Reverse Proxy Patterns

نویسنده

  • Peter Sommerlad
چکیده

Overview Implementing an application-level server-side proxy 1 [GHJV95][POSA96] can result in a large number of positive consequences. However, the aspects of network security, single sign on and integration imply different forces upon such a reverse proxy. Attaching the surrounding infrastructure can show additional roadblocks for a successful deployment. The following patterns try to structure the forces, regarding the different aspects into three patterns, that can be studied to understand reverse proxy solutions and applied to design reverse proxy architectures. The most popular reverse proxies implement the hypertext transfer protocol (HTTP), therefore the rest of the paper just refers to such HTTP reverse proxies. Nevertheless, the underlying patterns are also applicable for any other Internet protocols, for example FTP. The Protection Reverse Proxy pattern shows how to protect your servers on the application protocol level at the network perimeter. An Integration Reverse Proxy allows to integrate a collection of servers under a common entry point, thus hiding the network and host internals. The Front Door pattern gives guidance for single sign on and access control to a set of web applications. 1. In contrast to a " regular " proxy configured within a user's browser, such a transparent server-side proxy is called a " reverse proxy " .

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

بهینه‌سازی اجرا و پاسخ صفحات وب در فضای ابری با روش‌های پیش‌پردازش، مطالعه موردی سامانه‌های وارنیش و انجینکس

The response speed of Web pages is one of the necessities of information technology. In recent years, renowned companies such as Google and computer scientists focused on speeding up the web. Achievements such as Google Pagespeed, Nginx and varnish are the result of these researches. In Customer to Customer(C2C) business systems, such as chat systems, and in Business to Customer(B2C) systems, s...

متن کامل

Forwarding Requests among Reverse Proxies

Reverse proxy caching is a technology deployed by many ISPs at the border routers of their backbones to improve performance of their Web hosting services. Currently, cooperation among reverse proxies (if any) is limited to sharing each other’s cache copies. In this paper, we propose to extend the cooperation by forwarding requests among cooperating reverse proxies. Instead of fetching objects f...

متن کامل

Group Buying based on Combinatorial Reverse Auction

Fu-Shiung Hsieh # Department of Computer Science and Information Engineering, Chaoyang University of Technology Taiwan, R.O.C. [email protected] Abstract—We formulate group buying problem as a combinatorial reverse auction problem with multiple buyers and multiple sellers. We propose the concept of proxy buyer to deal with this problem. The proxy buyer consolidates the demands from the buyers...

متن کامل

Inferring the Presence of Reverse Proxies through Timing Analysis

This thesis presents a method for inferring the presence of a reverse proxy server using packet timing analysis from the vantage point of a client system. This method can determine whether Internet users are receiving web content from the actual source or from some potentially spoofed proxy device; leading to better risk assessment and understanding of the cyber terrain. By using only the measu...

متن کامل

Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries

Web-based applications have become a popular means of exposing functionality to large numbers of users by leveraging the services provided by web servers and databases. The wide proliferation of custom-developed web-based applications suggests that anomaly detection could be a suitable approach for providing early warning and real-time blocking of application-level exploits. Therefore, a number...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003