Group18_Awesome4some:Proxy server.ppt

41
Awesum4sum

description

 

Transcript of Group18_Awesome4some:Proxy server.ppt

Page 1: Group18_Awesome4some:Proxy server.ppt

Awesum4sum

Page 2: Group18_Awesome4some:Proxy server.ppt

Team Members

• Lisha Murthy (1MS07IS041)• Anitha B. S (1MS07IS005)• Caroline I (1MS07IS017)• Prabha P (1MS07IS068)

Page 3: Group18_Awesome4some:Proxy server.ppt

Index

• Introduction to Proxy Server• Anonymous Proxy Server• HTTP Proxy Server • FTP Proxy Server• Caching• Content Filtering• ICAP• Reverse Proxy Server• Advantages and Disadvantages of Proxy Server• Demonstration on CC Proxy

Page 4: Group18_Awesome4some:Proxy server.ppt

PROXY SERVER

Page 5: Group18_Awesome4some:Proxy server.ppt

WHAT IS A PROXY SERVER

Page 6: Group18_Awesome4some:Proxy server.ppt

Client sends a request

Server provides the services

CLIENT WEB SERVER

Page 7: Group18_Awesome4some:Proxy server.ppt

CLIENT WEB SERVER

PROXY SERVERSends request to the

Proxy ServerMakes requests for the client

Page 8: Group18_Awesome4some:Proxy server.ppt

ANONYMOUS PROXY SERVERS

Page 9: Group18_Awesome4some:Proxy server.ppt

Web resources can collect information aboutyou, using your IP address.

You might be targeted by the marketers who send regular spam and junk e-mails.

A website can automatically exploit the security holes in your system.

WHY DO WE NEED AN ANONYMOUS PROXY SERVER

Page 10: Group18_Awesome4some:Proxy server.ppt

WHAT IS AN ANONYMOUS PROXY SERVER

Anonymous Proxy Server hides your IP address.

They do not let anyone know what you are surfing.

192.245.17.1

201.124.17.1

Page 11: Group18_Awesome4some:Proxy server.ppt

When few sites are blocked by the internet providers in certain countries or geographical areas, anonymous proxy servers can be used.

Page 12: Group18_Awesome4some:Proxy server.ppt

Anonymous surfing proxy sites

They allow you to enter the address (URL) of the site you wish to go to at the anonymous surfing proxy site.

The site will retrieve the page for you and present it to you.

The site you visit will not receive any particulars about your system.

Page 13: Group18_Awesome4some:Proxy server.ppt

Introduction to HTTP

Page 14: Group18_Awesome4some:Proxy server.ppt

Hypertextor

Hyperlinks

Page 15: Group18_Awesome4some:Proxy server.ppt

Thus formed Internet…

Page 16: Group18_Awesome4some:Proxy server.ppt

Ideal Scenario

Page 17: Group18_Awesome4some:Proxy server.ppt

With Proxy

Page 18: Group18_Awesome4some:Proxy server.ppt

FTP

Page 19: Group18_Awesome4some:Proxy server.ppt

File Sharing• Over Windows LAN• FTP• P2P• Email• Online sharing

Page 20: Group18_Awesome4some:Proxy server.ppt

File Transfer Protocol

Page 21: Group18_Awesome4some:Proxy server.ppt

FTP Proxy Servers

Page 22: Group18_Awesome4some:Proxy server.ppt

Available applications for both HTTP and FTP Proxy servers

• Web browsers• Proxy Chains• Download managers• Operating system (with lots of configuration)

Page 23: Group18_Awesome4some:Proxy server.ppt
Page 24: Group18_Awesome4some:Proxy server.ppt

Cache

It is a collection of dataduplicating original valuesstored elsewhere

Page 25: Group18_Awesome4some:Proxy server.ppt

Caching proxy server

Page 26: Group18_Awesome4some:Proxy server.ppt

Page-fetch algorithm Check cache for existing copy of object

If it exists in cache…….

If object is not in cache, expired, or otherwise invalidated…….

Page 27: Group18_Awesome4some:Proxy server.ppt

Cacheable objects

HTTP FTP

Non-cacheable objects

HTTPS WAIS

Page 28: Group18_Awesome4some:Proxy server.ppt

Content filtering proxy server

Content filtering is theprocess of removing certain content from the internet before it gets to the user that requested that User.

Eg: Twilight utilities proxy server Safeguard content filtering proxy.

Page 29: Group18_Awesome4some:Proxy server.ppt

Internet Content Adaptation Protocol (ICAP)

• ICAP servers are focused on a specific function, for example, add insertion, virus scanning, content translation, language translation, or content filtering.

• ICAP allows its clients to pass HTTP based (HTML) messages (Content) to ICAP servers for adaptation (content manipulation).

Page 30: Group18_Awesome4some:Proxy server.ppt

Functions of icap

For request modification……. ….redirection, header filtering, etc.

For response modification……. …. virus scanning, content modification, block

inappropriate content, etc.

Page 32: Group18_Awesome4some:Proxy server.ppt

CLIENT 1 CLIENT 2 CLIENT 3

WEB SERVER

Page 33: Group18_Awesome4some:Proxy server.ppt

INTERNET

CLIENT 1CLIENT 2

CLIENT 3

PROXY SERVER

WEB SERVER

FORWARD PROXY SERVER

Page 34: Group18_Awesome4some:Proxy server.ppt

WEB SERVER

INTERNET

REVERSE PROXY SERVER

CLIENT 1CLIENT 3

CLIENT 2

REVERSE PROXY SERVER

Page 35: Group18_Awesome4some:Proxy server.ppt

SECURITY

INTERNET

WEB SERVER

REVERSE PROXY

Acts as a additional layer of defense and protects against some OS and Web server specific attacks.

Page 36: Group18_Awesome4some:Proxy server.ppt

CACHING

INTERNET

WEB SERVER

Can offload the web server by caching most frequently used web pages.

cache

Page 37: Group18_Awesome4some:Proxy server.ppt

LOAD BALANCING

INTERNET

WEB SERVER

cache

Less load on the server as the cache stores the static web pages

Page 38: Group18_Awesome4some:Proxy server.ppt

COMPRESSION

Awesum 4sumAwesum

4sum

Compress content before delivering it to site visitors to optimize load times.

Page 39: Group18_Awesome4some:Proxy server.ppt

TUNNELINGWEB

SERVER

INTERNET

CLIENT 1

Proxy server

It is a web-based page that takes a site that is blocked and "tunnels" it, allowing the user to view blocked pages.

Page 40: Group18_Awesome4some:Proxy server.ppt

ADVANTAGES

• Remain anonymous to the server.

• Cache proxies reduces load on main server.

• Acts as a security layer for clients and main server.

• Can block any website from access

• Can be used to view certain unblocked web sites.

• Faster loading of page is achieved.

Page 41: Group18_Awesome4some:Proxy server.ppt

DISADVANTAGES

• Not completely anonymous.

• Data can be misused.• Need to maintain a

database for Blacklist and White list.