A proxy server experiment: an indication of the changing nature of the Web

Author(s):  
R. Howard ◽  
B.J. Jansen
Keyword(s):  
2019 ◽  
Vol 8 (1) ◽  
pp. 1-5
Author(s):  
Marvin Chandra Wijaya

The performance of web processing needs to increase to meet the growth of internet usage, one of which is by using cache on the web proxy server. This study examines the implementation of the proxy cache replacement algorithm to increase cache hits in the proxy server. The study was conducted by creating a clustered or distributed web server system using eight web server nodes. The system was able to provide increased latency by 90 % better and increased throughput of 5.33 times better.


Author(s):  
Olatunde O. Abiona ◽  
Tricha Anjali ◽  
Clement E. Onime ◽  
Lawrence O. Kehinde
Keyword(s):  

10.17158/183 ◽  
2011 ◽  
Vol 17 (2) ◽  
Author(s):  
Eric John G. Emberda ◽  
Siegfried C. Capon ◽  
Johanah A. Maunda

<p>Stealing information from a user’s computer through the Internet is a growing concern. One type of Internet attacks or Cybercrime is Cross-Site Scripting or XSS. It allows an attacker to retrieve information from an Internet user by inserting a script to a vulnerable website where it automatically mines private data from the victim, then sends those data to another website. This study was conducted to examine the different vulnerable aspects of a website. A list of XSS-vulnerable websites was gathered, as well as a list of different XSS scripts. These websites were tested with the XSS scripts to determine the entry point to which the scripts can penetrate. A web proxy application was created which implements different mechanisms to prevent these XSS scripts from successfully mining private data. The web proxy application was able to minimize XSS attacks by comparing the scripts inside the website with the database of XSS scripts. The researchers however, recommend that the process of preventing XSS scripts be improved by adding artificially intelligent algorithms that will read patterns for XSS scripts and distinguish them from safe scripts.</p>


2014 ◽  
Vol 556-562 ◽  
pp. 5471-5476
Author(s):  
Rui Zhang ◽  
Xiang Lan ◽  
Yao Liu ◽  
Qing Yang Liu

The existing Mashup Platform can only exploit the web service providing APIs, which limits the application scope of Mashup platform. This paper analyzes the HTTP protocol and related technologies, and proposes a semi-automated method for Web information extraction and conversion: the WebAPI system. In WebAPI, users firstly mark pages by hand with browser plug-ins, and then the proxy server grabs the HTTP message flow to obtain the parameters needed. The conversion module of WebAPI analyzes the parameters to create the corresponding Web Service APIs so that Mashup applications can utilize the general Web Service by invoking these interfaces. In this indirect manner, the range of resources that Mashup platforms can utilize is extensively expanded.


Author(s):  
Olatunde Abiona ◽  
Adeniran Oluwaranti ◽  
Ayodeji Oluwatope ◽  
Surura Bello ◽  
Clement Onime ◽  
...  

2008 ◽  
Vol 11 (2) ◽  
pp. 83-85
Author(s):  
Howard Wilson
Keyword(s):  

2005 ◽  
Vol 8 (1) ◽  
pp. 16-18
Author(s):  
Howard F. Wilson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document