CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing
@article{Wang2013CloudProxyAN, title={CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing}, author={Yulong Wang and Jiakun Shen}, journal={J. Networks}, year={2013}, volume={8}, pages={607-615} }
Security-as-a-service (SaaS) is an outsourcing model for security management in cloud computing. Vulnerability scanners based on cloud computing is becoming one of the killer applications in SaaS due to the pay-per-use manner and powerful scanning capability. When performing vulnerability scanning through network, the scanner needs to establish a large number of TCP connections with the target host. To deal with the problem of IPv4 address shortening and to protect the hosts within the…
Figures and Tables from this paper
One Citation
Massive XML Data Mining in Cloud Computing Environment
- Computer ScienceJ. Multim.
- 2014
Experimental results show that the proposed method can effectively mine useful information from massive XML documents in cloud computing environment with high efficiency.
References
SHOWING 1-10 OF 20 REFERENCES
Network Monitoring for Web-Based Threats
- Computer Science
- 2011
This report models the approach a focused attacker would take in order to breach an organization through web-based protocols and provides detection or prevention methods to counter that approach and describes several threat types, including configuration management problems, authorization problems, data validation issues, session management issues, and cross-site attacks.
STUN-based connection sequence through symmetric NATs for TCP connection
- Computer Science2011 13th Asia-Pacific Network Operations and Management Symposium
- 2011
S symmetric NAT can be traversed with this method and it causes some overhead which hardly affect to use the connections, but also measures its overhead.
Session Traversal Utilities for NAT (STUN)
- Computer ScienceRFC
- 2008
Session Traversal Utilities for NAT (STUN) is a protocol that serves
as a tool for other protocols in dealing with Network Address
Translator (NAT) traversal. It can be used by an endpoint to…
Design and Implementation of a TURN Based Solution to Symmetric NAT
- Computer Science
- 2009
This paper designs and implements a TURN based solution to traverse symmetric NAT with SIP protocol, and supplies the encapsulation interface of this module so that it can be transplanted to other types of terminals easily.
TT-STUN protocol design for effective TCP NAT traversal
- Computer Science2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT)
- 2010
TT-STUN protocol is designed using TCP To Stun to TCP's design for effective TCP NAT traversal and its penetration can reach 90%.
A New Method for Symmetric NAT Traversal in UDP and TCP
- Computer Science
- 2008
A new method for Network Address Translator (NAT) Traversal in UDP is proposed, based on a new UDP hole punching tech- nique that controls ports to traverse symmetric NAT boxes as well as other kinds of NATs.
IP Network Address Translator (NAT) Terminology and Considerations
- Computer ScienceRFC
- 1999
This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT.
Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)
- Computer ScienceRFC
- 2010
This specification defines a protocol, called TURN (Traversal Using Relays around NAT), that allows the host to control the operation of the relay and to exchange packets with its peers using the relay.
Traversal Using Relays around NAT (TURN) Extensions for TCP Allocations
- Computer ScienceRFC
- 2010
This specification defines an extension of Traversal Using Relays
around NAT (TURN), a relay protocol for NAT traversal, to allows a
TURN client to request TCP allocations, and defines new requests…
Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution
- Computer ScienceTrustBus
- 2010
The presented approach aims at minimizing the leadtime before usage of external services can start by employing a security intermediary for mediation purposes to cope with challenges on organizations' security systems.