I'm interested in learning about proxy server security. How can I defend against proxy server attacks?
Proxy server security measures depend on the specific types of proxy server attacks. Attacks on your proxy server could be either denial-of-service (DoS) attacks, unauthorized access attacks or attacks on the proxy server software. A DoS attack on a proxy server could be just be an attacker trying to send more network traffic to the proxy software than the system can process. Unauthorized access attacks are where an attacker uses a proxy (typically an open proxy that allows anyone to use it without authentication) to mask their connections when attacking a different site. Attacks on the proxy software could be used to gain unauthorized access to make configuration changes to the software or server.
Boost proxy server security and defend against DoS attacks by blocking unsolicited packets or by using load balancers, as these actions could help reduce the impact the attack has on the server.
Unauthorized access attacks can be prevented by ensuring appropriate types of authorization are used to access the service and potentially by only allowing certain clients to access the proxy based on IPs. You could also authenticate the users of the proxy. Based on group membership, you could give them different authorizations to view different types of websites or vary their type of access.
Defend against attacks on proxy server software by using good management practices such as regularly updating software. You can also ensure that access to the management functionality is limited to only certain networks and uses strong access controls.
There are also attacks that use a proxy server on the Internet as a transit device to hide the originating source of the attack on your network. Blocking open or malicious proxy servers from accessing the network or servers is one way to prevent this type of attack from being successful. There are companies that maintain lists that can be used for this type of blocking, but take care to understand exactly what is being blocked and how the list is maintained. An example of a commercial block list is the one maintained by URLblacklist.com.
Dig Deeper on Denial of Service (DoS) Attack Prevention-Detection and Analysis
Related Q&A from Nick Lewis, Enterprise Threats
Chameleon malware targets insecure wireless access points. Enterprise threats expert Nick Lewis explains how to defend against the malware.continue reading
The Zeus malware is threatening RTF security by embedding itself in the file, which is commonly seen as safer than other file formats such as PDFs. ...continue reading
Enterprise threats expert Nick Lewis explains how to detect and avoid one of the most advanced malware threats: The Mask.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.