{"id":"https://openalex.org/W1972117372","doi":"https://doi.org/10.4304/jnw.8.3.607-615","title":"CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing","display_name":"CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing","publication_year":2013,"publication_date":"2013-03-28","ids":{"openalex":"https://openalex.org/W1972117372","doi":"https://doi.org/10.4304/jnw.8.3.607-615","mag":"1972117372"},"language":"en","primary_location":{"id":"doi:10.4304/jnw.8.3.607-615","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.8.3.607-615","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100449211","display_name":"Yulong Wang","orcid":"https://orcid.org/0000-0003-0759-2208"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yulong Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5101093764","display_name":"Jiakun Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiakun Shen","raw_affiliation_strings":["[Beijing Univ. of Posts and Telecommunications]"],"affiliations":[{"raw_affiliation_string":"[Beijing Univ. of Posts and Telecommunications]","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100449211"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2365,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57571575,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"8","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.879982590675354},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6786510944366455},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.6497652530670166},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5745744705200195},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.562929630279541},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11712166666984558}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.879982590675354},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6786510944366455},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.6497652530670166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5745744705200195},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.562929630279541},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11712166666984558},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jnw.8.3.607-615","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.8.3.607-615","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W3821134","https://openalex.org/W172510202","https://openalex.org/W1548105542","https://openalex.org/W1593925121","https://openalex.org/W2022943973","https://openalex.org/W2058185285","https://openalex.org/W2097266364","https://openalex.org/W2281150297","https://openalex.org/W2293470534","https://openalex.org/W2299636399","https://openalex.org/W2386438339","https://openalex.org/W2547943502"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W4389340727","https://openalex.org/W4205786897","https://openalex.org/W3150465815","https://openalex.org/W2802581102","https://openalex.org/W1997222214"],"abstract_inverted_index":{"Security-as-a-service":[0],"(SaaS)":[1],"is":[2,18,134,238],"an":[3],"outsourcing":[4],"model":[5],"for":[6,137,163,223,240],"security":[7],"management":[8],"in":[9,25,119,167,231],"cloud":[10,16,168,229],"computing.":[11],"Vulnerability":[12],"scanners":[13,116,166],"based":[14,227],"on":[15,228],"computing":[17,169,230],"becoming":[19],"one":[20],"of":[21,50,62,146,183,194,210],"the":[22,29,42,54,60,69,72,74,93,96,100,110,115,120,138,172,177,186,191,204,208,211,224],"killer":[23],"applications":[24],"SaaS":[26],"due":[27],"to":[28,45,67,108,150],"pay-per-use":[30],"manner":[31],"and":[32,66,85,132,176,235],"powerful":[33],"scanning":[34,39,112,140,196],"capability.":[35],"When":[36],"performing":[37],"vulnerability":[38,111,139,165,225],"through":[40,203],"network,":[41],"scanner":[43,94,226],"needs":[44,149],"establish":[46],"a":[47,82,143,158,232],"large":[48,144],"number":[49,145],"TCP":[51,89,130,147],"connections":[52,148],"with":[53,59],"target":[55,75],"host.":[56],"To":[57],"deal":[58],"problem":[61],"IPv4":[63],"address":[64],"shortening":[65],"protect":[68],"hosts":[70,76],"within":[71],"organization,":[73],"are":[77,117],"almost":[78],"always":[79],"deployed":[80,118],"behind":[81],"NAPT(Network":[83],"Address":[84],"Port":[86],"Translation)":[87],"device,":[88],"packets":[90,197,222],"sent":[91],"by":[92,99,170],"outside":[95],"network":[97],"isolated":[98],"NAPT":[101,125,159],"device":[102],"will":[103,198],"be":[104,151,199],"blocked,":[105],"thus":[106],"unable":[107],"complete":[109],"task":[113],"when":[114],"cloud.":[121],"While":[122],"there":[123],"exists":[124],"traversal":[126],"methods,":[127],"they":[128],"support":[129],"poorly":[131],"therefore":[133],"not":[135],"ready":[136],"scenario":[141],"where":[142],"established.":[152],"In":[153],"this":[154],"paper":[155],"we":[156],"proposed":[157],"proxy":[160],"named":[161],"CloudProxy":[162,219],"adopting":[164],"combining":[171],"TURN":[173,187,205,212],"extension":[174],"protocol":[175],"Socks5":[178,184],"protocol.":[179],"We":[180],"integrated":[181],"function":[182],"into":[185],"client,":[188],"so":[189],"that":[190,218],"destination":[192],"port":[193],"all":[195],"aggregated":[200],"before":[201],"passing":[202],"server,":[206],"lessen":[207],"burden":[209],"server.":[213],"The":[214],"experimental":[215],"results":[216],"show":[217],"can":[220],"relay":[221],"transparent":[233],"way":[234],"its":[236],"scalability":[237],"sufficient":[239],"practical":[241],"use.":[242]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
