Method for preventing Dos aggression of business support system
A business support and business request technology, applied in the field of network communication security, can solve the problems of flexible response, ineffectiveness, and difficulty in fast and flexible adjustment of traffic, so as to achieve the effect of improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0025] Methods for preventing DoS (Denial of Service) attacks on the interface of telecom online business halls:
[0026]1. Within a day, when the user logs in to the online business hall for the first time, if the password passes the verification, the interface will generate a session random code, send the session random code back to the client, and save the phone number (user ID) and the corresponding random code, and establish the user's transaction index counter.
[0027] 2. The online business hall website (a client of the business support system) saves the session random code generated in the first step during the session, and sends the random code as a parameter to the interface to call the relevant business handling service when the user handles business each time The business request of the program.
[0028] 3. When the interface receives the random code sent by the client in the second step, it finds the indicator counter of the user according to the phone number an...
Embodiment 2
[0032] Methods for preventing DoS (Denial of Service) attacks on the website of the telecom online business hall:
[0033] 1. Within a day, when a user logs in to the online business hall for the first time, the user's handling index counter is established according to the phone number (user ID).
[0034] 2. Every time a user handles business, find out the index counter of the user according to the phone number, and add 1. If the counter count exceeds the threshold value of the handle index counter, reject the request to call the interface service of the telecommunications service support system; if not If the threshold value is exceeded, the request is allowed to call the corresponding business handling service program through the interface.
[0035] 3. At the end of the day, clear all metric counters.
[0036] Among them, the index counter is implemented by reading and writing the field value of the database record corresponding to the user's phone number through the progra...
Embodiment 3
[0039] A method for preventing DoS attacks in a business support system. When a user initiates a service processing request, the user ID is used to generate a user processing behavior indicator counter in the upstream link of the service support system request processing. In a counting period, when the user passes the service When the support system handles a business, it first counts the corresponding user handling behavior index counter, and then compares it with the user handling behavior threshold. If the counter count has exceeded the threshold, the business request will be blocked at this link. If not If the threshold is exceeded, the business request is allowed to continue to be processed in the downstream link of the business support system; or it can be compared with the user's handling behavior threshold first, and if the counter count has exceeded the threshold, the service is blocked at this link If the request does not exceed the threshold, it is allowed to counter...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com