Processing method for http looping attack
A processing method and looping technology, applied in the Internet field, can solve problems such as system resource impact and system loss, and achieve the effects of simple operation, avoidance of looping, and easy implementation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0028] Such as Figure 1-2 As shown, the present invention relates to a processing method of http ring attack, and the steps are as follows:
[0029] After the proxy system receives the user request, if the request header does not contain the hop count (TTL) header, it will insert the TTL: n (n is the maximum hop count, typically 16) header in the request header; then include the TTL header All requests are forwarded to the next-level proxy system; after the proxy system receives the user request, if the request header contains a hop count (TTL) header, but the validity check of the TTL information fails (for example, cannot be parsed, or exceeds the maximum value) , then delete the original TTL header and insert a new TTL: n (n is the maximum number of hops, typically 16) header; then forward the request containing the TTL header to the next-level proxy system; the proxy system After receiving the user request, if the TTL header is included and the hop count information is v...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

