et al., “Challenge on Parasitic Egg Detection and Classification in Microscopic Images: Dataset, Methods and Results,” arXiv , 2022.https://doi.org/10.1109/ICIP46576.2022.9897267

[42] Y. Wang, S. Wang, and G. Tong, “Learning the Propagation of Worms in Wireless Sensor Networks,” arXiv, 2022. https://doi.org/10.48550/arXiv.2209.09984

[43] S. Hazra, B. Avinash, and M. Dalui, “Design, threat analysis and countermeasures for cache replacement policy-affecting Hardware Trojans in the context of a many-core system,” Microelectronics Journal, vol. 142, p. 105973, 2023. https://doi.org/10.1016/j.mejo.2023.105973

[44] N. Limaye, N. Rangarajan, S. Patnaik, O. Sinanoglu, and K. Basu, “PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans,” IEEE Trans. Emerg. Topics Comput., vol. 10, no. 3, pp. 1443–1455, 2022. https://doi.org/10.1109/TETC.2021.3090060

[45] L. Shi, X. Li, Z. Gao, P. Duan, N. Liu, and H. Chen, “Worm computing: A blockchain-based resource sharing and cybersecurity framework,” Journal of Network and Computer Applications, vol. 185, p. 103081, 2021. http://dx.doi.org/10.1016/j.jnca.2021.103081

[46] S. Ghaffaripour and A. Miri, “Parasite Chain Attack Detection in the IOTA Network,” in 2022 International Wireless Communications and Mobile Computing (IWCMC), Dubrovnik, Croatia: IEEE, pp. 985–990, 2022. https://doi.org/10.1109/IWCMC55113.2022.9824318

[47] S. Shannigrahi, C. Fan, and C. Papadopoulos, “Request aggregation, caching, and forwarding strategies for improving large climate data distribution with NDN: a case study,” Proceedings of the 4th ACM Conference on Information-Centric Networking, Berlin Germany: ACM, pp. 54–65, 2017. http://dx.doi.org/10.1145/3125719.3125722

[48] P. Ndajah, A. O. Matine, and M. N. Hounkonnou, “Black Hole Attack Prevention in Wireless Peer-to-Peer Networks: A New Strategy,” Int J Wireless Inf Networks, vol. 26, no. 1, pp. 48–60, 2019. https://link.springer.com/article/10.1007/s10776-018-0418-z

[49] J. Fletcher, “An Arithmetic Checksum for Serial Transmissions,” IEEE Trans. Commun., vol. 30, no. 1, pp. 247–252, 1982. https://doi.org/10.1109/TCOM.1982.1095369

[50] Y. Wu et al., “N-DISE: NDN-based data distribution for large-scale data-intensive science,” in Proceedings of the 9th ACM Conference on Information-Centric Networking, Osaka Japan: ACM, 2022. https://doi.org/10.1145/3517212.3558087

Downloads

Published

2025-08-20

How to Cite

[1]
G. Oise, C. Nwabuokei, R. IGBUNU, and P. EJENARHOME, “Revisiting Parasitic Computing: Ethical and Technical Dimensions in Resource Optimization”, Vokasi Unesa Bull. Eng. Technol. Appl. Sci., vol. 2, no. 3, pp. 376–386, Aug. 2025.

Issue

Section

Article
Abstract views: 105 , PDF Downloads: 117