SlideShare a Scribd company logo
1 of 5
Download to read offline
SECURE WEB CACHE
PROXY SERVER
INTRODUCTION
Some home networks, corporate intranets, and Internet Service Providers (ISPs) use
proxy servers (also known as proxies). Proxy servers act as a "middleman" or broker
between the two ends of a client/server network connection. Proxy servers work with Web
browsers and servers, or other applications, by supporting underlying network protocols
like HTTP.
The proxy technology, which has developed greatly in the last years, offers the perfect
solution for organizations sitting on a closed subnet behind a firewall, who are interested
in giving their employees a controlled access to the Internet.
To maximize employee productivity, organizations need to ensure a high quality Internet
experience for users. In addition, enterprises need to implement content and user policies
to manage Web traffic growth, while effectively using network resources.
Hence the solution for this is a Proxy server. By definition, "proxy" refers to a person or
agency who has authority to act for another. So, taken literally, this means that mean a
"proxy server" acts in place of another server?
A www proxy server is the answer for many companies, who are looking for ways of
minimizing the costs of giving their employees access to the Internet, and yet, increasing
the access control the company has over its accessible web sites. The www proxy server
provides access to the Web for people on closed subnets who can only access the
Internet through a firewall machine.
A proxy server is a kind of buffer between your computer and the Internet resources you
are accessing (Web sites, FTP archives etc.). The data you request come to the proxy
first, and only then it transmits the data to the user.
It is to be taken care that the Internet's growth and success is strongly related to its
"open" nature. An Internet which would have been segmented from the start with firewalls,
packet filters, and proxies may not have become what it is today.
The proxy allows managing the kind of activities that the different users are authorized to
do. It can also give reports of users activity and one very useful thing which is providing
information using smart cache system, therefore making response time shorter, after the
first document fetch.
DEFINITION OF A PROXY SERVER
Proxies are store-and-forward caches. When a web browser is configured to use a proxy,
it never connects to the URL. Instead, it always connects to the proxy server, and asks it
to get the URL for the connection. Proxies can be used as a sort of firewall, because it
isolates the user from connecting to the Internet.
MERITS OF USING A PROXY SERVER?
An advantage of using a proxy server is that its cache can serve all users. If one or more
Internet sites are frequently requested, these are likely to be in the proxy's cache, which
will improve the user’s response time.
There are different types of proxy servers with different features, some are anonymous
proxies, which are used to hide the real IP address and some are used to filter sites,
which contain material that may be unsuitable for people to view. When you connect to a
web site, the user’s true IP address will not be shown, but the proxy servers IP will.
The features of proxy servers are especially important on larger networks like corporate
intranets and ISP networks. The more users on a LAN and the more critical the need for
data privacy, the greater the need for proxy server functionality.
AIM OR OBJECTIVE OF THE PROPOSED SYSTEM
The objective of the proposed system is to develop a standard HTTP based proxy server
with web (site) caching facility and filtering aspects along with security using firewall
implementation to enable any organization to speeden up the internet traffic usage as well
as improve the bandwidth effciency thereby improving the scalability and performance of
the server.
NEED FOR A PROXY SERVER IN ANY ORGANIZATION
The main reason for using a proxy server is to give access to the Internet from within a
firewall. An application-level proxy makes a firewall safely permeable for users in an
organization, without creating a potential security hole through which one might get into
the subnet.
The proxy can control services for individual methods, host and domain, and more-filtering
client transactions. A very important thing about proxies is that even a client without DNS
can use the Web: It needs only the IP address of the proxy.
Application level proxy facilitates caching at the proxy. Usually, one proxy server is used
by all clients connected to a subnet. This is why the proxy is able to do efficient caching of
documents that are requested by more than one client. The fact that proxies can provide
efficient caching makes them useful even when no firewall machine is in order.
EXISTING SYSTEM
• The WWW which is very popular can be considered as a large distributed information
system.
• The Internet usage is relatively inexpensive and itsv exponential growth in size.
• Statisc reporst shows that on an average 600-800 millions of static web pages are
launched along with several dynamic web pages which is an enormous increases
• Accessing information is very fast and documents appeal to a wide range of interests
• Network congestion and Server overloading
• Bandwidth is not growing fast enough.
• Without solution WWW will become too congested and its entire appeal would be lost.
PROPOSED SYSTEM ADVANTAGES
• Belonging to same organization, clients share common interests and they probably
access the same set of documents.
• On the proxy server, a previously requested and cached documents would likely result
in future hits
• Caching most popular web pages on the proxy server can save network bandwidth
and lower the access latency for the client
• Reduces bandwidth consumption and decreases network traffic
• Lessens network congestion
• The proposed software has fast access, robustness
• The proposed software has better transparency and scalability
• The proposed software has better efficiency and adaptively
• The proposed software has good stability and load balance
• The proposed software has an ability to deal with heterogeneity and it is simple and
easy to use
PROPOSED SYSTEM HARDWARE REQUIREMENTS
HARDWARE
Processor - PIII or higher processor
RAM - 128 MB or higher
HDD - 40 GB or higher
FDD - 1.44 MB
MONITOR - LG/SAMSUNG colour
Keyboard / Mouse / ATX Cabinet
SOFTWARE
OPERATING SYSTEM : WIN 2000/WIN XP/WIN 98
SOFTWARE : JDK 1.3 OR HIGHER
WEB SERVER : Tomcat / Web Logic server
DATABASE : Oracle 8i
ABOUT THE PROPOSED PROJECT
The proposed Proxy is, an HTTP server that sits on a firewall machine and usually
has a caching ability making surfing much faster. This ability makes it attractive
also in case there is no firewall. It also allows one to read documents "unplugged"
to the Internet.
This caching proxy functions as a server when connected by a client, and as a
client when contacting the original server. The proposed server is quite a
sophisticated one , so that the security "lacks" are minimal.
Our proxy server is designed to improve the performance and security of
communications across a TCP/IP network such as the Internet.
Performance is improved because the server stores frequently accessed pages
locally on it's hard drive. As a web page request is sent to the proxy server, the
proxy first retrieves the web page header from the destination computer and
checks to see if it has a copy locally on it's hard drive.
If the file has been accessed in the past week, it serves the web page from it's own
hard drive thus increasing the client's response time dramatically.
If the destination web server's web page is newer than the copy cached on the
proxy server's local hard drive, the proxy server gets the web page from the
destination server while caching it locally on it's hard drive and sending it to the
client.
The organization uses a proxy server and the Internet access is possible only
through it, so that we can build a chain, being based on a type of the corporate or
organization:
• The proposed proxy server is a HTTP proxy, so that we can create a chain,
using HTTP
SITUATIONS AT, WHICH OUR PROXY SHOULD BE USED
We can use a proxy server if we have a child or student and wish to restrict the sites they
are viewing, we will need to make sure we get the correct type of proxy because not all
proxies filter sites. We can use it to protect the user’s own self computer, it can be used to
hide the respective IP which is useful because it means hackers can not get info about the
users using it. They will only get the proxy servers IP.
Our Proxy servers are not hard to set up, no hardware or software is needed, we just
need to configure our browser to connect through it.
Our Proxy server has a Caching facility
Which places popular objects at locations close to the clients. The proposed system
implement a hierarchical cache concept. HTTP servers are used and handled by
companies for security reasons.
The cache does the following
• Frequently used docs are cached nearby
• Less traffic and hence shorter delays for documents that are not cached
• The cache reduces workload of remote server
• Data can be accessed when remote server is down
• Allows analysis of organization usage patterns
• Cooperation between caches increases efficiency
The bottleneck of the connection between the client and the internet and hence it can be
shared by all clients inside the firewall. There is a feature of access latency. Our system
also implements a firewall for security reasons.
Perhaps the most common form of network firewall is a proxy server. Proxy servers act as
an intermediary between intranet and Internet computers by receiving and selectively
blocking data packets at the network boundary.
These network firewalls also provide an extra measure of safety by hiding internal LAN
addresses from the outside Internet. In a proxy server firewall environment, network
requests from multiple clients appear to the outsider as all coming from the same proxy
server address.
OUR PROPSOED SYSTEM FEATURES
• Popular web pages are stored locally and served from our local server
• Telecommunications traffic to the Internet can be substantially reduced
• Faster web page and FTP response times
• Better utilization of the limited bandwidth
PROPOSED SYSTEM MODULES
A. SERVER SIDE MONITOR
1. Administration
2. Account manager
Permit category
Authentication types
Account configuration
3. Bandwidth management
4. Proxy Web filter
5. Time management and control
6. Caching
7. Firewall
8. Reports
Log reports
User usage reports
B. CLIENT SIDE MONITOR
1. User registration
2. Login management
3. Site access
4. Client backup utility

More Related Content

More from ncct

Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspectorncct
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...ncct
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detectorncct
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protectionncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammerncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projectsncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects Bncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S Pncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C Tncct
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projectsncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computingncct
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projectsncct
 
A S P
A S PA S P
A S Pncct
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S Pncct
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...ncct
 

More from ncct (20)

Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspector
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
 
A S P
A S PA S P
A S P
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S P
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
 

Recently uploaded

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

J A V A A B S S E C U R E W E B C A C H E P R O X Y S E R V E R

  • 1. SECURE WEB CACHE PROXY SERVER INTRODUCTION Some home networks, corporate intranets, and Internet Service Providers (ISPs) use proxy servers (also known as proxies). Proxy servers act as a "middleman" or broker between the two ends of a client/server network connection. Proxy servers work with Web browsers and servers, or other applications, by supporting underlying network protocols like HTTP. The proxy technology, which has developed greatly in the last years, offers the perfect solution for organizations sitting on a closed subnet behind a firewall, who are interested in giving their employees a controlled access to the Internet. To maximize employee productivity, organizations need to ensure a high quality Internet experience for users. In addition, enterprises need to implement content and user policies to manage Web traffic growth, while effectively using network resources. Hence the solution for this is a Proxy server. By definition, "proxy" refers to a person or agency who has authority to act for another. So, taken literally, this means that mean a "proxy server" acts in place of another server? A www proxy server is the answer for many companies, who are looking for ways of minimizing the costs of giving their employees access to the Internet, and yet, increasing the access control the company has over its accessible web sites. The www proxy server provides access to the Web for people on closed subnets who can only access the Internet through a firewall machine. A proxy server is a kind of buffer between your computer and the Internet resources you are accessing (Web sites, FTP archives etc.). The data you request come to the proxy first, and only then it transmits the data to the user. It is to be taken care that the Internet's growth and success is strongly related to its "open" nature. An Internet which would have been segmented from the start with firewalls, packet filters, and proxies may not have become what it is today. The proxy allows managing the kind of activities that the different users are authorized to do. It can also give reports of users activity and one very useful thing which is providing information using smart cache system, therefore making response time shorter, after the first document fetch. DEFINITION OF A PROXY SERVER Proxies are store-and-forward caches. When a web browser is configured to use a proxy, it never connects to the URL. Instead, it always connects to the proxy server, and asks it to get the URL for the connection. Proxies can be used as a sort of firewall, because it isolates the user from connecting to the Internet. MERITS OF USING A PROXY SERVER? An advantage of using a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve the user’s response time.
  • 2. There are different types of proxy servers with different features, some are anonymous proxies, which are used to hide the real IP address and some are used to filter sites, which contain material that may be unsuitable for people to view. When you connect to a web site, the user’s true IP address will not be shown, but the proxy servers IP will. The features of proxy servers are especially important on larger networks like corporate intranets and ISP networks. The more users on a LAN and the more critical the need for data privacy, the greater the need for proxy server functionality. AIM OR OBJECTIVE OF THE PROPOSED SYSTEM The objective of the proposed system is to develop a standard HTTP based proxy server with web (site) caching facility and filtering aspects along with security using firewall implementation to enable any organization to speeden up the internet traffic usage as well as improve the bandwidth effciency thereby improving the scalability and performance of the server. NEED FOR A PROXY SERVER IN ANY ORGANIZATION The main reason for using a proxy server is to give access to the Internet from within a firewall. An application-level proxy makes a firewall safely permeable for users in an organization, without creating a potential security hole through which one might get into the subnet. The proxy can control services for individual methods, host and domain, and more-filtering client transactions. A very important thing about proxies is that even a client without DNS can use the Web: It needs only the IP address of the proxy. Application level proxy facilitates caching at the proxy. Usually, one proxy server is used by all clients connected to a subnet. This is why the proxy is able to do efficient caching of documents that are requested by more than one client. The fact that proxies can provide efficient caching makes them useful even when no firewall machine is in order. EXISTING SYSTEM • The WWW which is very popular can be considered as a large distributed information system. • The Internet usage is relatively inexpensive and itsv exponential growth in size. • Statisc reporst shows that on an average 600-800 millions of static web pages are launched along with several dynamic web pages which is an enormous increases • Accessing information is very fast and documents appeal to a wide range of interests • Network congestion and Server overloading • Bandwidth is not growing fast enough. • Without solution WWW will become too congested and its entire appeal would be lost. PROPOSED SYSTEM ADVANTAGES • Belonging to same organization, clients share common interests and they probably access the same set of documents. • On the proxy server, a previously requested and cached documents would likely result in future hits
  • 3. • Caching most popular web pages on the proxy server can save network bandwidth and lower the access latency for the client • Reduces bandwidth consumption and decreases network traffic • Lessens network congestion • The proposed software has fast access, robustness • The proposed software has better transparency and scalability • The proposed software has better efficiency and adaptively • The proposed software has good stability and load balance • The proposed software has an ability to deal with heterogeneity and it is simple and easy to use PROPOSED SYSTEM HARDWARE REQUIREMENTS HARDWARE Processor - PIII or higher processor RAM - 128 MB or higher HDD - 40 GB or higher FDD - 1.44 MB MONITOR - LG/SAMSUNG colour Keyboard / Mouse / ATX Cabinet SOFTWARE OPERATING SYSTEM : WIN 2000/WIN XP/WIN 98 SOFTWARE : JDK 1.3 OR HIGHER WEB SERVER : Tomcat / Web Logic server DATABASE : Oracle 8i ABOUT THE PROPOSED PROJECT The proposed Proxy is, an HTTP server that sits on a firewall machine and usually has a caching ability making surfing much faster. This ability makes it attractive also in case there is no firewall. It also allows one to read documents "unplugged" to the Internet. This caching proxy functions as a server when connected by a client, and as a client when contacting the original server. The proposed server is quite a sophisticated one , so that the security "lacks" are minimal. Our proxy server is designed to improve the performance and security of communications across a TCP/IP network such as the Internet. Performance is improved because the server stores frequently accessed pages locally on it's hard drive. As a web page request is sent to the proxy server, the proxy first retrieves the web page header from the destination computer and checks to see if it has a copy locally on it's hard drive.
  • 4. If the file has been accessed in the past week, it serves the web page from it's own hard drive thus increasing the client's response time dramatically. If the destination web server's web page is newer than the copy cached on the proxy server's local hard drive, the proxy server gets the web page from the destination server while caching it locally on it's hard drive and sending it to the client. The organization uses a proxy server and the Internet access is possible only through it, so that we can build a chain, being based on a type of the corporate or organization: • The proposed proxy server is a HTTP proxy, so that we can create a chain, using HTTP SITUATIONS AT, WHICH OUR PROXY SHOULD BE USED We can use a proxy server if we have a child or student and wish to restrict the sites they are viewing, we will need to make sure we get the correct type of proxy because not all proxies filter sites. We can use it to protect the user’s own self computer, it can be used to hide the respective IP which is useful because it means hackers can not get info about the users using it. They will only get the proxy servers IP. Our Proxy servers are not hard to set up, no hardware or software is needed, we just need to configure our browser to connect through it. Our Proxy server has a Caching facility Which places popular objects at locations close to the clients. The proposed system implement a hierarchical cache concept. HTTP servers are used and handled by companies for security reasons. The cache does the following • Frequently used docs are cached nearby • Less traffic and hence shorter delays for documents that are not cached • The cache reduces workload of remote server • Data can be accessed when remote server is down • Allows analysis of organization usage patterns • Cooperation between caches increases efficiency The bottleneck of the connection between the client and the internet and hence it can be shared by all clients inside the firewall. There is a feature of access latency. Our system also implements a firewall for security reasons. Perhaps the most common form of network firewall is a proxy server. Proxy servers act as an intermediary between intranet and Internet computers by receiving and selectively blocking data packets at the network boundary. These network firewalls also provide an extra measure of safety by hiding internal LAN addresses from the outside Internet. In a proxy server firewall environment, network requests from multiple clients appear to the outsider as all coming from the same proxy server address.
  • 5. OUR PROPSOED SYSTEM FEATURES • Popular web pages are stored locally and served from our local server • Telecommunications traffic to the Internet can be substantially reduced • Faster web page and FTP response times • Better utilization of the limited bandwidth PROPOSED SYSTEM MODULES A. SERVER SIDE MONITOR 1. Administration 2. Account manager Permit category Authentication types Account configuration 3. Bandwidth management 4. Proxy Web filter 5. Time management and control 6. Caching 7. Firewall 8. Reports Log reports User usage reports B. CLIENT SIDE MONITOR 1. User registration 2. Login management 3. Site access 4. Client backup utility