Method and system for preventing robot attack

A robot and transaction request technology, applied in the transmission system, digital data protection, electrical components, etc., can solve the problems of background server pressure, network congestion, downtime, etc., and achieve the effect of preventing robot program attacks and fine-grained control

Inactive Publication Date: 2018-01-16
BANK OF CHINA
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the frequency and effective time of user requests cannot be controlled, users can request transactions frequently at any time, which will easily lead to excessive pressure on the background server and network congestion
In more serious cases, in the face of some malicious access attacks (such as robot programs), when a large number of concurrent requests are initiated in a short period of time, it is bound to cause serious consequences of exhaustion of server resources or even downtime
[0003] Existing access control technologies, some use webserver (web server) to limit the number of connections, and some use to control network bandwidth traffic
However, there are the following disadvantages: the number of http connections is used to limit, the system can only be protected on the number of access connections, and the frequency cannot be controlled for a certain session (session)
For example, the robot attack program does not need to occupy a lot of connections, but it will initiate transactions at a high frequency, far exceeding the frequency of human interaction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing robot attack
  • Method and system for preventing robot attack
  • Method and system for preventing robot attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] figure 1 A schematic flow diagram of a method for preventing robot attacks provided by an embodiment of the present invention, such as figure 1 As shown, the method mainly includes the following steps:

[0043] Step 101, receiving a transaction request initiated by a user.

[0044] Users can initiate a specific transaction request from a client, such as a browser, such as querying historical transaction details, or transfer transactions, etc. Transac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for preventing a robot attack. The method comprises: receiving a transaction request initiated by a user; acquiring a configuration parameter of the transaction request and determining whether the transaction request is subjected to access control according to the configuration parameter; if so, acquiring an access control rule corresponding to the transaction request; on the basis of the access control rule, determining whether the number of times of access of the transaction request reaches an allowable access upper limit within a preset period; andif so, the transaction request is refused. Therefore, control for a single client or a single session is realized; the control granularity becomes fine and accurate; and thus the program attack froma robot can be prevented completely.

Description

technical field [0001] The invention relates to the technical field of network data communication security, in particular to a method and system for preventing robot attacks. Background technique [0002] With the development of Internet finance, more and more financial services can be completed online without leaving home. The amount of network information and visits is showing a trend of massive growth, and the financial system is under enormous access pressure. If the frequency and effective time of user requests cannot be controlled, users can request transactions frequently at any time, which will easily lead to excessive pressure on the background server and network congestion. In a more serious situation, in the face of some malicious access attacks (such as robot programs), when a large number of concurrent requests are initiated in a short period of time, it will inevitably cause serious consequences such as exhaustion of server resources or even downtime. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/55G06F21/60
Inventor 黄河峰
Owner BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products