The World Wide Web (WWW) has become an extremely popular information service. Large HTTP packets result in network congestion. Proxy cache servers are widely deployed on the Internet to overcome this obstacle. However, the approach yields an undesirable phenomenon – a small set of users misuse proxy servers to mirror the entire contents of Web sites. This behavior wastes network resources, increases WWW servers’ loads, increases users’ waiting time, and violates copyrights. Approaches to designing a proxy server with WWW usage control and to making the proxy server effective on local area networks are proposed to prevent such abnormal WWW access and to prioritize WWW usage. Finally, a system, ProxyBreaker, is implemented to demonstrate the approaches. The implementation reveals that the proposed approaches are effective, such that the abnormal Web access does not reoccur.
Article navigation
1 March 2002
Research Article|
March 01 2002
Abnormal Web usage control by proxy strategies Available to Purchase
Hsiang‐Fu Yu;
Hsiang‐Fu Yu
Hsiang‐Fu Yu is an Information Manager, Computer Center, and PhD Student in the Department of Computer Science and Information Engineering, National Central University, Chung‐Li, Taiwan.
Search for other works by this author on:
Li‐Ming Tseng
Li‐Ming Tseng
Li‐Ming Tseng is a Professor, in the Department of Computer Science and Information Engineering, National Central University, Chung‐Li, Taiwan.
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 2054-5657
Print ISSN: 1066-2243
© MCB UP Limited
2002
Internet Research (2002) 12 (1): 66–75.
Citation
Yu H, Tseng L (2002), "Abnormal Web usage control by proxy strategies". Internet Research, Vol. 12 No. 1 pp. 66–75, doi: https://doi.org/10.1108/10662240210415835
Download citation file:
Suggested Reading
Knowledge access management at Lied Library: cataloging and Web site reengineering
Library Hi Tech (March,2002)
Organising access to free Internet resources: an overview of selection and management issues in large academic and national libraries with a view to defining a policy at Oxford University
Program (March,2001)
Multilingual access to web resources: an overview
Program (March,2000)
Deploying Novell’s BorderManager Internet Security Firewall: a case study
Campus-Wide Information Systems (May,1999)
The ICAAPProject, Part Two: the Web architecture
Library Hi Tech (April,1997)
Related Chapters
AN ACTIVE FACILITY MANAGEMENT STRATEGY FOR CONTAINMENT OF INTERMEDIATE LEVEL WASTE USING RISK-BASED SERVICE LIFE MODELLING OF REINFORCED CONCRETE
Role of Concrete in Nuclear Facilities
Inspection, testing and monitoring of trunk road bridges in England
Bridge Management 5: Inspection, maintenance, assessment and repair: Proceedings of the 5th International Conference on Bridge Management, organized by the University of Surrey, 11–13 April 2005
Acoustic emission monitoring applications for Civil structures
Bridge Management 5: Inspection, maintenance, assessment and repair: Proceedings of the 5th International Conference on Bridge Management, organized by the University of Surrey, 11–13 April 2005
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
