0% found this document useful (0 votes)
13 views

Lec 1 - Unit 4 - Lecture Proxy Servers

tgtgtrgrgtr

Uploaded by

aashima.it
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Lec 1 - Unit 4 - Lecture Proxy Servers

tgtgtrgrgtr

Uploaded by

aashima.it
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Unit 4.

Privacy and security topics


Proxy Server
• Proxy Server-A proxy server is a server
application or appliance that acts as an
intermediary for requests from clients seeking
resources from servers that provide those
resources.
• A proxy server thus functions on behalf of the
client when requesting service, potentially
masking the true origin of the request to the
resource server.
• Instead of connecting directly to a server that can
fulfill a requested resource, such as a file or
web page for example, the client directs the
request to the proxy server, which evaluates the
request and performs the required network
transactions.
• This serves as a method to simplify or control the
complexity of the request, or provide additional
benefits such as load balancing, privacy, or
security.
• Proxies were devised to add structure and
encapsulation to distributed systems.
Communication between two computers (shown in grey) connected through a
third computer (shown in red) which acts as a proxy server. Bob does not know to
whom the information is going, which is the reason that proxies can be used to
protect privacy.
Types
• A proxy server may reside on the user's local computer, or at any
point between the user's computer and destination servers on
the Internet.
• A proxy server that passes unmodified requests and responses is
usually called a gateway or sometimes a tunneling proxy.
• A forward proxy is an Internet-facing proxy used to retrieve data
from a wide range of sources (in most cases anywhere on the
Internet).
• A reverse proxy is usually an internal-facing proxy used as a front-
end to control and protect access to a server on a private
network. A reverse proxy commonly also performs tasks such as
load-balancing, authentication, decryption and caching.
• Types
1. Open proxies
2. Reverse proxies
• Open proxies

An open proxy forwarding requests from and to anywhere on the Internet.


• Reverse proxies

A reverse proxy taking requests from the Internet and forwarding them to servers
in an internal network. Those making requests connect to the proxy and may not
be aware of the internal network.
Uses
– Monitoring and filtering
• Content-control software
• Filtering of encrypted data
• Bypassing filters and censorship
• Logging and eavesdropping
– Improving performance
– Translation
– Repairing errors
– Accessing services anonymously
• QA geotargeted advertising
– Security
• Cross-domain resources
– Malicious usages
• Secondary market brokers
Refer wikipedia page:

https://en.wikipedia.org/wiki/Proxy_server

You might also like