Website security defense method

A security defense and website technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of being unable to distinguish between access requests and normal users' access requests, normal users cannot use the website server, and attackers cannot access request restrictions, etc., to achieve Improve the defense ability, reduce the number of visits, and avoid the effect of breach

Active Publication Date: 2019-07-12
北京华安普特网络科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Some malicious attackers often use the server to generate legitimate requests for relevant websites, so as to continuously visit the website to consume the performance of the website server, so as to attack the website, causing the website server to be paralyzed, and normal users cannot use the website server
[0003] Since the access request initiated by the attacker to the website is the same as that of a normal user, when the website server receives the access request sent by the attacker, it cannot distinguish whether the access request of the attacker is the access request of a normal user, and cannot respond to the attacker's request. In order to improve the anti-attack ability of the website and improve the use effect of normal users, a website security defense method is designed, which greatly improves the security and defense ability of the website

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website security defense method
  • Website security defense method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0026] see figure 1 As shown, a website security defense method includes the following steps:

[0027] S1. Obtain the number of website access requests within the preset time period corresponding to each region;

[0028] S2. Comparing the number of website access requests in each area with the set threshold of website access requests in the standard area, and determining the over-value rate of website access requests in this area, the over-value rate ζ is expresse...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a website security defense method. The method comprises the following steps: obtaining the number of website access requests in a preset time period corresponding to each region; comparing the website access request with a set website access request threshold value in a standard area, and determining an overvalue rate of the website access request; extracting an IP addresscorresponding to logging in the website in an area of which the overvalue rate is greater than a set standard overvalue rate; obtaining an access threshold of the website IP address; judging whether the real-time access frequency of each IP address in the area of which the overbalance rate is greater than the set standard overbalance rate is greater than the access threshold of the website IP address or not; and carrying out flow limiting processing on the IP address of which the actual access frequency is greater than the access threshold of the website IP address, otherwise, counting the access time and the access number of the IP address in the prediction time period, and recording and storing the access time and the access number. The access frequency of the IP address is limited, theaccess threshold value is reduced, the access frequency of the IP address is reduced, the website is prevented from being attacked, and the defense capability of the website is improved.

Description

technical field [0001] The invention belongs to the technical field of website defense, and relates to a website security defense method. Background technique [0002] Some malicious attackers often use the server to generate legitimate requests for relevant websites, thereby continuously visiting the website to consume the performance of the website server, so as to attack the website, causing the website server to be paralyzed, and normal users cannot use the website server. [0003] Since the access request initiated by the attacker to the website is the same as that of a normal user, when the website server receives the access request sent by the attacker, it cannot distinguish whether the access request of the attacker is the access request of a normal user, and cannot respond to the attacker's request. In order to improve the anti-attack ability of the website and improve the use effect of normal users, a website security defense method is designed, which greatly impro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1441
Inventor 胡磊
Owner 北京华安普特网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products