CN108111501A - Control method, device and the computer equipment of cheating flow - Google Patents

Control method, device and the computer equipment of cheating flow Download PDF

Info

Publication number
CN108111501A
CN108111501A CN201711347752.5A CN201711347752A CN108111501A CN 108111501 A CN108111501 A CN 108111501A CN 201711347752 A CN201711347752 A CN 201711347752A CN 108111501 A CN108111501 A CN 108111501A
Authority
CN
China
Prior art keywords
exemption
access request
field
value
updated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711347752.5A
Other languages
Chinese (zh)
Other versions
CN108111501B (en
Inventor
王伯远
张伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201711347752.5A priority Critical patent/CN108111501B/en
Publication of CN108111501A publication Critical patent/CN108111501A/en
Application granted granted Critical
Publication of CN108111501B publication Critical patent/CN108111501B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Abstract

The application proposes a kind of control method, device and the computer equipment of flow of practising fraud, wherein, the control method of above-mentioned cheating flow includes:The access request that receiving terminal apparatus is sent;If the access request includes exempting field, the value of the exemption field is updated;Exemption verification is carried out to the access request according to the value of updated exemption field;If the access request does not verify by exempting, refuse the access request.The application can be realized carries out global control to cheating flow, and is not required to the storage engines outside introducing, and realization is simple, reduces the processing time of access request, improves user experience.

Description

Control method, device and the computer equipment of cheating flow
Technical field
This application involves control of network flow quantity technical field more particularly to a kind of control method of flow of practising fraud, device and Computer equipment.
Background technology
In existing correlation technique, cheating flow control needs to count the flow of access according to each dimension each to calculate The frequency of dimension, existing counting mode are divided into two kinds, and one kind is local counting, and one kind is global counting, wherein, the overall situation counts Method also need to realize by external storage engines.
But the shortcomings that locally being counted in existing correlation technique is that global control cannot be carried out to cheating flow, it is global The shortcomings that counting is the storage engines outside needing to introduce, relative complex in realization, and the processing time of access request can increase Length is more, and user experience is poor.
The content of the invention
The application is intended to solve at least some of the technical problems in related technologies.
For this purpose, first purpose of the application is to propose a kind of control method for flow of practising fraud, cheating is flowed with realizing Amount carries out global control, and is not required to the storage engines outside introducing, and realization is simple, reduces the processing time of access request, Improve user experience.
Second purpose of the application is to propose a kind of control device for flow of practising fraud.
The 3rd purpose of the application is to propose a kind of computer equipment.
The 4th purpose of the application is to propose a kind of non-transitorycomputer readable storage medium.
In order to achieve the above object, the application first aspect embodiment proposes a kind of control method for flow of practising fraud, including:It receives The access request that terminal device is sent;If the access request include exempt field, to it is described exemption field value into Row update;Exemption verification is carried out to the access request according to the value of updated exemption field;If the access request is not It is verified by exempting, then refuses the access request.
In the control method of the cheating flow of the embodiment of the present application, after the access request that receiving terminal apparatus is sent, such as The above-mentioned access request of fruit includes exempting field, then the value of above-mentioned exemption field is updated, and is then slitted according to updated The value for exempting from field carries out exemption verification to above-mentioned access request, if above-mentioned access request is not verified by exempting, on refusal Access request is stated, so as to realize the control global to cheating flow progress according to field is exempted, and is not required to introduce external Storage engines, realize simple, reduce the processing time of access request, improve user experience.
In order to achieve the above object, the application second aspect embodiment proposes a kind of control device for flow of practising fraud, including:It connects Module is received, the access request sent for receiving terminal apparatus;Update module, please for working as the access that the receiving module receives Ask include exempt field when, to it is described exemption field value be updated;Correction verification module, for according to the update module more The value of exemption field after new carries out exemption verification to the access request;Control module determines for working as the correction verification module When the access request does not verify by exempting, refuse the access request.
The embodiment of the present application cheating flow control device, receiving module receiving terminal apparatus send access request it Afterwards, if above-mentioned access request includes exempting field, update module is updated the value of above-mentioned exemption field, then school It tests module and exemption verification is carried out to above-mentioned access request according to the value of updated exemption field, if above-mentioned access request is not led to Exemption verification is crossed, then control module refuses above-mentioned access request, and cheating flow is carried out according to exemption field so as to realize Global control, and the storage engines outside introducing are not required to, it realizes the processing time for simply, reducing access request, improves User experience.
In order to achieve the above object, the application third aspect embodiment proposes a kind of computer equipment, including:Memory, place It manages device and is stored in the computer program that can be run on the memory and on the processor, described in the processor execution During computer program, method as described above is realized.
In order to achieve the above object, the application fourth aspect embodiment proposes a kind of non-transitory computer-readable storage medium Matter, is stored thereon with computer program, and the computer program realizes method as described above when being executed by processor.
The additional aspect of the application and advantage will be set forth in part in the description, and will partly become from the following description It obtains substantially or is recognized by the practice of the application.
Description of the drawings
The application is above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments Substantially and it is readily appreciated that, wherein:
Fig. 1 is the flow chart of control method one embodiment of the application cheating flow;
Fig. 2 is the flow chart of another embodiment of the control method of the application cheating flow;
Fig. 3 is the flow chart of the control method further embodiment of the application cheating flow;
Fig. 4 is the structure diagram of control device one embodiment of the application cheating flow;
Fig. 5 is the structure diagram of another embodiment of the control device of the application cheating flow;
Fig. 6 is the structure diagram of the application computer equipment one embodiment.
Specific embodiment
Embodiments herein is described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end Same or similar label represents same or similar element or has the function of same or like element.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the application, and it is not intended that limitation to the application.
Fig. 1 is the flow chart of control method one embodiment of the application cheating flow, as shown in Figure 1, above-mentioned cheating stream The control method of amount can include:
Step 101, the access request that receiving terminal apparatus is sent.
Wherein, above-mentioned terminal device can be smart mobile phone, tablet computer, laptop or personal computer (Personal Computer;Hereinafter referred to as:) etc. PC the intelligent terminal of web page browsing can be carried out, the present embodiment is to upper The form for stating terminal device is not construed as limiting.
Step 102, if above-mentioned access request includes exempting field, the value of above-mentioned exemption field is updated.
Step 103, exemption verification is carried out to the access request according to the value of updated exemption field.
Step 104, if above-mentioned access request does not verify by exempting, above-mentioned access request is refused.
Further, after step 103, can also include:
Step 105, if above-mentioned access request is verified by exempting, above-mentioned access request is allowed to continue to access.
In the present embodiment, after the access request of the proxy server receiving terminal apparatus transmission of access layer, if above-mentioned Access request includes exempting field, then the value of above-mentioned exemption field is updated, then according to updated exemption field Value exemption verification is carried out to above-mentioned access request, if above-mentioned access request not by exempt verify, refuse above-mentioned access It asks, so as to realize the control global to cheating flow progress according to field is exempted, and is not required to the storage outside introducing Engine is realized simply, reduces the processing time of access request, improve user experience.
Fig. 2 is the flow chart of another embodiment of the control method of the application cheating flow, as shown in Fig. 2, the application Fig. 1 Illustrated embodiment step 102 can include:
Step 201, if above-mentioned access request includes exempting field, the exemption word in above-mentioned access request is obtained Section.
Step 202, above-mentioned exemption field is decrypted.
Step 203, the exemption in the exemption field after decryption is counted and the value of the last timestamp exempted carries out Update.
Specifically, the value counted to the exemption in the exemption field after decryption is updated:By slitting after decryption Exempt from the value that the exemption in field counts and add predetermined value, wherein, the size of above-mentioned predetermined value can be in specific implementation, root According to the sets itselfs such as system performance and/or realization demand, the present embodiment is not construed as limiting the size of above-mentioned predetermined value, and citing comes It says, above-mentioned predetermined value can be 1.
The value of the last timestamp exempted in exemption field after decryption, which is updated, to be:After decrypting Exemption field in the value of the last timestamp exempted at the time of be updated to the last exempt.
In this way, step 103 can include:
Step 204, the value for the timestamp that first time passes through identifying code and the last time in updated exemption field are slitted The value for the timestamp exempted from is compared respectively with current time.
At this moment, access request can not be by exempting verification:Current time with passing through the timestamp of identifying code for the first time Value compare more than or equal to setting duration threshold value.
Wherein, the duration threshold value of setting can voluntarily be set in specific implementation according to system performance and/or realization demand etc. Fixed, the present embodiment is not construed as limiting the size of the duration threshold value of above-mentioned setting, for example, the duration threshold value of setting can be 60 Minute.
Step 205, if current time is less than the duration of setting compared with first time is by the value of the timestamp of identifying code Threshold value, and current time compared with the value of the last timestamp exempted in updated exemption field more than or equal to setting Whether fixed unit time, the then value for judging to exempt counting in updated exemption field are more than predetermined frequency threshold value.
The unit time of above-mentioned setting can voluntarily be set in specific implementation according to system performance and/or realization demand etc. Fixed, the present embodiment is not construed as limiting the size of the unit time of above-mentioned setting, for example, the unit time of setting can be 1 Minute;
Above-mentioned predetermined frequency threshold value can voluntarily be set in specific implementation according to system performance and/or realization demand etc. Fixed, the present embodiment is not construed as limiting the size of above-mentioned predetermined frequency threshold value, for example, above-mentioned predetermined frequency threshold value can be with For 20 times.
In this way, above-mentioned access request can not be by exempting verification:The value of counting is exempted in updated exemption field More than predetermined frequency threshold value.
That is, in the present embodiment, exempt verification and include two layers and verify, be first, for the first time by identifying code when Between stab, compared with current time, it is impossible to more than or equal to the duration threshold value of setting, in the present embodiment be 60 minutes.
And when for the first time by the timestamp of identifying code, compared with current time, less than setting duration threshold value when, also need Determine whether current time is more than compared with the value of the last timestamp exempted in updated exemption field Or the unit time equal to setting, if it is, it is predetermined to judge whether the value that counting is exempted in updated exemption field is more than Frequency threshold value, if exempt count value be more than predetermined frequency threshold value, also determine above-mentioned access request do not pass through exemption Verification.
This was divided into 60 slots, when the duration of each slot is unit that is, in the present embodiment by 60 minutes of exemption Long (being 1 minute in this example), the exemption of each slot count the frequency threshold value (being 20 times in this example) for having oneself predetermined, normally User is exempted in a slot no more than predetermined frequency threshold value, so as to effectively control cheating flow.
Further, after step 203, can also include:
Step 206, will be put back to after updated exemption field encryption in above-mentioned access request.
In the present embodiment, step 206 can perform parallel with step 204~step 205, can also successively perform, this reality Example is applied to be not construed as limiting the execution sequence of step 206 and step 204~step 205.
Fig. 3 is the flow chart of the control method further embodiment of the application cheating flow, as shown in figure 3, the application Fig. 1 In illustrated embodiment after step 101, it can also include:
Step 301, trigger check information server and send check information input page to above-mentioned terminal device, for using The user of above-mentioned terminal device input validation information in above-mentioned check information input page.
Specifically, triggering check information server can be to above-mentioned terminal device transmission check information input page:Root According to access times of the above-mentioned access request in scheduled duration, determine that the access granularity of above-mentioned access request is greater than or equal to and make a reservation for Access granularity threshold value after, triggering check information server to above-mentioned terminal device send check information input page.
Wherein, above-mentioned scheduled duration can voluntarily be set in specific implementation according to system performance and/or realization demand etc. Fixed, the present embodiment is not construed as limiting the size of above-mentioned scheduled duration, for example, above-mentioned scheduled duration can be 1 minute;It is above-mentioned Predetermined access granularity threshold value can be in specific implementation, according to the sets itselfs such as system performance and/or realization demand, this implementation Example is not construed as limiting the size of above-mentioned predetermined access granularity threshold value, for example, above-mentioned predetermined access granularity threshold value can be with For 20.
In the present embodiment, after receiving access request, access that can be according to above-mentioned access request in scheduled duration Number determines the access granularity of above-mentioned access request, here the business of the access times in scheduled duration and above-mentioned scheduled duration The access granularity of as above-mentioned access request.Then, judge whether the access granularity of above-mentioned access request is greater than or equal to make a reservation for Access granularity threshold value, if it is, triggering check information server to above-mentioned terminal device send check information input page.
Step 302, determine the check information of above-mentioned terminal device transmission by verifying it in above-mentioned check information server Afterwards, the exemption field that above-mentioned check information server adds in above-mentioned access request is obtained.
In the present embodiment, check information server can be identifying code server, and check information input page can be to test Code input page is demonstrate,proved, above-mentioned check information server determines that the check information that above-mentioned terminal device is sent can be by verification: Identifying code server determines that the identifying code that above-mentioned terminal device is sent passes through verification.
The identifying code of the forms such as picture, word and/or voice may be employed in above-mentioned identifying code, and certain above-mentioned check information is simultaneously A kind of identifying code this form is not limited only to, the check information of other forms can also be used, the present embodiment be not construed as limiting this.
Step 303, the exemption field of acquisition is decrypted.
In the present embodiment, exemption field that above-mentioned check information server adds in above-mentioned access request be it is encrypted, Therefore proxy server obtains above-mentioned exemption field afterwards, it is necessary to which the exemption field of acquisition is decrypted.
During specific implementation, to exempt field be encrypted used by algorithm can be AES-128-CBC with IV, generation Reason server needs that the exemption field of acquisition is decrypted using corresponding decipherment algorithm, the present embodiment to the encryption of use with Decipherment algorithm is not construed as limiting, as long as can be encrypted and decrypted to exempting field.
Step 304, the value of the exemption field after decryption is configured.
Specifically, the value of the exemption field after decryption is configured to be:Above-mentioned use in above-mentioned exemption field is set By the timestamp of identifying code, the last timestamp exempted and exempt the value counted for the first time in family.
Wherein, set above-mentioned user in above-mentioned exemption field for the first time as will be above-mentioned by the value of the timestamp of identifying code It exempts above-mentioned user in field and above-mentioned user is set to for the first time by identifying code by the value of the timestamp of identifying code for the first time Time, the value for setting the last timestamp exempted of above-mentioned user in above-mentioned exemption field is will be in above-mentioned exemption field The value for stating the last timestamp exempted of user is set to the above-mentioned user the last time exempted.
Set the value for exempting counting in above-mentioned exemption field that the value for exempting counting in above-mentioned exemption field as is set to pre- Fixed number value, wherein, the size of above-mentioned predetermined value can be in specific implementation, according to system performance and/or realization demand etc. certainly Row setting, the present embodiment are not construed as limiting the size of above-mentioned predetermined value, for example, above-mentioned predetermined value can be 1.
Further, product line title in above-mentioned exemption field, the account number of above-mentioned user and above-mentioned can also be set The value of the login status of user is configured.
Wherein, the said goods line title is that the requested webpage of above-mentioned access request belongs to which product line, above-mentioned use The account number at family is the mark of the login account of above-mentioned user, and the login status of above-mentioned user is that above-mentioned user is currently The state for logging in or being not logged in.
Step 305, will be put back to after the exemption field encryption after setting in above-mentioned access request.
In the present embodiment, when the exemption field after setting is encrypted in proxy server, using with check information service The exemption field after setting is encrypted in the identical Encryption Algorithm of device.
It is above-mentioned when proxy server receives the above-mentioned access request of terminal device transmission again by above-mentioned steps It will be carried in access request and exempt field, in this way, after proxy server receives access request, according to above-mentioned access request The middle value for exempting field can carry out exemption verification to above-mentioned access request, and access request need not be sent to global clothes It is engaged in carrying out global counting in device, also there is no need to increase external storage engines to store access request, realization is simple, and And the handling duration of above-mentioned access request can be reduced, improve user experience.
Fig. 4 be the application practise fraud flow control device one embodiment structure diagram, in the embodiment of the present application The control device of cheating flow can be used as a part for computer equipment or computer equipment to realize that the embodiment of the present application carry The control method of the cheating flow of confession.
Above computer equipment can be proxy server, and the present embodiment does not limit the form of above computer equipment It is fixed.
As shown in figure 4, the control device of above-mentioned cheating flow can include:Receiving module 41, update module 42, calibration mode Block 43 and control module 44;
Receiving module 41, the access request sent for receiving terminal apparatus;Wherein, above-mentioned terminal device can be intelligence Mobile phone, tablet computer, laptop or PC etc. can carry out the intelligent terminal of web page browsing, and the present embodiment is to above-mentioned end The form of end equipment is not construed as limiting.
Update module 42, when the access request for being received when receiving module 41 includes exempting field, to above-mentioned exemption The value of field is updated;
Correction verification module 43, for being slitted according to the updated value for exempting field of update module 42 to above-mentioned access request Exempt to verify;
Control module 44, for when correction verification module 43 determines that above-mentioned access request does not verify by exempting, refusal to be above-mentioned Access request.
Further, control module 44 are additionally operable to when correction verification module 43 determines that above-mentioned access request is verified by exempting, Above-mentioned access request is allowed to continue to access.
In the present embodiment, after the access request that 41 receiving terminal apparatus of receiving module is sent, if above-mentioned access request Include exempting field, then update module 42 is updated the value of above-mentioned exemption field, and then correction verification module 43 is according to update The value of exemption field afterwards carries out exemption verification to above-mentioned access request, if above-mentioned access request is not verified by exempting, Control module 44 refuses above-mentioned access request, so as to realize the control global to cheating flow progress according to field is exempted, And the storage engines being not required to outside introducing, realize simply, reduce the processing time of access request, improve user experience.
Fig. 5 is the structure diagram of another embodiment of the control device of the application cheating flow, with cheating shown in Fig. 4 The control device of flow is compared, the difference is that, in the control device of the cheating flow shown in Fig. 5, update module 42 can be with Including:Acquisition submodule 421, decryption submodule 422 and exemption field update submodule 423;
Wherein, acquisition submodule 421, for obtaining the exemption field in above-mentioned access request;
Submodule 422 is decrypted, for above-mentioned exemption field to be decrypted;
Field update submodule 423 is exempted, for being counted to the exemption in the exemption field after the decryption decryption of submodule 422 The value for the timestamp exempted with the last time is updated.
Specifically, the value counted to the exemption in the exemption field after decryption is updated:Exempt field update The value that submodule 423 counts the exemption in the exemption field after decryption plus predetermined value, wherein, above-mentioned predetermined value it is big It is small can specific implementation when, according to the sets itselfs such as system performance and/or realization demand, the present embodiment is to above-mentioned predetermined value Size be not construed as limiting, for example, above-mentioned predetermined value can be 1.
The value of the last timestamp exempted in exemption field after decryption, which is updated, to be:Exempt field The value of the last timestamp exempted in exemption field after decryption is updated to the last exemption by update submodule 423 Moment.
In this way, correction verification module 43 can include:Compare submodule 431 and judging submodule 432;
Compare submodule 431, for by updated exemption field for the first time by the value of the timestamp of identifying code and The value for the timestamp that the last time exempts is compared respectively with current time;
At this moment, above-mentioned access request can not be by exempting verification:Current time passes through identifying code with above-mentioned first time Timestamp value compare more than or equal to setting duration threshold value;Wherein, the duration threshold value of setting can specific implementation when, According to the sets itselfs such as system performance and/or realization demand, the present embodiment does not limit the size of the duration threshold value of above-mentioned setting It is fixed, for example, the duration threshold value of setting can be 60 minutes.
Judging submodule 432, at current time with above-mentioned first time by the value of the timestamp of identifying code compared with it is small In the duration threshold value of setting, and current time is compared with the value of the last timestamp exempted in updated exemption field More than or equal to setting unit time when, whether the value for judging to exempt counting in updated exemption field is more than predetermined time Number threshold value.
The unit time of above-mentioned setting can voluntarily be set in specific implementation according to system performance and/or realization demand etc. Fixed, the present embodiment is not construed as limiting the size of the unit time of above-mentioned setting, for example, the unit time of setting can be 1 Minute;
Above-mentioned predetermined frequency threshold value can voluntarily be set in specific implementation according to system performance and/or realization demand etc. Fixed, the present embodiment is not construed as limiting the size of above-mentioned predetermined frequency threshold value, for example, above-mentioned predetermined frequency threshold value can be with For 20 times.
In this way, above-mentioned access request can not be by exempting verification:The value of counting is exempted in updated exemption field More than predetermined frequency threshold value.
That is, in the present embodiment, exempting verification includes two layers of verification, is first, and comparison submodule 431 will for the first time By the timestamp of identifying code, compared with current time, it is impossible to be 60 in the present embodiment more than or equal to the duration threshold value of setting Minute.
And when for the first time by the timestamp of identifying code, compared with current time, less than setting duration threshold value when, judge Submodule 432 also needs to determine whether current time and the value of the last timestamp exempted in updated exemption field Compared to whether the unit time of setting is greater than or equal to, if it is, judging the updated value exempted and counting is exempted in field Whether it is more than predetermined frequency threshold value, if exempting the value counted is more than predetermined frequency threshold value, also determines that above-mentioned access please It asks and is not verified by exempting.
This was divided into 60 slots, when the duration of each slot is unit that is, in the present embodiment by 60 minutes of exemption Long (being 1 minute in this example), the exemption of each slot count the frequency threshold value (being 20 times in this example) for having oneself predetermined, normally User is exempted in a slot no more than predetermined frequency threshold value, so as to effectively control cheating flow.
Further, the control device of above-mentioned cheating flow can also include:
Add module 45, will be updated after being updated in update module 42 to the value of above-mentioned exemption field It is put back to after exempting field encryption in above-mentioned access request.
Further, the control device of above-mentioned cheating flow can also include:Trigger module 46, field acquisition module 47, Field deciphering module 48, setup module 49 and add module 45;
Wherein, trigger module 46, for after the access request that is sent in 41 receiving terminal apparatus of receiving module, triggering school It tests information server and sends check information input page to above-mentioned terminal device, for using the user of above-mentioned terminal device upper State input validation information in check information input page;In the present embodiment, trigger module 46, specifically for being asked according to above-mentioned access The access times in scheduled duration are sought, determine that the access granularity of above-mentioned access request is greater than or equal to predetermined access granularity threshold After value, triggering check information server sends check information input page to above-mentioned terminal device.
Wherein, above-mentioned scheduled duration can voluntarily be set in specific implementation according to system performance and/or realization demand etc. Fixed, the present embodiment is not construed as limiting the size of above-mentioned scheduled duration, for example, above-mentioned scheduled duration can be 1 minute;It is above-mentioned Predetermined access granularity threshold value can be in specific implementation, according to the sets itselfs such as system performance and/or realization demand, this implementation Example is not construed as limiting the size of above-mentioned predetermined access granularity threshold value, for example, above-mentioned predetermined access granularity threshold value can be with For 20.
It, can be according to above-mentioned access request in pre- timing after receiving module 41 receives access request in the present embodiment Access times in length determine the access granularity of above-mentioned access request, here the access times in scheduled duration with it is above-mentioned pre- The business of timing length is the access granularity of above-mentioned access request.Then, judge whether the access granularity of above-mentioned access request is more than Or equal to predetermined access granularity threshold value, if it is, trigger module 46 triggers check information server to above-mentioned terminal device Send check information input page.
Field acquisition module 47, for determining the check information of above-mentioned terminal device transmission in above-mentioned check information server After verification, the exemption field that above-mentioned check information server adds in above-mentioned access request is obtained;In the present embodiment, Check information server can be identifying code server, check information input page can be identifying code input page, above-mentioned school Testing the check information that information server determines that above-mentioned terminal device is sent can be by verification:Identifying code server determines above-mentioned The identifying code that terminal device is sent passes through verification.
The identifying code of the forms such as picture, word and/or voice may be employed in above-mentioned identifying code, and certain above-mentioned check information is simultaneously A kind of identifying code this form is not limited only to, the check information of other forms can also be used, the present embodiment be not construed as limiting this.
Field deciphering module 48, the exemption field for being obtained to field acquisition module 47 are decrypted;In the present embodiment, The exemption field that above-mentioned check information server adds in above-mentioned access request is encrypted, therefore field acquisition module 47 obtains After taking above-mentioned exemption field, field deciphering module 48 needs the exemption field to acquisition to be decrypted.
During specific implementation, to exempt field be encrypted used by algorithm can be AES-128-CBC with IV, word Section deciphering module 48 needs that the exemption field of acquisition is decrypted using corresponding decipherment algorithm, and the present embodiment adds use Close and decipherment algorithm is not construed as limiting, as long as can be encrypted and decrypted to exempting field.
Setup module 49 is configured for the value to the exemption field after the decryption of field deciphering module 48;The present embodiment In, setup module 49, specifically for set in above-mentioned exemption field above-mentioned user for the first time by the timestamp of identifying code, recently The value that the timestamp and exemption once exempted count.
Wherein, setup module 49 sets the value of the timestamp that above-mentioned user's first time passes through identifying code in above-mentioned exemption field Above-mentioned user in above-mentioned exemption field as is set to above-mentioned user by the value of the timestamp of identifying code for the first time for the first time to lead to The time of identifying code is spent, the value for setting the last timestamp exempted of above-mentioned user in above-mentioned exemption field is to slit above-mentioned The value for exempting from the last timestamp exempted of above-mentioned user in field is set to the above-mentioned user the last time exempted.
Setup module 49 sets the value for exempting counting in above-mentioned exemption field that will as be exempted in above-mentioned exemption field and counts Value be set to predetermined value, wherein, the size of above-mentioned predetermined value can be in specific implementation, according to system performance and/or reality Sets itselfs, the present embodiment such as existing demand are not construed as limiting the size of above-mentioned predetermined value, for example, above-mentioned predetermined value can Think 1.
Further, setup module 49 can also set product line title, the account of above-mentioned user in above-mentioned exemption field The value of mark and the login status of above-mentioned user is configured.
Wherein, the said goods line title is that the requested webpage of above-mentioned access request belongs to which product line, above-mentioned use The account number at family is the mark of the login account of above-mentioned user, and the login status of above-mentioned user is that above-mentioned user is currently The state for logging in or being not logged in.
Add module 45, for being put back to after the exemption field encryption after setup module 49 is set in above-mentioned access request.
In the present embodiment, add module 45 to setup module 49 set after exemption field be encrypted when, using with school The identical Encryption Algorithm of information server is tested the exemption field after setting is encrypted.
In this way, when receiving module 41 receives the above-mentioned access request of terminal device transmission again, above-mentioned access request In will carry and exempt field, in this way, after receiving module 41 receives access request, correction verification module 43 please according to above-mentioned access Exemption verification can be carried out to above-mentioned access request by seeking the value of middle exemption field, and access request need not be sent to the overall situation Global counting is carried out in server, also there is no need to increase external storage engines to store access request, is realized simply, And the handling duration of above-mentioned access request can be reduced, improves user experience.
Fig. 6 is the structure diagram of the application computer equipment one embodiment, as shown in fig. 6, above computer equipment It can include memory, processor and be stored in the computer program that can be run on above-mentioned memory and on above-mentioned processor, When above-mentioned processor performs above computer program, the control method of cheating flow provided by the embodiments of the present application can be realized.
Wherein, above computer equipment can be proxy server, the present embodiment to the form of above computer equipment not It is construed as limiting.
Fig. 6 shows to be used for the block diagram for the exemplary computer device 12 for realizing the application embodiment.Fig. 6 is shown Computer equipment 12 be only an example, any restrictions should not be brought to the function and use scope of the embodiment of the present application.
As shown in fig. 6, computer equipment 12 is showed in the form of universal computing device.The component of computer equipment 12 can be with Including but not limited to:One or more processor or processing unit 16, system storage 28 connect different system component The bus 18 of (including system storage 28 and processing unit 16).
Bus 18 represents the one or more in a few class bus structures, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using the arbitrary bus structures in a variety of bus structures.It lifts For example, these architectures include but not limited to industry standard architecture (Industry Standard Architecture;Hereinafter referred to as:ISA) bus, microchannel architecture (Micro Channel Architecture;Below Referred to as:MAC) bus, enhanced isa bus, Video Electronics Standards Association (Video Electronics Standards Association;Hereinafter referred to as:VESA) local bus and peripheral component interconnection (Peripheral Component Interconnection;Hereinafter referred to as:PCI) bus.
Computer equipment 12 typically comprises various computing systems readable medium.These media can be it is any can be by The usable medium that computer equipment 12 accesses, including volatile and non-volatile medium, moveable and immovable medium.
System storage 28 can include the computer system readable media of form of volatile memory, such as arbitrary access Memory (Random Access Memory;Hereinafter referred to as:RAM) 30 and/or cache memory 32.Computer equipment 12 It may further include other removable/nonremovable, volatile/non-volatile computer system storage mediums.Only conduct Citing, storage system 34 can be used for reading and writing immovable, non-volatile magnetic media, and (Fig. 6 do not show, commonly referred to as " hard disk Driver ").Although it not shown in Fig. 6, can provide for the magnetic to moving non-volatile magnetic disk (such as " floppy disk ") read-write Disk drive and to removable anonvolatile optical disk (such as:Compact disc read-only memory (Compact Disc Read Only Memory;Hereinafter referred to as:CD-ROM), digital multi read-only optical disc (Digital Video Disc Read Only Memory;Hereinafter referred to as:DVD-ROM) or other optical mediums) read-write CD drive.In these cases, each driving Device can be connected by one or more data media interfaces with bus 18.Memory 28 can include at least one program and produce Product, the program product have one group of (for example, at least one) program module, and it is each that these program modules are configured to perform the application The function of embodiment.
Program/utility 40 with one group of (at least one) program module 42 can be stored in such as memory 28 In, such program module 42 includes --- but being not limited to --- operating system, one or more application program, other programs Module and program data may include the realization of network environment in each or certain combination in these examples.Program mould Block 42 usually performs function and/or method in embodiments described herein.
Computer equipment 12 can also be with one or more external equipments 14 (such as keyboard, sensing equipment, display 24 Deng) communication, the equipment interacted with the computer equipment 12 communication can be also enabled a user to one or more and/or with making Obtain any equipment that the computer equipment 12 can communicate with one or more of the other computing device (such as network interface card, modulatedemodulate Adjust device etc.) communication.This communication can be carried out by input/output (I/O) interface 22.Also, computer equipment 12 may be used also To pass through network adapter 20 and one or more network (such as LAN (Local Area Network;Hereinafter referred to as: LAN), wide area network (Wide Area Network;Hereinafter referred to as:WAN) and/or public network, for example, internet) communication.Such as figure Shown in 6, network adapter 20 is communicated by bus 18 with other modules of computer equipment 12.It should be understood that although in Fig. 6 not It shows, computer equipment 12 can be combined and use other hardware and/or software module, included but not limited to:Microcode, equipment are driven Dynamic device, redundant processing unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
Processing unit 16 is stored in program in system storage 28 by operation, so as to perform various functions application and Data processing, such as realize the control method of cheating flow provided by the embodiments of the present application.
The application also provides a kind of non-transitorycomputer readable storage medium, is stored thereon with computer program, above-mentioned The control method of cheating flow provided by the embodiments of the present application is realized when computer program is executed by processor.
Appointing for one or more computer-readable media may be employed in above-mentioned non-transitorycomputer readable storage medium Meaning combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.Computer can It reads storage medium and for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device Or device or arbitrary above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: Electrical connection, portable computer diskette, hard disk, random access memory (RAM), read-only storage with one or more conducting wires Device (Read Only Memory;Hereinafter referred to as:ROM), erasable programmable read only memory (Erasable Programmable Read Only Memory;Hereinafter referred to as:EPROM) or flash memory, optical fiber, portable compact disc are read-only deposits Reservoir (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer Readable storage medium storing program for executing can be any tangible medium for including or storing program, which can be commanded execution system, device Either device use or in connection.
Computer-readable signal media can include in a base band or as carrier wave a part propagation data-signal, Wherein carry computer-readable program code.Diversified forms may be employed in the data-signal of this propagation, including --- but It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be Any computer-readable medium beyond computer readable storage medium, which can send, propagate or Transmission for by instruction execution system, device either device use or program in connection.
The program code included on computer-readable medium can be transmitted with any appropriate medium, including --- but it is unlimited In --- wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
It can be with one or more programming languages or its computer for combining to write to perform the application operation Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with It fully performs, partly perform on the user computer on the user computer, the software package independent as one performs, portion Divide and partly perform or perform on a remote computer or server completely on the remote computer on the user computer. It is related in the situation of remote computer, remote computer can pass through the network of any kind --- including LAN (Local Area Network;Hereinafter referred to as:) or wide area network (Wide Area Network LAN;Hereinafter referred to as:WAN) it is connected to user Computer or, it may be connected to outer computer (such as passing through Internet connection using ISP).
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms is not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It is combined in an appropriate manner in one or more embodiments or example.In addition, without conflicting with each other, the skill of this field Art personnel can tie the different embodiments described in this specification or example and different embodiments or exemplary feature It closes and combines.
In addition, term " first ", " second " are only used for description purpose, and it is not intended that instruction or hint relative importance Or the implicit quantity for indicating indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present application, " multiple " are meant that at least two, such as two, three It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include Module, segment or the portion of the code of the executable instruction of one or more the step of being used to implement custom logic function or process Point, and the scope of the preferred embodiment of the application includes other realization, wherein can not press shown or discuss suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be by the application Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction Row system, device or equipment instruction fetch and the system executed instruction) it uses or combines these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass Defeated program is for instruction execution system, device or equipment or the dress used with reference to these instruction execution systems, device or equipment It puts.The more specific example (non-exhaustive list) of computer-readable medium includes following:Electricity with one or more wiring Connecting portion (electronic device), portable computer diskette box (magnetic device), random access memory (Random Access Memory;Hereinafter referred to as:RAM), read-only memory (Read Only Memory;Hereinafter referred to as:ROM), erasable editable Read memory (Erasable Programmable Read Only Memory;Hereinafter referred to as:EPROM) or flash memory, Fiber device and portable optic disk read-only storage (Compact Disc Read Only Memory;Hereinafter referred to as:CD- ROM).In addition, computer-readable medium can even is that the paper or other suitable media that can print described program on it, because For can be then suitable with other into edlin, interpretation or if necessary for example by carrying out optical scanner to paper or other media Mode is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each several part of the application can be realized with hardware, software, firmware or combination thereof.Above-mentioned In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage Or firmware is realized.Such as, if realized with hardware in another embodiment, following skill well known in the art can be used Any one of art or their combination are realized:With for data-signal realize logic function logic gates from Logic circuit is dissipated, the application-specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (Programmable Gate Array;Hereinafter referred to as:PGA), field programmable gate array (Field Programmable Gate Array;Below Referred to as:FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium In matter, the program upon execution, one or a combination set of the step of including embodiment of the method.
In addition, each functional unit in each embodiment of the application can be integrated in a processing module, it can also That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould The form that hardware had both may be employed in block is realized, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and is independent production marketing or in use, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although it has been shown and retouches above Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, it is impossible to be interpreted as the limit to the application System, those of ordinary skill in the art can be changed above-described embodiment, change, replace and become within the scope of application Type.

Claims (18)

1. a kind of control method for flow of practising fraud, which is characterized in that including:
The access request that receiving terminal apparatus is sent;
If the access request includes exempting field, the value of the exemption field is updated;
Exemption verification is carried out to the access request according to the value of updated exemption field;
If the access request does not verify by exempting, refuse the access request.
2. according to the method described in claim 1, it is characterized in that, the value according to updated exemption field is to the visit After asking that request carries out exemption verification, further include:
If the access request is verified by exempting, the access request is allowed to continue to access.
3. method according to claim 1 or 2, which is characterized in that the value to the exemption field is updated bag It includes:
Obtain the exemption field in the access request;
The exemption field is decrypted;
Exemption in exemption field after decryption is counted and the value of the last timestamp exempted is updated.
4. according to the method described in claim 3, it is characterized in that, the value according to updated exemption field is to the visit Asking that request exempt verifying includes:
The value of timestamp and the timestamp of the last exemption of identifying code will be passed through in updated exemption field for the first time Value is compared respectively with current time;
The access request is not included by exempting verification:The value for the timestamp that current time passes through identifying code with the first time Compared to the duration threshold value more than or equal to setting;
If current time is less than the duration threshold value of setting compared with the first time is by the value of the timestamp of identifying code, and Current time is greater than or equal to the unit of setting compared with the value of the last timestamp exempted in updated exemption field Whether duration, the then value for judging to exempt counting in updated exemption field are more than predetermined frequency threshold value;
The access request is not included by exempting verification:The value that counting is exempted in updated exemption field is more than predetermined time Number threshold value.
5. according to the method described in claim 3, it is characterized in that, it is described to it is described exemption field value be updated after, It further includes:
It will be put back to after updated exemption field encryption in the access request.
6. method according to claim 1 or 2, which is characterized in that the access request that the receiving terminal apparatus is sent it Afterwards, further include:
It triggers check information server and sends check information input page to the terminal device, for using the terminal device User in the check information input page input validation information;
After the check information server determines check information that the terminal device sends by verification, the school is obtained Test the exemption field that information server adds in the access request;
The exemption field of acquisition is decrypted;
The value of exemption field after decryption is configured;
It will be put back to after exemption field encryption after setting in the access request.
7. according to the method described in claim 6, it is characterized in that, the value of the exemption field after described pair of decryption is configured bag It includes:
Set user described in the exemption field for the first time by the timestamp of identifying code, the last timestamp exempted and Exempt the value counted.
8. according to the method described in claim 6, it is characterized in that, the check information server that triggers is to the terminal device Sending check information input page includes:
According to access times of the access request in scheduled duration, determine that the access granularity of the access request is more than or waits After predetermined access granularity threshold value, triggering check information server sends check information incoming page to the terminal device Face.
9. a kind of control device for flow of practising fraud, which is characterized in that including:
Receiving module, the access request sent for receiving terminal apparatus;
Update module, when the access request for being received when the receiving module includes exempting field, to the exemption field Value be updated;
Correction verification module, for carrying out exemption school to the access request according to the updated value for exempting field of the update module It tests;
Control module, for when the correction verification module determines that the access request does not verify by exempting, refusing the access Request.
10. device according to claim 9, which is characterized in that
The control module is additionally operable to when the correction verification module determines that the access request is verified by exempting, described in permission Access request continues to access.
11. the device according to claim 9 or 10, which is characterized in that the update module includes:
Acquisition submodule, for obtaining the exemption field in the access request;
Submodule is decrypted, for the exemption field to be decrypted;
Field update submodule is exempted, for the exemption counting in the exemption field after the decryption submodule decryption and recently The value for the timestamp once exempted is updated.
12. according to the devices described in claim 11, which is characterized in that the correction verification module includes:
Comparison submodule, for value and the last time of the timestamp of identifying code will to be passed through in updated exemption field for the first time The value of the timestamp of exemption is compared respectively with current time;
The access request is not included by exempting verification:The value for the timestamp that current time passes through identifying code with the first time Compared to the duration threshold value more than or equal to setting;
Judging submodule, at current time with the first time by the value of the timestamp of identifying code compared be less than setting Duration threshold value, and current time be more than or wait compared with the value of the last timestamp exempted in updated exemption field When the unit time of setting, whether the value for judging to exempt counting in updated exemption field is more than predetermined frequency threshold value;
The access request is not included by exempting verification:The value that counting is exempted in updated exemption field is more than predetermined time Number threshold value.
13. according to the devices described in claim 11, which is characterized in that further include:
Add module, after being updated in the update module to the value of the exemption field, by updated exemption It is put back to after field encryption in the access request.
14. the device according to claim 9 or 10, which is characterized in that further include:
Trigger module, for after the access request that is sent in the receiving module receiving terminal apparatus, triggering check information clothes Device be engaged in terminal device transmission check information input page, for using the user of the terminal device in the verification letter Cease input validation information in input page;
Field acquisition module, for determining the check information of the terminal device transmission by testing in the check information server After card, the exemption field that the check information server adds in the access request is obtained;
Field deciphering module, the exemption field for being obtained to the field acquisition module are decrypted;
Setup module is configured for the value to the exemption field after field deciphering module decryption;
Add module, for will be put back to after the exemption field encryption after setup module setting in the access request.
15. device according to claim 14, which is characterized in that
The setup module, specifically for set it is described exempt user described in field for the first time by the timestamp of identifying code, The timestamp and exempt the value counted that the last time exempts.
16. device according to claim 14, which is characterized in that
The trigger module specifically for the access times according to the access request in scheduled duration, determines the access The access granularity of request is greater than or equal to after predetermined access granularity threshold value, and triggering check information server is set to the terminal Preparation send check information input page.
17. a kind of computer equipment, which is characterized in that including memory, processor and be stored on the memory and can be The computer program run on the processor when the processor performs the computer program, realizes such as claim 1-8 In any method.
18. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer program, which is characterized in that the meter The method as described in any in claim 1-8 is realized when calculation machine program is executed by processor.
CN201711347752.5A 2017-12-15 2017-12-15 Control method and device for cheating flow and computer equipment Active CN108111501B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711347752.5A CN108111501B (en) 2017-12-15 2017-12-15 Control method and device for cheating flow and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711347752.5A CN108111501B (en) 2017-12-15 2017-12-15 Control method and device for cheating flow and computer equipment

Publications (2)

Publication Number Publication Date
CN108111501A true CN108111501A (en) 2018-06-01
CN108111501B CN108111501B (en) 2021-08-20

Family

ID=62216253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711347752.5A Active CN108111501B (en) 2017-12-15 2017-12-15 Control method and device for cheating flow and computer equipment

Country Status (1)

Country Link
CN (1) CN108111501B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981779A (en) * 2019-03-27 2019-07-05 掌阅科技股份有限公司 Service providing method, server and computer storage medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753315A (en) * 2008-11-27 2010-06-23 百度在线网络技术(北京)有限公司 Method, device and system for testing DDOS (distributed denial of service) attacks
CN102739683A (en) * 2012-06-29 2012-10-17 杭州迪普科技有限公司 Network attack filtering method and device
US20130238799A1 (en) * 2010-11-01 2013-09-12 Kamome Engineering, Inc. Access control method, access control apparatus, and access control program
CN103475637A (en) * 2013-04-24 2013-12-25 携程计算机技术(上海)有限公司 Network access control method and system based on IP access behaviors
CN104079557A (en) * 2014-05-22 2014-10-01 汉柏科技有限公司 CC attack protection method and device
US20140304798A1 (en) * 2013-04-06 2014-10-09 Citrix Systems, Inc. Systems and methods for http-body dos attack prevention with adaptive timeout
CN104333529A (en) * 2013-07-22 2015-02-04 中国电信股份有限公司 Detection method and system of HTTP DOS (Denial of Service) attack under cloud computing environment
CN104519018A (en) * 2013-09-29 2015-04-15 阿里巴巴集团控股有限公司 Method, device and system for preventing malicious requests for server
CN104580154A (en) * 2014-12-09 2015-04-29 上海斐讯数据通信技术有限公司 Web service security access method, system and corresponding server
CN104660552A (en) * 2013-11-20 2015-05-27 南京理工高新技术发展有限公司 Wireless local area network (WLAN) intrusion detection system
CN105763390A (en) * 2014-12-16 2016-07-13 中兴通讯股份有限公司 Abnormal network flow detection and control method, apparatus and system thereof
CN106657141A (en) * 2017-01-19 2017-05-10 西安电子科技大学 Android malware real-time detection method based on network flow analysis
CN106789834A (en) * 2015-11-20 2017-05-31 中国电信股份有限公司 Method, gateway, PCRF network elements and system for identifying user identity
US20170214657A1 (en) * 2016-01-22 2017-07-27 Cisco Technology, Inc. DHCP Client Lease Time Based Threat Detection for Authorised Users
CN107463808A (en) * 2017-07-10 2017-12-12 北京小鸟看看科技有限公司 The call method for the functional module being integrated in operating system

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753315A (en) * 2008-11-27 2010-06-23 百度在线网络技术(北京)有限公司 Method, device and system for testing DDOS (distributed denial of service) attacks
US20130238799A1 (en) * 2010-11-01 2013-09-12 Kamome Engineering, Inc. Access control method, access control apparatus, and access control program
CN102739683A (en) * 2012-06-29 2012-10-17 杭州迪普科技有限公司 Network attack filtering method and device
US20150281272A1 (en) * 2013-04-06 2015-10-01 Citrix Systems, Inc. Systems and methods for http-body dos attack prevention with adaptive timeout
US20140304798A1 (en) * 2013-04-06 2014-10-09 Citrix Systems, Inc. Systems and methods for http-body dos attack prevention with adaptive timeout
CN103475637A (en) * 2013-04-24 2013-12-25 携程计算机技术(上海)有限公司 Network access control method and system based on IP access behaviors
CN104333529A (en) * 2013-07-22 2015-02-04 中国电信股份有限公司 Detection method and system of HTTP DOS (Denial of Service) attack under cloud computing environment
CN104519018A (en) * 2013-09-29 2015-04-15 阿里巴巴集团控股有限公司 Method, device and system for preventing malicious requests for server
CN104660552A (en) * 2013-11-20 2015-05-27 南京理工高新技术发展有限公司 Wireless local area network (WLAN) intrusion detection system
CN104079557A (en) * 2014-05-22 2014-10-01 汉柏科技有限公司 CC attack protection method and device
CN104580154A (en) * 2014-12-09 2015-04-29 上海斐讯数据通信技术有限公司 Web service security access method, system and corresponding server
CN105763390A (en) * 2014-12-16 2016-07-13 中兴通讯股份有限公司 Abnormal network flow detection and control method, apparatus and system thereof
CN106789834A (en) * 2015-11-20 2017-05-31 中国电信股份有限公司 Method, gateway, PCRF network elements and system for identifying user identity
US20170214657A1 (en) * 2016-01-22 2017-07-27 Cisco Technology, Inc. DHCP Client Lease Time Based Threat Detection for Authorised Users
CN106657141A (en) * 2017-01-19 2017-05-10 西安电子科技大学 Android malware real-time detection method based on network flow analysis
CN107463808A (en) * 2017-07-10 2017-12-12 北京小鸟看看科技有限公司 The call method for the functional module being integrated in operating system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
宗兆伟等: "基于统计分析和流量控制的DNS分布式拒绝服务攻击的检测及防御", 《2009全国计算机网络与通信学术会议》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981779A (en) * 2019-03-27 2019-07-05 掌阅科技股份有限公司 Service providing method, server and computer storage medium
CN109981779B (en) * 2019-03-27 2022-02-22 掌阅科技股份有限公司 Service providing method, server and computer storage medium

Also Published As

Publication number Publication date
CN108111501B (en) 2021-08-20

Similar Documents

Publication Publication Date Title
CN108021805A (en) Detect method, apparatus, equipment and the storage medium of Android application program running environment
CN110515678B (en) Information processing method, equipment and computer storage medium
US9363256B2 (en) User authentication in separate authentication channels
CN104519050B (en) Login method and login system
JP2021522595A (en) Cryptographic cards, electronic devices, and cryptographic service methods
CN104468592B (en) Login method and login system
US20070150818A1 (en) Remote control device and method
CN109873735A (en) Performance test methods, device and the computer equipment of the H5 page
CN109213611A (en) The striding course means of communication, device, terminal and storage medium
CN106911687A (en) A kind of page makeup control method and device
CN106375465B (en) A kind of data migration method and server
WO2016014346A1 (en) Point of sale system with secure and unsecure modes
CN107395670A (en) Information push method, device, equipment and computer-readable recording medium
CN108449321A (en) Login method, server and client side
CN107423055A (en) Method, apparatus, equipment and the storage medium of adaptive terminal device resolution
CN108900562B (en) Login state sharing method and device, electronic equipment and medium
CN104091102B (en) A kind of multi-user management method and its device based on Android system
CN107729768A (en) A kind of page display method, device, Intelligent flat and storage medium
CN108712299A (en) A kind of method, apparatus, equipment and the computer storage media of monitoring live streaming delay
US9430424B2 (en) Universal serial bus (USB) device access from one or more virtual machines
CN104303172A (en) Creating a web proxy inside a browser
CN106776039A (en) A kind of data processing method and device
CN112308236A (en) Method, device, electronic equipment and storage medium for processing user request
CN109359449A (en) A kind of method for authenticating based on micro services, device, server and storage medium
US10853526B2 (en) Dynamic screen filtering

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant