Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for preventing malicious requests

A malicious and frequent technology, applied in transmission systems, electrical components, etc., can solve the problems of unrestricted, huge statistical workload, and the impact of normal user requests, to prevent malicious requests and solve the effect of occupying server resources.

Active Publication Date: 2020-11-03
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will put great pressure on the server, and will seriously affect the purchase experience and fairness of normal users
[0003] The existing method of preventing malicious requests is mainly to count the number of visits of each IP address by scanning the server access log, but on the one hand, the workload of statistics is very huge, and it is restricted after the regular statistics are obtained , the timeliness has been delayed; on the other hand, many campus networks and office LANs share IPs. If the threshold value set for each IP is too large, the restriction effect will not be achieved, and if it is too small, the normal request of the user will be have a serious impact

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing malicious requests
  • Method and device for preventing malicious requests
  • Method and device for preventing malicious requests

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0024] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0025] figure 1 An exemplary system architecture 100 of an embodiment of the method for preventing malicious requests or the apparatus for preventing malicious requests of the present application can be applied.

[0026] Such as figure 1 As shown, the system architecture 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a method and apparatus for preventing malicious requests. A specific implementation manner of the method includes: receiving a request sent by a terminal, wherein the request includes a code used for identifying the terminal; determining whether the request meets a preset malicious request determining condition, wherein the determining condition includes: the number of times for processing the request including the above code from a preset time node exceeds a preset threshold value; if so, determining that the request is a malicious request and rejecting the request; and if not, determining that the request is a non-malicious request, and processing the request. The method and apparatus solve a problem of the malicious request occupies server resources.

Description

technical field [0001] The present application relates to the field of computer technology, specifically to the field of Internet technology, and in particular to a method and device for preventing malicious requests. Background technique [0002] In the Internet field, servers have to process a large number of requests every day, some of which are malicious requests, which will occupy server resources. Snap up merchandise. This will bring great pressure to the server, and will also seriously affect the purchase experience and fairness of normal users. [0003] The existing method of preventing malicious requests is mainly to count the number of visits of each IP address by scanning the server access log, but on the one hand, the workload of statistics is very huge, and it is restricted after the regular statistics are obtained , the timeliness has been delayed; on the other hand, many campus networks and office LANs share IPs. If the threshold value set for each IP is too...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/126H04L63/1441
Inventor 邓必国
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products