Proxy Servers and Anonymizers


Proxy server is a computer on a network which acts as an intermediary for connection 

with other computers on that network.

 The attacker first connects to a proxy server and establishes a connection with the 

target system through existing connection with proxy.

 This enables an attacker to surf on the Web anonymously and/or hide the attack.

 A client connects to the proxy server and requests some services (such as a file, webpage) 

available from a different server.

 The proxy server evaluates the request and provides the resource by establishing the connection to the respective server and/or requests the required service on 

behalf of the client.

 Using a proxy server can allow an attacker to hide ID (i.e., become anonymous 

on the network).

A proxy server has following purposes:

1. Keep the systems behind the curtain (mainly for security reasons).

2. Speed up access to a resource (through “caching”). It is usually used to cache the web 

pages from a web server.

3. Specialized proxy servers are used to filter unwanted content such as advertisements.

4. Proxy server can be used as IP address multiplexer to enable to connect number of 

computers on the Internet, whenever one has only one IP address

One of the advantages of a proxy server is that its cache memory can serve all 
users.
 If one or more websites are requested frequently, may be by different users, it is 
likely to be in the proxy’s cache memory, which will improve user response time.
 An anonymizer or an anonymous proxy is a tool that attempts to make activity on 
the Internet untraceable. It accesses the Internet on the user’s behalf, protecting 
personal information by hiding the source computer’s identifying information.
 Anonymizers are services used to make Web surfing anonymous by utilizing a 
website that acts as a proxy server for the web client.

Comments

Popular posts from this blog

Early Disease Detection with Machine Learning and Deep Learning

Transaction Processing Concept

Computer Forensics: An Overview