EDUCBA

EDUCBA

MENUMENU
  • Free Tutorials
  • Free Courses
  • Certification Courses
  • 600+ Courses All in One Bundle
  • Login

Types of Proxy Servers

By Savi JaggaSavi Jagga

Home » Software Development » Software Development Tutorials » Network Security Tutorial » Types of Proxy Servers

Types of Proxy Servers

Introduction to Proxy Servers

Proxy Servers are referred to those servers that act as an intermediary to the request made by clients to a particular server for some services or request for some resources. Several types of proxy servers are available whose use will depend on the purpose of a request made by the clients to the servers. The purpose of Proxy servers is to Protects the direct connect of Internet clients and internet and internet resources: Proxy server prevents the identification of the client’s IP address while any request is made to any other servers.

  • Internet clients and internal resources: Proxy servers also act as a shield for an internal network against the request coming from a client to access the data on that server. The original IP address of the node remains hidden while accessing data from that server.
  • Protects true host identity: Outgoing traffic appears to come from the proxy server. It must be configured to the specific application, e.g. HTTPS or FTP.

Types of Proxy Server

Start Your Free Software Development Course

Web development, programming languages, Software testing & others

For example, as a client to MNC, a client can use a proxy to observe its contract employees’ traffic to get the work efficiently done. It can also be used to keep a check on any leakage of internal highly confidential data. Some can also use it to increase their websites rank and get the traffic diverted anonymously.

The need for Private Proxy

Some of the need for a private proxy is mentioned below:

Defeat Hackers

Every organization has its own personal data that need to protect from malicious use. Thus, passwords are used, and different architects are set up, but there is still a possibility that this information can be hacked if the IP address is accessible easily. Proxy servers are set up to prevent tracking of the original IP address; instead, data is shown to come from a different IP address.

Filtering of the Content

Proxy servers also help filter out the content that doesn’t follow the web application’s policies or server required. It provides a facility to authenticate the user and provides the logs of URL of users requests made through that proxies.

Content can be Cached.

The proxy also helps in caching the content of the websites. This helps in fast access to the data that has been accessed oftenly.

Popular Course in this category
Cyber Security Training (12 Courses, 3 Projects)12 Online Courses | 3 Hands-on Projects | 77+ Hours | Verifiable Certificate of Completion | Lifetime Access
4.5 (6,002 ratings)
Course Price

View Course

Related Courses
CDN Training (2 Courses)OSPF Training Program (2 Courses)Penetration Testing Training Program (2 Courses)

Examine Packet Headers and Payloads

We can also examine the payloads and packet headers of the nodes in the internal server’s requests so that any access to social websites can be easily tracked and restricted.

Types of Proxy Servers

Below are the different types of proxy servers:

1. Reverse Proxy

This represents the server. In case there are multiple websites on different servers, then it is the job of a reverse proxy server to listen to the client’s request and redirect to the particular web server.
Example – Listen for TCP port 80 website connections. These are normally placed in a DMZ zone for publicly accessible services and protect the host’s true identity. It is transparent to the external users as external users will not be able to identify the actual number of internal servers. It is the duty of reverse proxy to redirect the flow depending on the configurations of internal servers. The request made to pass through the private network protected by firewalls needs a proxy server that does not abide by any local policies. This type of request from the clients are completed using reverse proxy servers. This is also used to restrict the client’s access to the sensitive data residing on the particular servers.

Reverse Proxy

2. Web Proxy Server

This type of proxies forward the HTTP requests. This request is the same as HTTP requests; only URL is passed instead of a path. A request is sent to which the proxy server responds. Examples of such proxies are Apache, HAPProxy.

The client-server Proxy auto-config protocol solves the solution to the problems of multiple proxy servers.

3. Anonymous Proxy

This is the type of proxy server that does not makes an original IP address. Although these servers are detectable still provides rational anonymity to the client device.

4. High Anonymity Proxy

This proxy server does not allow the original IP address to be detected, and no one can detect it as a proxy server.

5. Transparent Proxy

This type of proxy server never provides any anonymity to the client; instead, an original IP address can be easily detected using this proxy. Still, it is being used to act as a cache for the websites.

A transparent proxy combined with gateway results in a proxy server where the client IP’s connection requests are redirected. This redirection occurs without the client IP address configuration. This redirection can be easily detected by the HTTP headers present on the server-side.

These are also known as intercepting proxies, inline proxy, and forged proxy.

Working: It intercepts the communication at the network level without the need for any configuration. It also works as a gateway or router that authenticates the communication without making any changes to the requests or responses passing through the server.

Uses: These types of proxies are most commonly used at the business level to enforce the policy over communication. It also tries to prevent any attack on TCP servers example – denial-of-service attack.

6. CGI Proxy

This type of proxies was developed to make the websites more accessible.

Working: It accepts the requests to target URLs using a web form, processes it and returns the result to the web browser. It is less popular due to VPNs and other privacy policies, but it still receives many requests these days. Its usage reduces because of excessive traffic that can be caused to the website after passing the local filtration, leading to collateral damage to the organization.

7. Suffix Proxy

This type of proxy server appends the proxy’s name to the URL to the content that has been requested to the proxy. This type of proxy doesn’t preserve a higher level of anonymity.

Uses: It is used for bypassing the web filters. This proxy is easy to use and can be easily implemented but is used less due to more or more web filters.

8. Distorting Proxy

Proxy servers can generate an incorrect original IP address of clients once being detected as a proxy server. It uses HTTP headers to maintain the confidentiality of the Client IP address.

9. TOR Onion Proxy

It is software that aims at online anonymity to the user’s personal information.

Working: It routes the traffic through various networks present worldwide to make it difficult to track the users’ address and prevent the attack of any anonymous activities. It makes it difficult for any person who is performing traffic analysis to track the original address. For this, it uses ONION ROUTING.

In this type of routing, the information is encrypted in a multi-folds layer by layer to prevent it. At the destination, each layer is decrypted to prevent the information from scrambling or getting distorted.

This software is open source as well as free of cost to use.

10. I2P Anonymous Proxy

It is an anonymous network enhanced version of the Tor onion proxy, which uses encryption to hide all the communications at various levels. This encrypted data is then relayed through various network routers present in different locations. Thus I2P is a fully distributed proxy that aims at online anonymity. It also implements garlic routing. (enhanced version of Tor’s pnion routing. It provides a proxy to all protocols. This type of proxies can be run on the node.

I2P router finds other peers to build an anonymous identity to protect the user’s personal information.

This software and network are free of cost and open source to use; It also resists censorship.

11. DNS Proxy

Unlike other proxies, this type of proxy takes requests in the form of DNS queries and forward them to the Domain server, where they can also be cached, and the flow of requests can also be redirected.

Types of Proxy Servers (Protocols)

Below are the different types of proxy servers protocols:

  1. Socks Proxy Server: This type of proxy server provides a connection to a particular server. Depending on Socks protocols, this type of server allows the multilayering of various data types such as TCS or UDP.
  2. FTP Proxy Server: This type of proxy server caches FTP requests’ traffic and uses the concept of relaying.
  3. HTTP Proxy Server: This proxy was developed to process a one-way request to the web pages using HTTP protocols.
  4. SSL Proxy Server: This type of server was developed using the concept of TCP relaying being used in the SOCKS proxy protocol to allow Web Pages’ requests.

Conclusion

Proxy servers help in various anonymity types required at different levels, either as a client or as a  service provider. It helps to resist the security of information of various users as well as the internal network. Different types of proxies are available, which follow various routing protocols and serve different uses at different anonymity levels.

Proxifiers are the client programs that allow the adaptation of any type of software used for networking using various types of proxy servers.

Recommended Articles

This is a guide to Types of Proxy Servers. Here we discuss the basic concept, need, types and various protocols of Proxy Servers in detail. You can also go through our other suggested articles to learn more –

  1. TCP/IP Model
  2. SOAP vs HTTP
  3. What is TCP/IP?
  4. Linux Proxy Server

Cyber Security Training (12 Courses, 3 Projects)

12 Online Courses

3 Hands-on Projects

77+ Hours

Verifiable Certificate of Completion

Lifetime Access

Learn More

0 Shares
Share
Tweet
Share
Primary Sidebar
Network Security Tutorial
  • Advanced
    • Cryptosystems
    • Configuring DHCP Server
    • Block Cipher modes of Operation
    • TCP/IP Model
    • Types of Network
    • Types of Network Devices
    • Types of Network Topology
    • Types of Intrusion Prevention System
    • Types of Proxy Servers
    • Types of Websites
    • Types of NAT 
    • Mobile IP
    • Career in Automobile Design
    • What is TFS
    • What is NAT
    • What is OSI Model
    • Data Link Layer OSI Model
    • What is Cross Site Scripting
    • Applications of Sensors
    • ARP Packet Format
    • Asymmetric Information
    • Autoencoders
    • What is FTP Server?
    • IPS Tools
    • IPv4 Header Format
    • IPv6 Header Format
    • Authentication Header
    • Kerberos
    • Network Mapper
    • Network Scanning Tools
    • Network Mapping Tools
    • Network Access Control
    • Vulnerability Assessment Tools
    • Network Sniffer
    • Networking Commands
    • Networking Devices
    • Networking Strategies
    • Digital Certificate
    • What is a Digital Signature?
    • Digital Signature Softwares
    • Digital Signature Types
    • Digital Signature vs Digital Certificate
    • PKCS
    • What is FTP
    • FTP Commands
    • What is MIME?
    • What is Smart Card?
    • Networking Ports
    • Mutual Authentication
    • Password Authentication
    • Data Masking 
    • Authentication Tokens
    • Biometric Authentication
    • What is IP?
    • IPSec
    • Secure Electronic Transaction
    • What is CIDR
    • Static Binding and Dynamic Binding
    • What is SSL
    • PKIX
    • Public Key Infrastructure
    • What is Wireshark
    • Daisy Chain Topology
    • Markov Logic Network
    • Security engineering
    • SNMP Monitoring Tools
    • Network Analysis Tools
    • Server Monitoring Tools
    • Network Discovery Tools
    • Network Management Tool
    • SIEM Tools
    • OSINT Tools
    • Multiple Ping Tool
  • Basics
    • Security Consultant Definition
    • Security Policies
    • What is Network Security
    • What is Data Security?
    • What is Cryptography
    • Cryptography Techniques
    • Cryptography Tools
    • Data Security Techniques and Privacy
    • Digital Signature Cryptography
    • Java Cryptography
    • Basics of Cybersecurity
    • What is Network Topology
    • Algorithms and Cryptography
    • HTTP Methods
    • Security Technologies
    • Security Architecture
    • Network Topologies
    • What is a Physical Address?
    • Logical Address
    • What is Storage Area Network?
    • Mobile Ad Hoc Network
    • What is Computer Networks?
    • Security Principles
    • What is Remote Access?
  • Protocols
    • What is TCP Protocol
    • What is TCP/IP
    • How do IP Addresses Work?
    • Routing Protocols Types
    • What is Telnet
    • What is TFTP
    • What is DHCP
    • What is SFTP
    • Address Resolution Protocol
    • Internet Control Message Protocol
    • Simple Mail Transfer Protocol
    • Internet Security Protocols
    • SMTP Protocol
    • Types of Networking Protocols
    • User Datagram Protocol
    • Data Link Layer
    • Data Link Layer Services
    • Network Layer
    • Transport Layer Protocols
    • What Is Networking Protocols
    • TFTP
    • What is ARP
    • Basic Fundamental Of Networking
    • What is IPv4
    • What is IPv6
    • CIFS Protocol
    • What is SMB?
    • What is EIGRP
    • What is LLDP?
  • Routing
    • What is Router
    • Types of Routers
    • Dynamic Routing
    • Routing Algorithms
    • Routing Protocol
    • What is Routing
    • What is Static Routing
    • Important Types of DNS Servers (Powerful)
  • Attacks
    • Types of Network Attacks
    • What is Trojan Horse Virus
    • What is DOS
    • Types of DOS Attacks
    • DDos Attack Mitigation
    • Ransomware Attack  
    • Types of Cyber Attack
    • What is a Brute Force Attack
    • What is a Phishing Attack
    • What is Cyber Attack
    • What is DDoS Attack
    • What is Man In The Middle Attack
    • What is Man In The Middle Attack
    • What is Ransomware
    • What is Pharming
    • What is Phishing
    • What is CSRF
    • DNS Amplification Attack
    • Denial of Service Attack
  • Algorithm
    • IDEA Algorithm
    • MD5 Algorithm
    • Symmetric Algorithms
    • Diffie Hellman Key Exchange Algorithm
    • Digital Signature Algorithm
    • Encryption Algorithm
    • Advanced Encryption Standard
    • Asymmetric Encryption
    • ElGamal Encryption
    • HMAC
    • DES Algorithm
    • Brute Force Algorithm
    • SHA Algorithm
    • RSA Algorithm
    • What is Digital Certificate?
    • Certificate Revocation
    • RC5
  • Encryption/ Decryption
    • Encryption process
    • Public Key Encryption
    • Symmetric Key Encryption
    • What is Encryption
    • What is Decryption
    • Types of Cipher
    • Transposition Techniques
    • What is Steganography
    • One Time Pad
    • Steganography Techniques
  • Hosting
    • Types of Web Hosting
    • Free Web Hosting Sites
    • What is Hosting
    • What is VPS Hosting
    • What is Web Hosting
    • Types of Domain
    • VPN Applications for PC
    • Why we use VPN?
    • What is Virtual Host?
  • Firewalls
    • What is a Firewall?
    • Types of Firewalls
    • Firewall Devices
    • Firewall Uses
  • Interview Questions
    • Network Security Interview Questions
    • Networking Interview Questions
    • EIGRP Interview Questions

Related Courses

CDN Training

OSPF Certification Training

Penetration Training Course

Footer
About Us
  • Blog
  • Who is EDUCBA?
  • Sign Up
  • Corporate Training
  • Certificate from Top Institutions
  • Contact Us
  • Verifiable Certificate
  • Reviews
  • Terms and Conditions
  • Privacy Policy
  •  
Apps
  • iPhone & iPad
  • Android
Resources
  • Free Courses
  • Java Tutorials
  • Python Tutorials
  • All Tutorials
Certification Courses
  • All Courses
  • Software Development Course - All in One Bundle
  • Become a Python Developer
  • Java Course
  • Become a Selenium Automation Tester
  • Become an IoT Developer
  • ASP.NET Course
  • VB.NET Course
  • PHP Course

© 2020 - EDUCBA. ALL RIGHTS RESERVED. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS.

EDUCBA Login

Forgot Password?

EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you
Book Your One Instructor : One Learner Free Class

Let’s Get Started

This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. By closing this banner, scrolling this page, clicking a link or continuing to browse otherwise, you agree to our Privacy Policy

EDUCBA

*Please provide your correct email id. Login details for this Free course will be emailed to you
EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you

Special Offer - Cyber Security Training (12 Courses, 3 Projects) Learn More