[go: up one dir, main page]

0% found this document useful (0 votes)
144 views30 pages

Proxy Servers: Jiban Jyoti Rana Reg No:0801307165 Branch: IT Sec: B

This document discusses different types of proxy servers. A proxy server acts as an intermediary between clients and external servers. Proxy servers can provide anonymity, cache content to improve performance, and filter content. Specific types discussed include anonymous proxy servers which hide a user's IP address, FTP proxy servers for file transfers, caching proxy servers which store frequently requested content, content filtering proxy servers which block restricted content, and reverse proxy servers which improve security and load balance requests to external servers. Proxy servers provide benefits like anonymity, faster speeds, and content control but have disadvantages like potential for misuse of data.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
144 views30 pages

Proxy Servers: Jiban Jyoti Rana Reg No:0801307165 Branch: IT Sec: B

This document discusses different types of proxy servers. A proxy server acts as an intermediary between clients and external servers. Proxy servers can provide anonymity, cache content to improve performance, and filter content. Specific types discussed include anonymous proxy servers which hide a user's IP address, FTP proxy servers for file transfers, caching proxy servers which store frequently requested content, content filtering proxy servers which block restricted content, and reverse proxy servers which improve security and load balance requests to external servers. Proxy servers provide benefits like anonymity, faster speeds, and content control but have disadvantages like potential for misuse of data.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30

PROXY SERVERS

BY:
Jiban Jyoti Rana
Reg No:0801307165
Branch: IT
Sec: B
INDEX
 Introduction to Proxy Server
 Anonymous Proxy Server
 FTP Proxy Server
 Caching
 Content Filtering
 Reverse Proxy Server
 Advantages of Proxy Server
 Disadvantages of Proxy Server
WHAT IS
A
PROXY SERVER ?
 In computer networks, a proxy server is a server (a computer
system or an application) that acts as an intermediary for requests
from clients seeking resources from other servers. A client connects
to the proxy server, requesting some service, such as a file,
connection, web page, or other resource, available from a different
server.
 The proxy server evaluates the request according to its filtering
rules. For example, it may filter traffic by IP address or protocol. If
the request is validated by the filter, the proxy provides the resource
by connecting to the relevant server and requesting the service on
behalf of the client.
 A proxy server may optionally alter the client's request or the
server's response, and sometimes it may serve the request without
contacting the specified server. In this case, it 'caches' responses
from the remote server, and returns subsequent requests for the
same content directly.
Client sends a request

Server provides the services

CLIENT WEB SERVER


PROXY
Sends request to the Makes requests for
SERVER
Proxy Server the client

CLIENT WEB SERVER


ANONYMOUS
PROXY SERVERS
WHY DO WE NEED AN
ANONYMOUS PROXY SERVER
 Web resources can collect information about
you, using your IP address.

 You might be targeted by the


marketers who send regular spam and
junk e-mails.

 A website can automatically exploit the security


holes in your system.
WHAT IS AN
ANONYMOUS PROXY SERVER

 Anonymous Proxy Server hides your


IP address.
192.245.17.1
201.124.17.1
 They do not let anyone know what
you are surfing.
 When few sites are blocked by the internet
providers in certain countries or geographical
areas, anonymous proxy servers can be used.
ANONYMOUS SURFING PROXY SITES
 They allow you to enter the address (URL) of the site you
wish to go to at the anonymous surfing proxy site.

 The site will retrieve the page for you and present it to
you.

 The site you visit will not receive any particulars about
your system.
FTP(File Sharing Protocol):
• Over Windows
LAN
• FTP
• P2P
• Email
• Online sharing
FTP PROXY SERVERS:
Available applications for
both HTTP and FTP
Proxy servers
• Web browsers
• Download
managers
• Operating
system (with
lots of
configuration)
 CACHE:
It is a
collection of
data
duplicating
original
values
stored
elsewhere
CACHING PROXY SERVER
Page-fetch algorithm:
 Check cache
for existing copy of object

 If it exists in cache…….

 If object is not in cache, expired, or


otherwise invalidated…….
CONTENT FILTERING PROXY SERVER:

Content filtering is the technique


whereby content is blocked or
allowed based on analysis of its
content, rather than its source or
other criteria. It is most widely
used on the internet to
filter email and web access.
WEB
SERVER

CLIENT 1 CLIENT 2 CLIENT 3


REVERSE
PROXY
REVERSE WEB
SERVER
PROXY
SERVER REVERSE
PROXY
SERVER

INTERNET

CLIENT 3
CLIENT 1 CLIENT 2
FORWARD WEB
SERVER
PROXY
SERVER
INTERNET

PROXY
SERVER

CLIENT 1 CLIENT 3
CLIENT 2
SECURITY

INTERNET

WEB
SERVER

REVERSE PROXY

 Acts as a additional layer of defense and


protects against some OS and Web server
specific attacks.
CACHING

WEB Can offload


SERVER
the web
server by
caching
cache most
frequently
used web
INTERNET
pages.
LOAD BALANCING:
WEB
SERVER

Less load on the


server as the cache
cache stores the
INTERNET
static web pages
ADVANTAGES
 Remain anonymous to the server.
 Cache proxies reduces load on main
server.
 Acts as a security layer for clients
and main server.
 Can block any website from access
 Can be used to view certain
unblocked web sites.
 Faster loading of page is achieved.
DISADVANTAGES

Not completely
anonymous.
Data can be misused.
 Need to maintain a
database for Blacklist
and White list.
REFERENCES:
 Http://en.wikipedia.org/wiki/Proxy_servers
 http://
www.webopedia.com/TERM/P/proxy_server.h
tml
 http://whatis.techtarget.com/definition/0,,
sid9_gci212840,00.html
 http://www.authorstream.com
 http://www.scribid.com
 http://
www.slideshare.net/anitatwilight/group18awes
ome4someproxy-serverppt
ANY QUERIES
?
THANK
YOU

You might also like