CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing

  title={CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing},
  author={Yulong Wang and Jiakun Shen},
  journal={J. Networks},
Security-as-a-service (SaaS) is an outsourcing model for security management in cloud computing. Vulnerability scanners based on cloud computing is becoming one of the killer applications in SaaS due to the pay-per-use manner and powerful scanning capability. When performing vulnerability scanning through network, the scanner needs to establish a large number of TCP connections with the target host. To deal with the problem of IPv4 address shortening and to protect the hosts within the… 
1 Citations

Figures and Tables from this paper

Massive XML Data Mining in Cloud Computing Environment

  • Zhao Li
  • Computer Science
    J. Multim.
  • 2014
Experimental results show that the proposed method can effectively mine useful information from massive XML documents in cloud computing environment with high efficiency.



Network Monitoring for Web-Based Threats

This report models the approach a focused attacker would take in order to breach an organization through web-based protocols and provides detection or prevention methods to counter that approach and describes several threat types, including configuration management problems, authorization problems, data validation issues, session management issues, and cross-site attacks.

STUN-based connection sequence through symmetric NATs for TCP connection

S symmetric NAT can be traversed with this method and it causes some overhead which hardly affect to use the connections, but also measures its overhead.

Session Traversal Utilities for NAT (STUN)

Session Traversal Utilities for NAT (STUN) is a protocol that serves as a tool for other protocols in dealing with Network Address Translator (NAT) traversal. It can be used by an endpoint to

Design and Implementation of a TURN Based Solution to Symmetric NAT

This paper designs and implements a TURN based solution to traverse symmetric NAT with SIP protocol, and supplies the encapsulation interface of this module so that it can be transplanted to other types of terminals easily.

TT-STUN protocol design for effective TCP NAT traversal

  • Zhewen LinTiantong You
  • Computer Science
    2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT)
  • 2010
TT-STUN protocol is designed using TCP To Stun to TCP's design for effective TCP NAT traversal and its penetration can reach 90%.

Research of TCP NAT Traversal Solution Based on Port Correlation Analysis & Prediction Algorithm

A Port Correlation Analysis and Prediction (PCAP) algorithm to predict the NAT allocated port number and a novel PCAP based TCP NAT traversal scheme to build successful P2P connections to demonstrate the effectiveness of the algorithm on NAT behavior detection and port prediction.

A New Method for Symmetric NAT Traversal in UDP and TCP

A new method for Network Address Translator (NAT) Traversal in UDP is proposed, based on a new UDP hole punching tech- nique that controls ports to traverse symmetric NAT boxes as well as other kinds of NATs.

IP Network Address Translator (NAT) Terminology and Considerations

This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT.

Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)

This specification defines a protocol, called TURN (Traversal Using Relays around NAT), that allows the host to control the operation of the relay and to exchange packets with its peers using the relay.

Traversal Using Relays around NAT (TURN) Extensions for TCP Allocations

This specification defines an extension of Traversal Using Relays around NAT (TURN), a relay protocol for NAT traversal, to allows a TURN client to request TCP allocations, and defines new requests