Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this document? Why not share!

J A V A A B S S E C U R E W E B C A C H E P R O X Y S E R V E R

on

  • 770 views

Final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE ...

Final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai"

Statistics

Views

Total Views
770
Views on SlideShare
770
Embed Views
0

Actions

Likes
0
Downloads
6
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

J A V A  A B S    S E C U R E  W E B  C A C H E  P R O X Y  S E R V E R J A V A A B S S E C U R E W E B C A C H E P R O X Y S E R V E R Document Transcript

  • SECURE WEB CACHE PROXY SERVER INTRODUCTION Some home networks, corporate intranets, and Internet Service Providers (ISPs) use proxy servers (also known as proxies). Proxy servers act as a "middleman" or broker between the two ends of a client/server network connection. Proxy servers work with Web browsers and servers, or other applications, by supporting underlying network protocols like HTTP. The proxy technology, which has developed greatly in the last years, offers the perfect solution for organizations sitting on a closed subnet behind a firewall, who are interested in giving their employees a controlled access to the Internet. To maximize employee productivity, organizations need to ensure a high quality Internet experience for users. In addition, enterprises need to implement content and user policies to manage Web traffic growth, while effectively using network resources. Hence the solution for this is a Proxy server. By definition, "proxy" refers to a person or agency who has authority to act for another. So, taken literally, this means that mean a "proxy server" acts in place of another server? A www proxy server is the answer for many companies, who are looking for ways of minimizing the costs of giving their employees access to the Internet, and yet, increasing the access control the company has over its accessible web sites. The www proxy server provides access to the Web for people on closed subnets who can only access the Internet through a firewall machine. A proxy server is a kind of buffer between your computer and the Internet resources you are accessing (Web sites, FTP archives etc.). The data you request come to the proxy first, and only then it transmits the data to the user. It is to be taken care that the Internet's growth and success is strongly related to its "open" nature. An Internet which would have been segmented from the start with firewalls, packet filters, and proxies may not have become what it is today. The proxy allows managing the kind of activities that the different users are authorized to do. It can also give reports of users activity and one very useful thing which is providing information using smart cache system, therefore making response time shorter, after the first document fetch. DEFINITION OF A PROXY SERVER Proxies are store-and-forward caches. When a web browser is configured to use a proxy, it never connects to the URL. Instead, it always connects to the proxy server, and asks it to get the URL for the connection. Proxies can be used as a sort of firewall, because it isolates the user from connecting to the Internet. MERITS OF USING A PROXY SERVER? An advantage of using a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve the user’s response time.
  • There are different types of proxy servers with different features, some are anonymous proxies, which are used to hide the real IP address and some are used to filter sites, which contain material that may be unsuitable for people to view. When you connect to a web site, the user’s true IP address will not be shown, but the proxy servers IP will. The features of proxy servers are especially important on larger networks like corporate intranets and ISP networks. The more users on a LAN and the more critical the need for data privacy, the greater the need for proxy server functionality. AIM OR OBJECTIVE OF THE PROPOSED SYSTEM The objective of the proposed system is to develop a standard HTTP based proxy server with web (site) caching facility and filtering aspects along with security using firewall implementation to enable any organization to speeden up the internet traffic usage as well as improve the bandwidth effciency thereby improving the scalability and performance of the server. NEED FOR A PROXY SERVER IN ANY ORGANIZATION The main reason for using a proxy server is to give access to the Internet from within a firewall. An application-level proxy makes a firewall safely permeable for users in an organization, without creating a potential security hole through which one might get into the subnet. The proxy can control services for individual methods, host and domain, and more-filtering client transactions. A very important thing about proxies is that even a client without DNS can use the Web: It needs only the IP address of the proxy. Application level proxy facilitates caching at the proxy. Usually, one proxy server is used by all clients connected to a subnet. This is why the proxy is able to do efficient caching of documents that are requested by more than one client. The fact that proxies can provide efficient caching makes them useful even when no firewall machine is in order. EXISTING SYSTEM • The WWW which is very popular can be considered as a large distributed information system. • The Internet usage is relatively inexpensive and itsv exponential growth in size. • Statisc reporst shows that on an average 600-800 millions of static web pages are launched along with several dynamic web pages which is an enormous increases • Accessing information is very fast and documents appeal to a wide range of interests • Network congestion and Server overloading • Bandwidth is not growing fast enough. • Without solution WWW will become too congested and its entire appeal would be lost. PROPOSED SYSTEM ADVANTAGES • Belonging to same organization, clients share common interests and they probably access the same set of documents. • On the proxy server, a previously requested and cached documents would likely result in future hits
  • • Caching most popular web pages on the proxy server can save network bandwidth and lower the access latency for the client • Reduces bandwidth consumption and decreases network traffic • Lessens network congestion • The proposed software has fast access, robustness • The proposed software has better transparency and scalability • The proposed software has better efficiency and adaptively • The proposed software has good stability and load balance • The proposed software has an ability to deal with heterogeneity and it is simple and easy to use PROPOSED SYSTEM HARDWARE REQUIREMENTS HARDWARE Processor - PIII or higher processor RAM - 128 MB or higher HDD - 40 GB or higher FDD - 1.44 MB MONITOR - LG/SAMSUNG colour Keyboard / Mouse / ATX Cabinet SOFTWARE OPERATING SYSTEM : WIN 2000/WIN XP/WIN 98 SOFTWARE : JDK 1.3 OR HIGHER WEB SERVER : Tomcat / Web Logic server DATABASE : Oracle 8i ABOUT THE PROPOSED PROJECT The proposed Proxy is, an HTTP server that sits on a firewall machine and usually has a caching ability making surfing much faster. This ability makes it attractive also in case there is no firewall. It also allows one to read documents "unplugged" to the Internet. This caching proxy functions as a server when connected by a client, and as a client when contacting the original server. The proposed server is quite a sophisticated one , so that the security "lacks" are minimal. Our proxy server is designed to improve the performance and security of communications across a TCP/IP network such as the Internet. Performance is improved because the server stores frequently accessed pages locally on it's hard drive. As a web page request is sent to the proxy server, the proxy first retrieves the web page header from the destination computer and checks to see if it has a copy locally on it's hard drive.
  • If the file has been accessed in the past week, it serves the web page from it's own hard drive thus increasing the client's response time dramatically. If the destination web server's web page is newer than the copy cached on the proxy server's local hard drive, the proxy server gets the web page from the destination server while caching it locally on it's hard drive and sending it to the client. The organization uses a proxy server and the Internet access is possible only through it, so that we can build a chain, being based on a type of the corporate or organization: • The proposed proxy server is a HTTP proxy, so that we can create a chain, using HTTP SITUATIONS AT, WHICH OUR PROXY SHOULD BE USED We can use a proxy server if we have a child or student and wish to restrict the sites they are viewing, we will need to make sure we get the correct type of proxy because not all proxies filter sites. We can use it to protect the user’s own self computer, it can be used to hide the respective IP which is useful because it means hackers can not get info about the users using it. They will only get the proxy servers IP. Our Proxy servers are not hard to set up, no hardware or software is needed, we just need to configure our browser to connect through it. Our Proxy server has a Caching facility Which places popular objects at locations close to the clients. The proposed system implement a hierarchical cache concept. HTTP servers are used and handled by companies for security reasons. The cache does the following • Frequently used docs are cached nearby • Less traffic and hence shorter delays for documents that are not cached • The cache reduces workload of remote server • Data can be accessed when remote server is down • Allows analysis of organization usage patterns • Cooperation between caches increases efficiency The bottleneck of the connection between the client and the internet and hence it can be shared by all clients inside the firewall. There is a feature of access latency. Our system also implements a firewall for security reasons. Perhaps the most common form of network firewall is a proxy server. Proxy servers act as an intermediary between intranet and Internet computers by receiving and selectively blocking data packets at the network boundary. These network firewalls also provide an extra measure of safety by hiding internal LAN addresses from the outside Internet. In a proxy server firewall environment, network requests from multiple clients appear to the outsider as all coming from the same proxy server address.
  • OUR PROPSOED SYSTEM FEATURES • Popular web pages are stored locally and served from our local server • Telecommunications traffic to the Internet can be substantially reduced • Faster web page and FTP response times • Better utilization of the limited bandwidth PROPOSED SYSTEM MODULES A. SERVER SIDE MONITOR 1. Administration 2. Account manager Permit category Authentication types Account configuration 3. Bandwidth management 4. Proxy Web filter 5. Time management and control 6. Caching 7. Firewall 8. Reports Log reports User usage reports B. CLIENT SIDE MONITOR 1. User registration 2. Login management 3. Site access 4. Client backup utility