CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing

@article{Wang2013CloudProxyAN,
  title={CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing},
  author={Yulong Wang and Jiakun Shen},
  journal={J. Networks},
  year={2013},
  volume={8},
  pages={607-615}
}
Security-as-a-service (SaaS) is an outsourcing model for security management in cloud computing. Vulnerability scanners based on cloud computing is becoming one of the killer applications in SaaS due to the pay-per-use manner and powerful scanning capability. When performing vulnerability scanning through network, the scanner needs to establish a large number of TCP connections with the target host. To deal with the problem of IPv4 address shortening and to protect the hosts within the… 
1 Citations

Figures and Tables from this paper

Massive XML Data Mining in Cloud Computing Environment
  • Zhao Li
  • Computer Science
    J. Multim.
  • 2014
TLDR
Experimental results show that the proposed method can effectively mine useful information from massive XML documents in cloud computing environment with high efficiency.

References

SHOWING 1-10 OF 20 REFERENCES
Network Monitoring for Web-Based Threats
TLDR
This report models the approach a focused attacker would take in order to breach an organization through web-based protocols and provides detection or prevention methods to counter that approach and describes several threat types, including configuration management problems, authorization problems, data validation issues, session management issues, and cross-site attacks.
STUN-based connection sequence through symmetric NATs for TCP connection
TLDR
S symmetric NAT can be traversed with this method and it causes some overhead which hardly affect to use the connections, but also measures its overhead.
Session Traversal Utilities for NAT (STUN)
Session Traversal Utilities for NAT (STUN) is a protocol that serves as a tool for other protocols in dealing with Network Address Translator (NAT) traversal. It can be used by an endpoint to
Design and Implementation of a TURN Based Solution to Symmetric NAT
TLDR
This paper designs and implements a TURN based solution to traverse symmetric NAT with SIP protocol, and supplies the encapsulation interface of this module so that it can be transplanted to other types of terminals easily.
TT-STUN protocol design for effective TCP NAT traversal
  • Zhewen LinTiantong You
  • Computer Science
    2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT)
  • 2010
TLDR
TT-STUN protocol is designed using TCP To Stun to TCP's design for effective TCP NAT traversal and its penetration can reach 90%.
A New Method for Symmetric NAT Traversal in UDP and TCP
TLDR
A new method for Network Address Translator (NAT) Traversal in UDP is proposed, based on a new UDP hole punching tech- nique that controls ports to traverse symmetric NAT boxes as well as other kinds of NATs.
IP Network Address Translator (NAT) Terminology and Considerations
TLDR
This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT.
Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)
TLDR
This specification defines a protocol, called TURN (Traversal Using Relays around NAT), that allows the host to control the operation of the relay and to exchange packets with its peers using the relay.
Traversal Using Relays around NAT (TURN) Extensions for TCP Allocations
This specification defines an extension of Traversal Using Relays around NAT (TURN), a relay protocol for NAT traversal, to allows a TURN client to request TCP allocations, and defines new requests
Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution
TLDR
The presented approach aims at minimizing the leadtime before usage of external services can start by employing a security intermediary for mediation purposes to cope with challenges on organizations' security systems.
...
...