Explore chapters and articles related to this topic
Network Threats
Published in Nicholas Kolokotronis, Stavros Shiaeles, Cyber-Security Threats, Actors, and Dynamic Mitigation, 2021
Panagiotis Radoglou Grammatikis, Panagiotis Sarigiannidis
A proxy server or just proxy is a hardware or a software component, which is placed between two communication parties in order to monitor and control their communications. Figure 5.26 illustrates how a proxy is utilized. In particular, the role of the proxy is to receive the messages coming either from the client or the server and forward them, respectively. Therefore, the proxy has the capability to capture and control the exchanged network traffic between these parties. If a proxy has not been instantiated by a potential cyber-attacker, then it can enhance the overall security and Quality of Service (QoS) of this interaction. However, on the other hand, since a proxy operates as an intermediary, it can be used for MiTM attacks.
VoIP Telephone Systems in the Studio Environment
Published in Steve Church, Skip Pizzi, Audio Over IP, 2012
Like most things based on IP, SIP was designed to be modular. Implementers can pick and choose among the following elements to build the system they need: SIP clients. Sometimes called user agents or endpoints. These can be hardware phones or “soft phones” (phone applications running on PCs).Gateways. When needed, gateways translate between the IP network side and the switched-circuit telco side, providing physical, electrical, signaling, and audio interface.Proxy server. Receives SIP requests from a client and forwards them on the client's behalf. Basically, a proxy server receives SIP messages and forwards them to the next SIP server in the network. Proxy servers can provide functions such as authentication, authorization, network access control, routing, reliable request retransmission, and security.Redirect server. Provides the client with information about the next hop or hops that a message should take, and then the client contacts the next-hop server or client directly.Registrar server. Processes requests from clients for registration of their current location. Registrar servers are often colocated with a redirect or proxy server.
Broadcast operation centers in transition
Published in Philip J. Cianci, Technology and Workflows for Multiple Channel Content Distribution, 2012
A proxy server acts as an intermediary between a client computer and a network resource. For example, a computer wants to access a Web site. However, the network is configured such that all requests for Internet access must go through a proxy server. Since the Web page does not reside on the proxy, it will forward the request to the Web site. The response will also pass through the proxy server and then be passed on to the requesting computer.
Design of intelligent manufacturing system based on digital twin for smart shop floors
Published in International Journal of Computer Integrated Manufacturing, 2023
Mengke Sun, Zongyan Cai, Ningning Zhao
In the information interaction network architecture, OPC UA server is embedded in field devices such as programmable control devices, sensors RFIDs, QR code and bar code readers. In order to improve the generality of data, OPC UA server converts the format of real-time data into XML format after gathering them. After data management and logical operation, OPC UA client provides corresponding services. When SCADA system obtains data, it adopts the concept of joint server and client, that is, SCADA system provides data for information systems and digital twin system as a server up and obtains data from the lower proxy server as a client down. These real-time data are stored in digital twin database after cleaning, filtering, integrating and mining. MySQL database, Oracle database or Microsoft SQL Server with the ability to read and generate XML data can be used as digital double databases. The simulation software or intelligent algorithms are used to drive the digital twin models simulation of various elements for further analysis and decision making. CAPP system, MES, ERP system and other upper application systems accept decision results to update current process information, planning and scheduling information and monitoring information.
Research on Global BloomFilter-Based Data Routing Strategy of Deduplication in Cloud Environment
Published in IETE Journal of Research, 2023
Qinlu He, Zhen Li, Chen Chen, Hao Feng
In addition, when the BloomFilter array is applied in the cluster system, because the BloomFilter array is maintained on multiple nodes, how to ensure the consistency of these multiple arrays is also a problem that needs to be solved. For example, the global deduplication policy uses the SummaryCache protocol to ensure the consistency of the array, the main content of SummaryCache means that the content in the server cache changes very little in a short period of time, based on this, the cache content of the proxy server is represented by SummaryCache, and each proxy server saves the SummaryCache of all other proxy servers, and then updates regularly. Therefore, a proxy server can recover by querying the SummaryCache of other servers. The global deduplication policy, based on this, when updating the BloomFilter array, it will send its own in-memory maintained array to all other storage nodes, and because the essence of BloomFilter is a bit array, all arrays can be updated by bitwise and operated on the sending array and the storage node's own maintained array. The array stores all the block fingerprint information, so the array occupies a large space, if the broadcast is used to send the method will seriously affect the performance of the system, although this is only a scheduled update will not be updated after each block is sent, but it will still affect the system performance.
Intelligent information flow management system in innovative scientific and industrial clusters
Published in International Journal of Parallel, Emergent and Distributed Systems, 2022
Artur Zaenchkovski, Alexey Lazarev, Dmitrii Tukaev, Victor Epifanov
The result of ip address distribution main topology consideration, in particular IPv6, made it possible to identify the problem security insufficient in the address distribution system (dhcp server) on hardware and software server systems component of scientific and industrial cooperation. In this regard, a neural network forecasting system of unique IPv6 addresses for an array of client devices in multiple network segments was developed. To eliminate the factors of inaccurate forecasting, a fuzzy logic device was introduced into the developed system, which allowed neglecting the accuracy of the output vector for establishing a client–server connection. An important one is the data encryption module, which allowed the use of the AES-GCM cryptography method for additional encryption of traffic via a proxy server. The dynamic component replacement platform module, integrated into the primary structure of the system, made it possible at the analysis stage to identify the unix kernel structure responsible for the formation of the operating system signature and, in accordance with the available data set, replace the original sequence to prevent the possibility of its disclosure to third parties.