CN107592300A - A kind of method and system of anti-robot attack - Google Patents

A kind of method and system of anti-robot attack Download PDF

Info

Publication number
CN107592300A
CN107592300A CN201710700337.7A CN201710700337A CN107592300A CN 107592300 A CN107592300 A CN 107592300A CN 201710700337 A CN201710700337 A CN 201710700337A CN 107592300 A CN107592300 A CN 107592300A
Authority
CN
China
Prior art keywords
transaction request
access
access control
configuration parameter
upper limit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710700337.7A
Other languages
Chinese (zh)
Inventor
黄河峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN201710700337.7A priority Critical patent/CN107592300A/en
Publication of CN107592300A publication Critical patent/CN107592300A/en
Pending legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention provides a kind of method and system of anti-robot attack, methods described includes:Receive Client-initiated transaction request;The configuration parameter of the transaction request is obtained, judges the transaction request whether by access control according to the configuration parameter;Transaction request is obtained access control rule corresponding to the transaction request by access control as described in;According to the access control rule, judging whether the access times of the transaction request reach in predetermined period allows the access upper limit;As reached the upper limit, then refuse the transaction request.The present invention can realize the control for single client, single session, and Control granularity is thinner, more accurate, robot program can be prevented to attack completely.

Description

A kind of method and system of anti-robot attack
Technical field
The present invention relates to network data communication security technology area, more particularly to a kind of method of anti-robot attack and it is System.
Background technology
With the development of internet finance, increasing financial service can stay indoors, be completed on the net.Network Information content and visit capacity show the trend of magnanimity growth, and financial system subjects huge access pressure.If can not to The frequency of family request and effective time make control, user can frequently requests transaction at any time, be so easy to lead Cause background server pressure excessive, cause network blockage.(such as machine is attacked in more serious situation, the access in face of some malice People's program), in a short time largely initiate concurrent request when, server resource certainly will be caused to exhaust, machine of even delaying it is serious Consequence.
Existing access control technology, some are limited using webserver (web server) connection number, had Use control network bandwidth flow.But have the following disadvantages:Limited using http connection numbers, can only be on connection number be accessed System is protected, it is impossible to the control of frequency is carried out for some session (session).Such as robot attacker And many connection numbers need not be taken, but he understands the initiation transaction of high frequency, considerably beyond artificial frequency of interaction.
The content of the invention
In order to solve the above technical problems, the embodiments of the invention provide a kind of method and system of anti-robot attack.
On the one hand, the embodiments of the invention provide a kind of method of anti-robot attack, methods described to include:
Receive Client-initiated transaction request;
The configuration parameter of the transaction request is obtained, judges whether the transaction request is accessed according to the configuration parameter Control;
Transaction request is obtained access control rule corresponding to the transaction request by access control as described in;
According to the access control rule, judge whether the access times of the transaction request reach permitting in predetermined period Perhaps the upper limit is accessed;
As reached the upper limit, then refuse the transaction request.
In one embodiment, the configuration parameter of the transaction request is obtained, the transaction is judged according to the configuration parameter Whether ask by access control, including:
Obtain market segment information, customer information, operator message and the channel information of the transaction request;
Judge the market segment information, customer information, operator message and channel information whether with predefined transaction Configuration information is identical;
It is such as identical, judge the transaction request by access control;Otherwise not by access control.
In one embodiment, the configuration parameter of the transaction request is obtained, the transaction is judged according to the configuration parameter Whether ask by access control, including:
The configuration parameter of the transaction request is obtained, whether judge includes access control in the configuration parameter states;
When the configuration parameter includes access control statement, judge the transaction request by access control;Otherwise not By access control.
In one embodiment, the access control rule comprises at least one and accesses limitation, and each access limitation defines not With the upper limit for allowing access times in the cycle, whether the access times for judging the transaction request reach in predetermined period Allow to access the upper limit, including:
Query history accesses record, judges whether the current accessed number of the transaction request exceedes each access and limit respectively The upper limit of permission access times in its predetermined period.
In one embodiment, the access upper limit is allowed when the access times of the transaction request are not up in predetermined period When, methods described also includes:Update history access record.
On the other hand, the embodiment of the present invention also provides a kind of system of anti-robot attack, and the system includes:
Information receiving unit, for receiving Client-initiated transaction request;
Access control judging unit, for obtaining the configuration parameter of the transaction request, judged according to the configuration parameter Whether the transaction request is by access control;
Rule unit, when the transaction request is by access control, for obtaining corresponding to the transaction request Access control rule;
Access control filter element, for according to the access control rule, judging the access times of the transaction request Whether allow access the upper limit, such as reached the upper limit, then refused the transaction request if reaching in predetermined period.
In one embodiment, the access control judging unit is specifically used for:
Obtain market segment information, customer information, operator message and the channel information of the transaction request;
Judge the market segment information, customer information, operator message and channel information whether with predefined transaction Configuration information is identical, such as identical, the transaction request is judged by access control, otherwise not by access control.
In one embodiment, the access control judging unit is additionally operable to:
The configuration parameter of the transaction request is obtained, whether judge includes access control in the configuration parameter states;
When the configuration parameter includes access control statement, judge the transaction request by access control;Otherwise not By access control.
In one embodiment, the access control rule comprises at least one and accesses limitation, and each access limitation defines not With the upper limit for allowing access times in the cycle, the access control filter element is specifically used for:
Query history accesses record, judges whether the current accessed number of the transaction request exceedes each access and limit respectively The upper limit of permission access times in its predetermined period.
In one embodiment, the system also includes:
Updating block, for allowing the access upper limit when the access times of the transaction request are not up in predetermined period When, update history access record.
The present invention can realize the control for single client, single session, and Control granularity is thinner, more accurate, completely may be used To prevent robot program from attacking.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the method for anti-robot attack provided in an embodiment of the present invention;
Fig. 2 is the structural representation of the system of anti-robot attack provided in an embodiment of the present invention;
Fig. 3 is the system logic architecture schematic diagram for the anti-robot attack that another embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Fig. 1 is the schematic flow sheet of the method for anti-robot attack provided in an embodiment of the present invention, as shown in figure 1, the party Method mainly includes the following steps that:
Step 101, Client-initiated transaction request is received.
User can initiate a specific transaction request from client, such as browser, be inquired about as historical trading is detailed, or Person's money transfer transactions etc..Transaction composition generally includes transaction id, trading template and the configuration parameter of transaction.Transaction id, which is used to refer to, to be handed over Easy type, for representing to log in type of transaction or inquiry type of transaction, or other types of transaction.Trading template definition is handed over The object of disposable flow.The configuration parameter of transaction includes market segment information, customer information, operator message and channel information Deng for further being handled the transaction request after receiving the transaction request from the background.It should be noted that either merchandise ID, or trading template, or configuration parameter, configured by backstage when user initiates transaction request, and do not need user to enter Row operation.
Step 102, the configuration parameter of the transaction request is obtained, judges that the transaction request is according to the configuration parameter It is no by access control.
To prevent robot from attacking, the configuration parameter in being asked from the background according to customer transaction, the transaction request is judged Whether merchandised by access control, if the transaction request is by access control, then handled according to step 103.Otherwise, Respond the transaction request and (carry out step 106).
Step 103, when the transaction request is by access control, obtain access control corresponding to the transaction request and advise Then.
In embodiments of the present invention, for different transaction requests, different access control rules can be pre-set, When determining that transaction request receives access control, judged according to step 104.Above-mentioned access control rule comprises at least a visit Limitation is asked, it is each to access the upper limit for limiting and defining and allowing access times in different cycles, for example, at most accessing 10 in 30 minutes It is secondary, or at most access 100 times for one day, wherein, the cycle is referred within 30 minutes and 1 day, 10 times and 100 times are then above-mentioned two weeks Maximum access times in phase.
According to specific transaction scene, business background, user's usage amount etc., suitable access control policy is defined, can Meet user's request, and can protection system resource.
Such as:System provides historical trading inquiry and the function of downloading, and is specially:User input query time range, System inquires about qualified historical trading to client from database, while provides the function of downloading exel files.During inquiry Between scope be generally 1 year, therefore historical trading volume may be very big, after some time it is possible to reach hundreds of, thousands of notes records.If not to changing Transaction is controlled, and client frequently clicks on inquiry, downloaded, then server will ceaselessly inquire about database, can cause a large amount of IO (input and output), take more system resource, the situation of most serious, client is ceaselessly clicked on by robot program and looked into Inquiry, download can exhaust server resource, until machine of delaying.
If taking access control, for example at most allow a customer inquiries within 5 minutes and download once, then can To protect system resource, while it also disclosure satisfy that the demand of client.
Step 104, according to the access control rule, judge whether the access times of the transaction request reach default week Allow the access upper limit in phase.
When it is implemented, needing query history to access record, with reference to history access record, the transaction request is judged respectively Current accessed number whether exceed the upper limit that each access is limited in permission access times in its predetermined period.For example, judge Whether whether the access times in 30 minutes are more than 10 times for the access request, and exceeded in intraday access times 100 times.If access times are no more than 10 times in 30 minutes, total access times are also no more than 100 times in one day, then ring Should transaction request (step 106).
Step 105, as reached the upper limit, then the transaction request is refused.
For example, if access times of a certain transaction request in 30 minutes are more than 10 times, or in intraday visit Number is asked more than 100 times, then in order to prevent robot from attacking, the transaction request need to be refused.
The present invention can realize the control for single client, single session, and Control granularity is thinner, more accurate, completely may be used To prevent robot program from attacking.
In one embodiment, step 102 from the configuration parameter of the transaction request when it is implemented, first can obtain Market segment information, customer information, operator message and channel information, then judge the market segment information, customer information, Whether operator message and channel information are identical with predefined transaction configuration information, if identical, judge the transaction request By access control, otherwise not by access control.Wherein, the market that predefined transaction configuration information is included by access control is thin Point, client, operator and channel.The embodiment of the present invention is equivalent to one " blacklist " has been pre-defined, if above-mentioned transaction please The same type configuration parameter asked is consistent with relevant parameter that should be in " blacklist ", then illustrates the transaction request by access control, Need to do it further checking, judge whether it meets corresponding access control rule.
In another embodiment, not all transaction is required for using above-mentioned " blacklist " mechanism, and whether transaction It is controlled to be configured by the way of statement.In implementation steps 102, the configuration ginseng of transaction request can be first obtained Number, whether judge includes access control in the configuration parameter states, if stated including access control, judges the transaction request By access control.
In one embodiment, when above-mentioned transaction request is to be merchandised by access control, and access times are not up to default In cycle allow access the upper limit when, it is necessary to update history access record.
Based on the method identical inventive concept with anti-robot attack shown in Fig. 1, the embodiment of the present invention additionally provides one The system of Zhong Fang robots attack, shown in face embodiment specific as follows.In the principle and Fig. 1 that solve technical problem due to the system The method of anti-robot attack is similar, therefore the implementation of the system may refer to the implementation of Tu1Fang robots attack method, repeat Part repeats no more.
In another embodiment, present invention also offers a kind of system of anti-robot attack, the structural representation of the system Figure is as shown in Fig. 2 it mainly includes information receiving unit 201, access control judging unit 202, Rule unit 203 and visited Ask control filter element 204.
Wherein, information receiving unit 201 is used to receive Client-initiated transaction request.Access control judging unit 202 is used In the configuration parameter for obtaining the transaction request, judge the transaction request whether by access control according to the configuration parameter. Rule unit 203 accesses control when the transaction request is by access control, for obtaining corresponding to the transaction request System rule.Access control filter element 204 is used for the access times for according to the access control rule, judging the transaction request Whether allow access the upper limit, such as reached the upper limit, then refused the transaction request if reaching in predetermined period.
In one embodiment, access control judging unit 202 is specifically used for:Obtain the market segments of the transaction request Information, customer information, operator message and channel information;Judge the market segment information, customer information, operator message and Whether channel information is identical with predefined transaction configuration information, such as identical, judges the transaction request by access control, otherwise Not by access control.
In another embodiment, access control judging unit 202 is additionally operable to:Obtain the configuration ginseng of the transaction request Number, whether judge includes access control in the configuration parameter states;When the configuration parameter includes access control statement, Judge the transaction request by access control;Otherwise not by access control.
In one embodiment, above-mentioned access control rule comprises at least one and accesses limitation, each to access limitation regulation Allow the upper limits of access times in different cycles, now, access control filter element 204 is specifically used for:Query history accesses Record, judges whether the current accessed number of the transaction request exceedes the permission that each access is limited in its predetermined period respectively The upper limit of access times, if it exceeds allowing the upper limit of access times in any predetermined period, then refuse the transaction request and return Return a prompt message.
In one embodiment, above-mentioned system also includes a updating block 205 (not shown in Fig. 2), for when the friendship The access times easily asked be not up in predetermined period allow access the upper limit when, update history access record.
The present invention can realize the control for single client, single session, and Control granularity is thinner, more accurate, completely may be used To prevent robot program from attacking.
BFWJ (Bank of China java classes application development framework) is a kind of MVC frameworks based on Spring-IOC containers, is Possess the J2EE development platforms of high scalability, the embodiment of the present invention illustrates by taking BFWJ platforms as an example.When it is implemented, can be with In the filter list of the responsibility chain of BFWJ platform trading templates, increase access-control filter (accessControlFilt Er), when stating current transaction in the transaction request received to be merchandised by access control, the filter then can be according to transaction Specified/corresponding access control rule verifies to the transaction request, allows transaction request to pass through if verifying and passing through no Do not allow then.The logical architecture of the system defines trading processing stream as shown in figure 3, in figure 3, Template is trading template The object of journey;Chain, which is scolded, appoints chain, is the chain table object for needing traversal to perform in trading template;FilterCommand refers to filtering Device responsibility point;AccessControlFilter is access-control filter;DelegateCommand is responsibility as a representative point; AccessControlRule is access control rule;Scope is scope, refers to the scope of access rule control;Period refers to week Phase, it is cycle/frequency of access rule control.
, can be from the market segments, client, four scope of operator and channel (dimensions it is determined that during the customer range to be controlled Degree) on define, using true or false this four dimensions is controlled, true represents control, and false represents not control, Such as available following code carries out the setting of dimension:
When oimktIdJoin is false, subdivision of not controlling the market is represented;When custIdJoin is false, expression is not controlled Client processed;When oprIdJoin is true, control operation person is represented;When chnlJoin is true, control channel is represented.
Limitation includes the cycle (Period) and maximum (maxcount) in the cycle, Period define what permission user accessed Time range, two types are supported at present:With daily, maxCount defines the maximum allowed in specified period and accessed time slice Number.
<Bean class=" com.bocnet.common.accesscontrol.AccessControlLimit ">
<Param name=" periodArgs ">30</param><!-- the cycle (when period type is PerDay, hh: mm:ss-hh:mm:Ss, when period type is Section, the xx seconds) -->
<Param name=" periodType ">Section</param><!-- period type (PerDay:Daily. Section:Time slice) -->
<Param name=" maxCount ">1</param><!-- maximum in the cycle -->
</bean>
The embodiment of the present invention is merchandised by way of statement to be configured to be merchandised by access control, for example, by more accounts Historical trading inquiry transaction be arranged to controlled transaction, can in setting configuration access control configuration parameter, specific code It is as follows:
<!-- more account historical Transaction Inquiries -- downloading file -->
Setting in above-mentioned configuration represents to be made that statement to this current transaction:Current transaction is controlled by access System.Wherein, the ID of access control is acqDownLoad, and this ID is pair being present in another configuration file (xml) As wherein containing the control range of access control, the control information such as frequency and cycle.Pass through the configuration in above-mentioned transaction request Mode of the transaction by access control is stated in parameter in advance, when receiving the transaction request of user, first judges its configuration State such as exist in parameter with the presence or absence of access control, then judge the transaction request to be merchandised by access control, it need to be done Further checking.
When it is implemented, handling process approximately as:
Asked 1. user initiates network trading by browser, access certain A that only merchandises of system.
2. filter F ilterCommand checks whether transaction A configuration file states accessControl parameters, and Corresponding configuration rule is found according to corresponding parameter.
3.AccessControlRule is controlled logic judgment, according to control rule, including period p eriod and number Maxcount., while to data base querying history access record (i.e.:In current period, the number that has accessed) and Maxcounter is compared, and allows to access if the upper limit is not reaching to, while updates access record;If reached, refuse Access absolutely, return to prompt message.
When it is implemented, the embodiment of the present invention also includes an auxiliary and step of dealing with problems arising from an accident:The cleaning of history access record.Typically For, nobody can use the access record more than more than 1 year again, there is no value, can clear up.While in order to The performance and access efficiency of tables of data are considered, it is necessary to carry out cleaning backup.
Existing access control technology, some are limited using the connection number of web server, and some uses control network Bandwidth traffic.But limited using http connection numbers, system can only be protected on connection number is accessed, it is impossible to be directed to Some session carries out the control of frequency.For example robot attacker and many connection numbers need not be taken, but he can be high The initiation transaction of frequency, considerably beyond artificial frequency of interaction.
For the present invention aiming at single client, the control of single session, Control granularity is thinner, more accurate, can hinder completely Only robot program attacks.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
Apply specific embodiment in the present invention to be set forth the principle and embodiment of the present invention, above example Explanation be only intended to help understand the present invention method and its core concept;Meanwhile for those of ordinary skill in the art, According to the thought of the present invention, there will be changes in specific embodiments and applications, in summary, in this specification Appearance should not be construed as limiting the invention.

Claims (10)

  1. A kind of 1. method of anti-robot attack, it is characterised in that methods described includes:
    Receive Client-initiated transaction request;
    The configuration parameter of the transaction request is obtained, judges whether the transaction request is controlled by access according to the configuration parameter System;
    Transaction request is obtained access control rule corresponding to the transaction request by access control as described in;
    According to the access control rule, judge whether the access times of the transaction request reach allows to visit in predetermined period Ask the upper limit;
    As reached the upper limit, then refuse the transaction request.
  2. 2. the method for anti-robot attack according to claim 1, it is characterised in that obtain the configuration of the transaction request Parameter, whether the transaction request is judged by access control according to the configuration parameter, including:
    Obtain market segment information, customer information, operator message and the channel information of the transaction request;
    Judge whether the market segment information, customer information, operator message and channel information configure with predefined transaction Information is identical;
    It is such as identical, judge the transaction request by access control;Otherwise not by access control.
  3. 3. the method for anti-robot attack according to claim 1, it is characterised in that obtain the configuration of the transaction request Parameter, whether the transaction request is judged by access control according to the configuration parameter, including:
    The configuration parameter of the transaction request is obtained, whether judge includes access control in the configuration parameter states;
    When the configuration parameter includes access control statement, judge the transaction request by access control;Otherwise it is not interviewed Ask control.
  4. 4. the method for the anti-robot attack according to claim any one of 1-3, it is characterised in that the access control rule Then comprise at least one and access limitation, each upper limit for accessing limitation and defining permission access times in different cycles, the judgement The access times of the transaction request whether reach in predetermined period allow access the upper limit, including:
    Query history accesses record, judges whether the current accessed number of the transaction request exceedes each access and be limited in it respectively The upper limit of permission access times in predetermined period.
  5. 5. the method for anti-robot attack according to claim 4, it is characterised in that when the access time of the transaction request Number be not up to predetermined period in allow access the upper limit when, methods described also includes:Update history access record.
  6. 6. a kind of system of anti-robot attack, it is characterised in that the system includes:
    Information receiving unit, for receiving Client-initiated transaction request;
    Access control judging unit, for obtaining the configuration parameter of the transaction request, according to judging the configuration parameter Whether transaction request is by access control;
    Rule unit, when the transaction request is by access control, for obtaining access corresponding to the transaction request Control rule;
    Access control filter element, for according to the access control rule, judge the transaction request access times whether Reaching in predetermined period allows to access the upper limit, has such as reached the upper limit, has then refused the transaction request.
  7. 7. the system of anti-robot attack according to claim 6, it is characterised in that the access control judging unit tool Body is used for:
    Obtain market segment information, customer information, operator message and the channel information of the transaction request;
    Judge whether the market segment information, customer information, operator message and channel information configure with predefined transaction Information is identical, such as identical, the transaction request is judged by access control, otherwise not by access control.
  8. 8. the system of anti-robot attack according to claim 6, it is characterised in that the access control judging unit is also For:
    The configuration parameter of the transaction request is obtained, whether judge includes access control in the configuration parameter states;
    When the configuration parameter includes access control statement, judge the transaction request by access control;Otherwise it is not interviewed Ask control.
  9. 9. the system of the anti-robot attack according to claim any one of 6-8, it is characterised in that the access control rule Then comprise at least one and access limitation, each upper limit for accessing limitation and defining permission access times in different cycles, the access Control filter element is specifically used for:
    Query history accesses record, judges whether the current accessed number of the transaction request exceedes each access and be limited in it respectively The upper limit of permission access times in predetermined period.
  10. 10. the system of anti-robot attack according to claim 9, it is characterised in that the system also includes:
    Updating block, for when the access times of the transaction request be not up in predetermined period allow access the upper limit when, more New historical accesses record.
CN201710700337.7A 2017-08-16 2017-08-16 A kind of method and system of anti-robot attack Pending CN107592300A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710700337.7A CN107592300A (en) 2017-08-16 2017-08-16 A kind of method and system of anti-robot attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710700337.7A CN107592300A (en) 2017-08-16 2017-08-16 A kind of method and system of anti-robot attack

Publications (1)

Publication Number Publication Date
CN107592300A true CN107592300A (en) 2018-01-16

Family

ID=61042400

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710700337.7A Pending CN107592300A (en) 2017-08-16 2017-08-16 A kind of method and system of anti-robot attack

Country Status (1)

Country Link
CN (1) CN107592300A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108874948A (en) * 2018-06-05 2018-11-23 中国农业银行股份有限公司 A kind of site resource access method and device
CN109032052A (en) * 2018-06-26 2018-12-18 上海常仁信息科技有限公司 Emergency intelligence control system based on robot identity card
CN110287694A (en) * 2019-06-26 2019-09-27 维沃移动通信有限公司 Application management method, mobile terminal and storage medium
CN110413416A (en) * 2019-07-31 2019-11-05 中国工商银行股份有限公司 A kind of current-limiting method and device of distributed server
CN110618893A (en) * 2019-09-26 2019-12-27 中国银行股份有限公司 Transaction control method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478450A (en) * 2009-02-12 2009-07-08 阿里巴巴集团控股有限公司 Monitoring method and server for network user active degree
US20130031626A1 (en) * 2011-07-29 2013-01-31 Electronics And Telecommunications Research Institute Methods of detecting dns flooding attack according to characteristics of type of attack traffic
CN103746987A (en) * 2013-12-31 2014-04-23 东软集团股份有限公司 Method and system for detecting DoS attack in semantic Web application
CN104980421A (en) * 2014-10-15 2015-10-14 腾讯科技(深圳)有限公司 Method and system for processing batch requests
CN106302318A (en) * 2015-05-15 2017-01-04 阿里巴巴集团控股有限公司 A kind of website attack defense method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478450A (en) * 2009-02-12 2009-07-08 阿里巴巴集团控股有限公司 Monitoring method and server for network user active degree
US20130031626A1 (en) * 2011-07-29 2013-01-31 Electronics And Telecommunications Research Institute Methods of detecting dns flooding attack according to characteristics of type of attack traffic
CN103746987A (en) * 2013-12-31 2014-04-23 东软集团股份有限公司 Method and system for detecting DoS attack in semantic Web application
CN103746987B (en) * 2013-12-31 2017-02-01 东软集团股份有限公司 Method and system for detecting DoS attack in semantic Web application
CN104980421A (en) * 2014-10-15 2015-10-14 腾讯科技(深圳)有限公司 Method and system for processing batch requests
CN106302318A (en) * 2015-05-15 2017-01-04 阿里巴巴集团控股有限公司 A kind of website attack defense method and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108874948A (en) * 2018-06-05 2018-11-23 中国农业银行股份有限公司 A kind of site resource access method and device
CN108874948B (en) * 2018-06-05 2021-04-02 中国农业银行股份有限公司 Website resource access method and device
CN109032052A (en) * 2018-06-26 2018-12-18 上海常仁信息科技有限公司 Emergency intelligence control system based on robot identity card
CN109032052B (en) * 2018-06-26 2020-09-22 上海常仁信息科技有限公司 Emergency intelligent control system based on robot identity card
CN110287694A (en) * 2019-06-26 2019-09-27 维沃移动通信有限公司 Application management method, mobile terminal and storage medium
CN110413416A (en) * 2019-07-31 2019-11-05 中国工商银行股份有限公司 A kind of current-limiting method and device of distributed server
CN110413416B (en) * 2019-07-31 2022-05-17 中国工商银行股份有限公司 Current limiting method and device for distributed server
CN110618893A (en) * 2019-09-26 2019-12-27 中国银行股份有限公司 Transaction control method and system

Similar Documents

Publication Publication Date Title
CN107592300A (en) A kind of method and system of anti-robot attack
CN108322472B (en) For providing method, system and the medium of identity based on cloud and access management
US7818745B2 (en) Dynamic transaction control within a host transaction processing system
CN112116438A (en) Multi-channel payment integration method, platform, equipment and medium
CN107483418A (en) Login process method, method for processing business, device and server
CN108701182A (en) The data management of multi-tenant identity cloud service
US11132183B2 (en) Software development platform for testing and modifying decision algorithms
CN104899482B (en) The method and apparatus of limitation batch request service
US11379429B1 (en) Computer-based systems configured for permission events management on a blockchain and methods of use thereof
WO2021203858A1 (en) Data application system security control method and system, and computer device
US20180316774A1 (en) Flow extension controller
US11218469B2 (en) Systems and methods for controlling personal information on online services
CN110417888A (en) Flow control methods, volume control device and electronic equipment
EP1244272A2 (en) Digital credential exchange
US20210366043A1 (en) System and method for exchanging currency
CN109286630A (en) Deng guarantor&#39;s processing method, device, equipment and storage medium
CN110413918A (en) Data transmission method for uplink, device, equipment and storage medium
Iyengar Dynamic argument embedding: Preserving state on the world wide web
CN110110510A (en) A kind of engineering calculation model management method based on cloud computing
CN109213605A (en) A kind of server I suitable for high concurrent scene/O implementation method
CN114924783A (en) Interface calling method, device, equipment and storage medium of application program
Schuchmann Designing a cloud architecture for an application with many users
EP3803651A1 (en) Secure digital safe deposit boxes and methods of use
SE528217C2 (en) Device and procedure in an electronic trading system
CN110430263B (en) Value added service processing system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180116

RJ01 Rejection of invention patent application after publication