CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing

  title={CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing},
  author={Yulong Wang and Jiakun Shen},
  journal={J. Networks},
Security-as-a-service (SaaS) is an outsourcing model for security management in cloud computing. Vulnerability scanners based on cloud computing is becoming one of the killer applications in SaaS due to the pay-per-use manner and powerful scanning capability. When performing vulnerability scanning through network, the scanner needs to establish a large number of TCP connections with the target host. To deal with the problem of IPv4 address shortening and to protect the hosts within the… Expand
1 Citations
Massive XML Data Mining in Cloud Computing Environment
  • Z. Li
  • Computer Science
  • J. Multim.
  • 2014
Experimental results show that the proposed method can effectively mine useful information from massive XML documents in cloud computing environment with high efficiency. Expand


Network Monitoring for Web-Based Threats
Abstract : This report models the approach a focused attacker would take in order to breach an organization through web-based protocols and provides detection or prevention methods to counter thatExpand
STUN-based connection sequence through symmetric NATs for TCP connection
S symmetric NAT can be traversed with this method and it causes some overhead which hardly affect to use the connections, but also measures its overhead. Expand
Design and Implementation of a TURN Based Solution to Symmetric NAT
This paper designs and implements a TURN based solution to traverse symmetric NAT with SIP protocol, and supplies the encapsulation interface of this module so that it can be transplanted to other types of terminals easily. Expand
Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)
The TURN protocol was designed to be used as part of the Interactive Connectivity Establishment (ICE) approach to NAT traversal, though it can also be used without ICE. Expand
TT-STUN protocol design for effective TCP NAT traversal
  • Zhewen Lin, Tiantong You
  • Computer Science
  • 2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT)
  • 2010
TT-STUN protocol is designed using TCP To Stun to TCP's design for effective TCP NAT traversal and its penetration can reach 90%. Expand
Research of TCP NAT Traversal Solution Based on Port Correlation Analysis & Prediction Algorithm
A Port Correlation Analysis and Prediction (PCAP) algorithm to predict the NAT allocated port number and a novel PCAP based TCP NAT traversal scheme to build successful P2P connections to demonstrate the effectiveness of the algorithm on NAT behavior detection and port prediction. Expand
A New Method for Symmetric NAT Traversal in UDP and TCP
A new method for Network Address Translator (NAT) Traversal in UDP is proposed, based on a new UDP hole punching tech- nique that controls ports to traverse symmetric NAT boxes as well as other kinds of NATs. Expand
IP Network Address Translator (NAT) Terminology and Considerations
This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT. Expand
Traversal Using Relays around NAT (TURN) Extensions for TCP Allocations
This specification defines an extension of Traversal Using Relays around NAT (TURN), a relay protocol for NAT traversal, to allows a TURN client to request TCP allocations, and defines new requestsExpand