The Community for Technology Leaders
RSS Icon
Issue No.03 - May/June (2011 vol.15)
pp: 43-50
Michael Atighetchi , Raytheon BBN Technologies
Brett Benyo , Raytheon BBN Technologies
Abhimanyu Gosain , Raytheon BBN Technologies
Robert MacIntyre , Raytheon BBN Technologies
Partha Pal , Raytheon BBN Technologies
Virginia Travers , Raytheon BBN Technologies
John Zinky , Raytheon BBN Technologies
<p>Cost and testing considerations limit the acceptance and deployment of technologies that make information exchanges more secure, reliable, semantically understandable, and self-improving. PbProxy is a flexible proxy that enables transparent insertion of custom logic into HTTP and HTTPS interactions. It has successfully been used to facilitate behavior-based prevention of phishing attacks, machine learning of Web service procedures, and Web browsing over disruption-tolerant networks by injecting custom logic into existing applications and communication streams. PbProxy encapsulates common functionality into a proxy base and supports customizable plugins to foster code reuse.</p>
Distributed systems, middleware technologies, artificial intelligence, security and privacy, networking and communications
Michael Atighetchi, Brett Benyo, Abhimanyu Gosain, Robert MacIntyre, Partha Pal, Virginia Travers, John Zinky, "Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy", IEEE Internet Computing, vol.15, no. 3, pp. 43-50, May/June 2011, doi:10.1109/MIC.2010.103
1. J. Gettys et al., Hypertext Transfer Protocol—HTTP/1.1, IETF RFC 2612, June 1990;
2. R. Fielding, Architectural Styles and the Design of Network-Based Software Architectures, doctoral dissertation, Dept. Information and Computer Science, Univ. California, Irvine, 2000.
3. M. Atighetchi and P. Pal, "Supporting Safe Content-Inspection of Web Traffic," CrossTalk — J. Defense Software Eng., Sept. 2008, pp. 19–23.
4. E. Rescorla and T. Dierks, The Transport Layer Security (TLS) Protocol Version 1.2, IETF RFC 5246, Aug. 2008;
5. P. Pal and M. Atighetchi, "Attribute-Based Prevention of Phishing Attacks," Proc. 8th IEEE Int'l Symp. Network Computing and Applications, IEEE Press, 2009; doi:10.1109/NCA.2009.13.
6. J.D. Tygar, M. Hearst, and R. Dhamija, "Why Phishing Works," Proc. Conf. Human Factors in Computing Systems, ACM Press, 2006, pp. 581–590.
7. R. Laddaga et al., "Poirot-Integrated Learning of Web Service Procedures," Proc. 23rd Int'l Conf. Artificial Intelligence Vol. 3, AAAI Press, 2008, pp. 1274–1279.
8. J.J. Garrett, "Ajax: A New Approach to Web Applications," Adaptive Path, 18 Feb. 2005; 000385.php.
9. K. Scott and S. Burleigh, Bundle Protocol Specification, IETF RFC 5050, Nov. 2007; .
10. R. Krishnan, "The Spindle Disruption-Tolerant Networking System," Proc. Military Comm. Conf., IEEE Press, 2007, pp. 1–7.
11. B.N. Levine, A. Venkataramani, and A. Balasubramanian, "Enhancing Interactive Web Applications in Hybrid Network," Proc. 14th Int'l Conf. Mobile Computing and Networking, ACM Press, 2008, pp. 70–80.
12. D. Floreani, P. Holliday, and I.P.L. Wood, "Moving Data in DTNs with HTTP and MIME," Proc. Int'l Conf. Ultra Modern Telecomm., IEEE Press, 2009, pp. 1–4.
13. D. Kutscher and J. Ott, "Bundling the Web: HTTP over DTN," Proc. ACM Workshop Networking in Public Transport, ACM Press, 2006; .
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool