HTTP Proxy Server - Computer Science Engineering (CSE) PDF Download

HTTP Proxy Server

In an enterprise that uses the Internet, a proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, andcaching service. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion.

A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server , looks in its localcache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user.

To the user, the proxy server is invisible; all Internet requests and returned responses appear to be directly with the addressed Internet server. (The proxy is not quite invisible; its IP address has to be specified as a configuration option to the browser or other protocol program.)

An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. In fact, there are special servers called cache servers. A proxy can also do logging.

The functions of proxy, firewall, and caching can be in separate server programs or combined in a single package. Different server programs can be in different computers. For example, a proxy server may in the same machine with a firewall server or it may be on a separate server and forward requests through the firewall.

So Proxy Server does the following:

1.    The HTTP client sends a request to the HTTP Proxy.

2.    The HTTP Proxy connects the HTTP Server.

3.    The HTTP Server sends back the answer to the HTTP Proxy.

4.    The HTTP Proxy sends back this answer to the HTTP client.

 

HTTP Proxy Server - Computer Science Engineering (CSE)

There are several advantages using proxies. The new server is completely hidden for the user. The URL always points to the HTTP Proxy, the connection to the real HTTP Server is hidden. The HTTP Proxy caches the documents locally, therefore we have a performance gain.

Uses of proxy servers

Filtering

content-filtering web proxy server provides administrative control over the content that may be relayed through the proxy. It is commonly used in both commercial and non-commercial organizations (especially schools) to ensure that Internet usage conforms to acceptable use policy. A content filtering proxy will often support user authentication, to control web access. It also usually produces logs, either to give detailed information about the URLs accessed by specific users, or to monitor bandwidth usage statistics. Many work places, schools, and colleges restrict the web sites and online services that are made available in their buildings. This is done either with a specialized proxy, called a content filter (both commercial and free products are available), or by using a cache-extension protocol such as ICAP, that allows plug-in extensions to an open caching architecture.

Some common methods used for content filtering include: URL or DNS blacklistsURL regex filtering, MIME filtering, or content keyword filtering. Requests made to the open internet must first pass through an outbound proxy filter. The web-filtering company provides a database of URL patterns (regular expressions) with associated content attributes. This database is updated weekly by site-wide subscription, much like a virus filter subscription. The administrator instructs the web filter to ban broad classes of content (such as sports, pornography, online shopping, gambling, or social networking). Requests that match a banned URL pattern are rejected immediately.

Caching

caching proxy server accelerates service requests by retrieving content saved from a previous request made by the same client or even other clients. Caching proxies keep local copies of frequently requested resources, allowing large organizations to significantly reduce their upstream bandwidth usage and costs, while significantly increasing performance. Most ISPs and large businesses have a caching proxy. Caching proxies were the first kind of proxy server.Some poorly-implemented caching proxies have had downsides (e.g., an inability to use user authentication). Some problems are described in RFC 3143 (Known HTTP Proxy/Caching Problems).

Another important use of the proxy server is to reduce the hardware cost. An organization may have many systems on the same network or under control of a single server, prohibiting the possibility of an individual connection to the Internet for each system. In such a case, the individual systems can be connected to one proxy server, and the proxy server connected to the main server.

Bypassing filters and censorship

If the destination server filters content based on the origin of the request, the use of a proxy can remove this filter. For example, a server using IP-based geolocation to restrict its service to a certain country can be accessed using a proxy located in that country to access the service.

Likewise, a badly configured proxy can provide access to a network otherwise isolated from the Internet.

Logging and eavesdropping

Proxies can be installed in order to eavesdrop upon the data-flow between client machines and the web. All content sent or accessed – including passwords submitted and cookies used – can be captured and analyzed by the proxy operator. For this reason, passwords to online services (such as webmail and banking) should always be exchanged over a cryptographically secured connection, such as SSL.

By chaining proxies which do not reveal data about the original requester, it is possible to obfuscate activities from the eyes of the user's destination. However, more traces will be left on the intermediate hops, which could be used or offered up to trace the user's activities. If the policies and administrators of these other proxies are unknown, the user may fall victim to a false sense of security just because those details are out of sight and mind.

In what is more of an inconvenience than a risk, proxy users may find themselves being blocked from certain Web sites, as numerous forums and Web sites block IP addresses from proxies known to havespammed or trolled the site. Proxy bouncing can be used to maintain your privacy.

Gateways to private networks :

Proxy servers can perform a role similar to a network switch in linking two networks.

 Accessing services anonymously

An anonymous proxy server (sometimes called a web proxy) generally attempts to anonymize web surfing. There are different varieties of anonymizers. The destination server (the server that ultimately satisfies the web request) receives requests from the anonymizing proxy server, and thus does not receive information about the end user's address. However, the requests are not anonymous to the anonymizing proxy server, and so a degree of trust is present between the proxy server and the user. Many of them are funded through a continued advertising link to the user. Example is www.anonymizer.ruas we discussed in class.

Access control:

Some proxy servers implement a logon requirement. In large organizations, authorized users must log on to gain access to the web. The organization can thereby track usage to individuals.

The document HTTP Proxy Server - Computer Science Engineering (CSE) is a part of Computer Science Engineering (CSE) category.
All you need of Computer Science Engineering (CSE) at this link: Computer Science Engineering (CSE)

FAQs on HTTP Proxy Server - Computer Science Engineering (CSE)

1. What is an HTTP proxy server?
Ans. An HTTP proxy server is a computer that acts as an intermediary between a client and a server, allowing clients to make indirect network connections to other servers. It handles the client's requests and forwards them to the appropriate server, and then relays the server's response back to the client.
2. How does an HTTP proxy server work?
Ans. When a client sends a request to access a web page or resource, it first connects to the proxy server instead of connecting directly to the destination server. The proxy server then evaluates the request, retrieves the requested resource on behalf of the client, and forwards it back to the client. This way, the client's IP address and identity are concealed, and the proxy server can also filter or modify the content as per its configuration.
3. What are the benefits of using an HTTP proxy server?
Ans. Using an HTTP proxy server offers several benefits. Firstly, it improves privacy and security by hiding the client's IP address and acting as a shield between the client and the server. Secondly, it can cache frequently accessed resources, reducing bandwidth usage and improving performance. Additionally, an HTTP proxy server can filter content, block malicious websites, and enforce access controls, enhancing network security.
4. Can an HTTP proxy server be used for content filtering?
Ans. Yes, an HTTP proxy server can be used for content filtering. By configuring the proxy server to inspect the content of the requests and responses, it can block or allow specific websites, URLs, or content types. This can be useful in organizations to prevent access to inappropriate or unauthorized content, ensuring compliance with company policies or regulatory requirements.
5. How can an HTTP proxy server be set up and configured?
Ans. Setting up and configuring an HTTP proxy server involves a few steps. Firstly, a suitable proxy server software needs to be installed on a computer or a dedicated server. Then, the proxy server's settings need to be configured, including the listening port, allowed clients, access control rules, and caching options. Finally, the client devices or applications must be configured to use the proxy server, either through manual proxy settings or by using proxy auto-configuration (PAC) files. The exact steps may vary based on the proxy server software being used.
Download as PDF

Top Courses for Computer Science Engineering (CSE)

Related Searches

Free

,

MCQs

,

Summary

,

ppt

,

Sample Paper

,

pdf

,

past year papers

,

mock tests for examination

,

HTTP Proxy Server - Computer Science Engineering (CSE)

,

Previous Year Questions with Solutions

,

Extra Questions

,

study material

,

shortcuts and tricks

,

HTTP Proxy Server - Computer Science Engineering (CSE)

,

Exam

,

video lectures

,

Semester Notes

,

Viva Questions

,

HTTP Proxy Server - Computer Science Engineering (CSE)

,

Important questions

,

Objective type Questions

,

practice quizzes

;