{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:53:59Z","timestamp":1754157239541,"version":"3.41.2"},"reference-count":35,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2002,3,1]],"date-time":"2002-03-01T00:00:00Z","timestamp":1014940800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002,3,1]]},"abstract":"<jats:p>The World Wide Web (WWW) has become an extremely popular information service. Large HTTP packets result in network congestion. Proxy cache servers are widely deployed on the Internet to overcome this obstacle. However, the approach yields an undesirable phenomenon \u2013 a small set of users misuse proxy servers to mirror the entire contents of Web sites. This behavior wastes network resources, increases WWW servers\u2019 loads, increases users\u2019 waiting time, and violates copyrights. Approaches to designing a proxy server with WWW usage control and to making the proxy server effective on local area networks are proposed to prevent such abnormal WWW access and to prioritize WWW usage. Finally, a system, ProxyBreaker, is implemented to demonstrate the approaches. The implementation reveals that the proposed approaches are effective, such that the abnormal Web access does not reoccur.<\/jats:p>","DOI":"10.1108\/10662240210415835","type":"journal-article","created":{"date-parts":[[2002,7,28]],"date-time":"2002-07-28T18:49:34Z","timestamp":1027882174000},"page":"66-75","source":"Crossref","is-referenced-by-count":2,"title":["Abnormal Web usage control by proxy strategies"],"prefix":"10.1108","volume":"12","author":[{"given":"Hsiang\u2010Fu","family":"Yu","sequence":"first","affiliation":[]},{"given":"Li\u2010Ming","family":"Tseng","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031219552765400_B1","unstructured":"Abdelzaher, T.F. and Bhatti, N. (1999), \u201cWeb server QoS management by adaptive content delivery\u201d, IWQoS \u201999: 1999 Seventh International Workshop on Quality of Service, pp. 216\u201025."},{"key":"key2022031219552765400_B2","unstructured":"Apache Development Group (2001), available at: www.apache.org"},{"key":"key2022031219552765400_B3","unstructured":"Baltzersen, P. (2000), available at: www.squidguard.org\/"},{"key":"key2022031219552765400_B4","doi-asserted-by":"crossref","unstructured":"Chandra, S., Ellis, C.S. and Vahdat, A. (2000), \u201cDifferentiated multimedia Web services using quality aware transcoding\u201d, INFOCOM 2000, Proceedings of Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 2, pp. 961\u20109.","DOI":"10.1109\/INFCOM.2000.832271"},{"key":"key2022031219552765400_B5","unstructured":"Beermann, C. (2000), available at: www.cord.de\/tools\/squid\/calamaris\/"},{"key":"key2022031219552765400_B6","doi-asserted-by":"crossref","unstructured":"Berners\u2010Lee, T., Fielding, R. and Frystyk, H. (1996), \u201cHyperText Transfer Protocol HTTP\/1.0\u201d, RFC 1945, IETF HTTP WG, May.","DOI":"10.17487\/rfc1945"},{"key":"key2022031219552765400_B7","unstructured":"Cacheflow (2001), available at: www.cacheflow.com"},{"key":"key2022031219552765400_B8","unstructured":"Chen, X. and Mohapatra, P. (1999), \u201cProviding differentiated service from an Internet server\u201d, in Proceedings of Eight International Conference on Computer Communications and Networks, pp. 214\u201017."},{"key":"key2022031219552765400_B9","unstructured":"Cisco Systems (2000), Cisco cache engine, available at: www.cisco.com\/warp\/public\/751\/cache\/cds_ov.htm"},{"key":"key2022031219552765400_B10","unstructured":"Cohen, A., Rangarajan, S. and Singh, N. (1999), \u201cSupporting transparent caching with standard proxy caches\u201d, The 4th International Web Caching Workshop."},{"key":"key2022031219552765400_B11","doi-asserted-by":"crossref","unstructured":"Danzig, P. (1998), \u201cNetCache architecture and deployment\u201d, Computer Networks, Vol. 30 Nos 22\u201023, pp. 2081\u201091.","DOI":"10.1016\/S0169-7552(98)00250-5"},{"key":"key2022031219552765400_B12","unstructured":"ELC Technologies (2001), available at: www.anemone. electricc.com\/"},{"key":"key2022031219552765400_B13","doi-asserted-by":"crossref","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H. and Berners\u2010Lee, T. (1999), \u201cHypertext transfer protocol \u2013 HTTP\/1.1\u201d, RFC 2616, June.","DOI":"10.17487\/rfc2616"},{"key":"key2022031219552765400_B14","unstructured":"Foote, C. (2000), \u201cSquirm \u2013 a redirector for squid\u201d, available at: www.wenet.com.au\/squirm\/"},{"key":"key2022031219552765400_B15","unstructured":"FreeBSD (2001), available at: www.freebsd.org"},{"key":"key2022031219552765400_B16","unstructured":"Gleeson, M. (2000), available at: www.martin.gleeson.com\/pwebstats\/"},{"key":"key2022031219552765400_B17","unstructured":"Heddaya, A. (1998), \u201cDynaCache: weaving caching into the Internet\u201d, The 3rd International Web Caching Workshop, Manchester, June."},{"key":"key2022031219552765400_B18","unstructured":"Kozinski, M. (2000), available at: www.geocities.com\/maciej_kozinski\/w3cache\/squeezer.html"},{"key":"key2022031219552765400_B19","unstructured":"Krishnan, P., Raz, D. and Shavitt, Y. (1999), \u201cTransparent en\u2010route caching in WANs\u201d, The 4th International Web Caching Workshop."},{"key":"key2022031219552765400_B20","doi-asserted-by":"crossref","unstructured":"Legedza, U. and Guttag, J. (1998), \u201cUsing network\u2010level support to improve cache routing\u201d, Computer Networks, Vol. 30 Nos 22\u201023, pp. 2193\u2010201.","DOI":"10.1016\/S0169-7552(98)00248-7"},{"key":"key2022031219552765400_B21","unstructured":"National Chiao Tung University (NCTU) (2001), available at: www.proxy.nctu.edu.tw"},{"key":"key2022031219552765400_B22","unstructured":"National Sun Yat\u2010Sen University (NSYSU) (2001), available at: www.proxy.nsysu.edu.tw"},{"key":"key2022031219552765400_B23","unstructured":"National Taiwan University (NTU) (2001), available at: www.proxy.ntu.edu.tw"},{"key":"key2022031219552765400_B24","unstructured":"Nottingham, M. (2000), available at: www.mnot.net\/scripting\/python\/WebLog\/"},{"key":"key2022031219552765400_B25","unstructured":"Oetiker, T. and Rand, D. (2001), \u201cMRTG: multi router traffic grapher\u201d, available at: www.ee\u2010staff.ethz.ch\/\u223coetiker\/webtools\/mrtg\/mrtg.html"},{"key":"key2022031219552765400_B26","doi-asserted-by":"crossref","unstructured":"Rodriguez, P., Sibal, S. and Spatscheck, O. (2000), \u201cTPOT: translucent proxying of TCP\u201d, The 5th International Web Caching and Content Delivery Workshop.","DOI":"10.1016\/S0140-3664(00)00321-2"},{"key":"key2022031219552765400_B27","unstructured":"Perkins, D. and McGinnis, E. (1997), Understanding SNMP MIBs, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022031219552765400_B28","unstructured":"Ramahefason, D. (2000), available at: www.casimir. easynet.fr\/"},{"key":"key2022031219552765400_B29","unstructured":"Squid Internet Object Cache (2001), available at: www.squid.nlanr.net\/Squid"},{"key":"key2022031219552765400_B30","unstructured":"Tanenbaum, A.S. (1996), Computer Networks, 3rd ed., Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022031219552765400_B31","unstructured":"Tennyson Maxwell Information Systems (2001), available at: www.tenmax.com\/home.htm"},{"key":"key2022031219552765400_B32","doi-asserted-by":"crossref","unstructured":"Thompson, K., Miller, G.J. and Wilder, R. (1997), \u201cWide\u2010area Internet traffic patterns and characteristics\u201d, IEEE Network, November\/December.","DOI":"10.1109\/65.642356"},{"key":"key2022031219552765400_B33","unstructured":"Tseng, J.P. and Chen, H.H. (1999), \u201cThe implementation and evaluation of the proxy server\u2019s access control system\u201d, in Proceedings of TANet\u201999 Conference."},{"key":"key2022031219552765400_B34","unstructured":"Wessels, D. (2001), available at: www.squid\u2010cache.org\/Doc\/FAQ\/"},{"key":"key2022031219552765400_B35","unstructured":"Williams, B. (1998), \u201cTransparent Web caching solutions\u201d, 3rd International Web Caching Workshop, Manchester, June."}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662240210415835","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240210415835\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240210415835\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:39:48Z","timestamp":1753400388000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/12\/1\/66-75\/177542"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,3,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2002,3,1]]}},"alternative-id":["10.1108\/10662240210415835"],"URL":"https:\/\/doi.org\/10.1108\/10662240210415835","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[2002,3,1]]}}}