One of the latest buzzwords in the IT industry is cloud computing. Cloud computing refers to distributed computing resources that can choose quantitative computing capabilities. What kind of computing resources is "available" and changes with the circumstances. In fact, most people usually talk about cloud computing as "Internet cloud". In this case, any operation to create, manage, and store this "Cloud" cannot be precisely stated. All we see is the usage of allocated resources.
Cloud computing is gradually becoming a concept under a strictly controlled business model, and cloud computing technology is gradually emerging in this field. Utility computing refers to a model in which people can subscribe to distributed computing resources like household electricity or natural gas services. Amazon has already entered this field through the provided EC2 service.
A more sophisticated Implementation of cloud computing technologies (BOINC ), this technology is based on an earlier distributed computing platform, such as SETI @ Home and Folding @ Hom. Compared with BOINC, it has a large gap in standardization. A distributed system such as BitTorrent, as a good example of the early stage of resource sharing, is actually a spread point-to-point network service. Although it is more primitive in some aspects, it also has more advanced parts, to some extent, it can be used as something in the same system.
Many fashionable followers in the IT industry may be shocked by the fact that this has been pointed out. In fact, the oldest example of successful implementation of cloud computing technology is distributed denial-of-service attacks and spam botnets. This botnet uses the mobile malicious code I copied to infect every computer and spread copies over the Internet. These infected systems are often called "botnets". They have a certain degree of autonomy to secretly perform simple and repetitive operations and are under control of the total volume of hackers who deploy them.
Distributed Denial of Service (DoS) attacks and distribution of spam are the most complex cloud computing technologies. Of course, on the other hand, botnets also provide a potential basis for more illegal use. For example, the cost of brute-force password cracking is measured by the processor cycle (just as the cost is measured by the dollar ), when the resources of a botnet distributed supercomputer that automatically transmits infections are added, the cost is much lower.
With the increasing popularity of the Internet, especially the emergence of more and more users using the same operating system on the network, we can only expect, for those who want to solve the computing difficulties, distributed computing resources will become a more and more common means. These include scientists, commercial users who need to process a large amount of data, and security researchers. For security researchers, Free Rainbow Tables has begun to use distributed computing to crack passwords to improve the Rainbow table generation function. However, if the "Cloud" computing I talked about was held by criminals, they could use botnets composed of infected systems to achieve evil purposes.
As mentioned above, we can find that the use of distributed computing technology by hackers will greatly change the future of computer security policies. Due to the increase in the number of botnet users, the necessary special processing time and resources will rise to a higher level, and the security decomposition work will become impractical. Therefore, in this ever-changing security environment, security professionals need to understand how they should do their work to ensure system security.
Distributed Computing provides us with a bright future. You only need an email client and a web browser to do anything you need. But unfortunately, malicious attacks are also included in these cases. Ignoring this fact will not make us safer.