CN108306859A - Method, equipment and the computer readable storage medium of limiting server visit capacity - Google Patents
Method, equipment and the computer readable storage medium of limiting server visit capacity Download PDFInfo
- Publication number
- CN108306859A CN108306859A CN201711444298.5A CN201711444298A CN108306859A CN 108306859 A CN108306859 A CN 108306859A CN 201711444298 A CN201711444298 A CN 201711444298A CN 108306859 A CN108306859 A CN 108306859A
- Authority
- CN
- China
- Prior art keywords
- access
- server
- terminal
- information
- accessed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
Abstract
The present invention proposes a kind of method of limiting server visit capacity, including:According to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined;When any terminal accesses the server, according to the characteristic information of any terminal, it is limited with the maximum access times, the access limited number of times that any terminal is accessed to the server in current access cycle is set as setting access value.The invention also discloses a kind of equipment and computer readable storage medium of limiting server visit capacity, and by implementing said program, the additional server expense that can effectively avoid malicious access server from bringing realizes effective control to server resource.
Description
Technical field
The present invention relates to server technology field more particularly to a kind of method, equipment and the meters of limiting server visit capacity
Calculation machine readable storage medium storing program for executing.
Background technology
Due to the timeliness of classification information in website, many websites are all using capturing in other websites by the way of classification information
Go to update the classification information of this website.The volume of Website server can be brought to the fallacious message grasping manipulation of classification information in website
Overhead even results in Website server paralysis.Since the information scratching of Website server None- identified malice operates, lead to nothing
Method accomplishes effectively to intercept to the information scratching operation of malice, can not ensure the normal access operation of user, can not be to website service
Device resource carries out effectively save control.Therefore website effectively judges that the operation for accessing the website is the normal access behaviour of user
Make or the operation of the information scratching of other websites is particularly important.
Under the premise of preventing the information scratching of other websites from operating, ensure the normal access behaviour of user to greatest extent
Make, is the core index of Website server.The prior art is to prevent the information scratching of other websites from operating, and protect to greatest extent
The normal access operation for demonstrate,proving user, generally according to User IP (Internet Protocol, the agreement interconnected between network) address
Information limits user in the access times for setting the access Website server in access cycle, but information crawler is logical
It can often use proxy server to replace IP address information and access Website server, to evade Website server to IP address information
Access limitation.
Invention content
The present invention provides a kind of method, equipment and the computer readable storage medium of limiting server visit capacity, has solved
Website server cannot operate the problem of controling effectively to the information scratching of malice in the prior art.
The technical solution adopted by the present invention is to provide a kind of method of limiting server visit capacity, including:
According to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined;
When any terminal accesses the server, according to the characteristic information of any terminal, with the maximum access
Number is limited, and the access limited number of times that any terminal is accessed to the server in current access cycle is set as setting
Access value;
Wherein, the characteristic information includes at least one of following information:The logon information of any terminal and described
The current location information of any terminal.
Optionally, the characteristic information according to any terminal is limited with the maximum access times, described will be appointed
The access limited number of times that one terminal accesses the server in current access cycle is set as setting access value, including:
In the case where the characteristic information includes the logon information, any end is judged based on the logon information
Whether end has logged in the server;
If so, be limited with the maximum access times, any terminal is accessed in current access cycle described in
The access limited number of times of server is set as the first access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as
Second access value;
Wherein, first access value is more than second access value.
Optionally, the characteristic information according to any terminal is limited with the maximum access times, described will be appointed
The access limited number of times that one terminal accesses the server in current access cycle is set as setting access value, including:
In the case where the characteristic information includes the current location information, any terminal current accessed institute is obtained
State the information releasing position information that the information in server includes;
Judge the current location information with described information releasing position information whether in the territorial scope of setting;
If so, be limited with the maximum access times, any terminal is accessed in current access cycle described in
The access limited number of times of server is set as third access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as
4th access value;
Wherein, the third access value is more than the 4th access value.
Optionally, the method further includes:
Obtain any terminal accessed in current access cycle the server the first access times and described
One terminal accessed the second access times of the server within a upper access cycle;
In the case where first access times are more than given threshold than the growth rate of second access times, to institute
It states any terminal and sends verification information, the server is accessed so that any terminal is based on the verification information.
Optionally, after sending verification information to any terminal, the method further includes:
When monitoring that any terminal is not based on the verification information access server within the set duration, prohibit
Only any terminal accesses the server, and sends authentication failed information to any terminal.
The present invention also provides a kind of equipment of limiting server visit capacity, and the equipment includes processor and memory;
The processor is used to execute the program of the limiting server visit capacity stored in memory, to realize following step
Suddenly:
According to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined;
When any terminal accesses the server, according to the characteristic information of any terminal, with the maximum access
Number is limited, and the access limited number of times that any terminal is accessed to the server in current access cycle is set as setting
Access value;
Wherein, the characteristic information includes at least one of following information:The logon information of any terminal and described
The current location information of any terminal.
Optionally, the characteristic information according to any terminal is limited with the maximum access times, described will be appointed
The access limited number of times that one terminal accesses the server in current access cycle is set as setting access value, including:
In the case where the characteristic information includes the logon information, any end is judged based on the logon information
Whether end has logged in the server;
If so, be limited with the maximum access times, any terminal is accessed in current access cycle described in
The access limited number of times of server is set as the first access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as
Second access value;
Wherein, first access value is more than second access value.
Optionally, the characteristic information according to any terminal is limited with the maximum access times, described will be appointed
The access limited number of times that one terminal accesses the server in current access cycle is set as setting access value, including:
In the case where the characteristic information includes the current location information, any terminal current accessed institute is obtained
State the information releasing position information that the information in server includes;
Judge the current location information with described information releasing position information whether in the territorial scope of setting;
If so, be limited with the maximum access times, any terminal is accessed in current access cycle described in
The access limited number of times of server is set as third access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as
4th access value;
Wherein, the third access value is more than the 4th access value.
Optionally, the processor is additionally operable to execute the program of the limiting server visit capacity stored in memory, with reality
Existing following steps:
Obtain any terminal accessed in current access cycle the server the first access times and described
One terminal accessed the second access times of the server within a upper access cycle;
In the case where first access times are more than given threshold than the growth rate of second access times, to institute
It states any terminal and sends verification information, the server is accessed so that any terminal is based on the verification information.
Optionally, after the transmission verification information to any terminal, the processor is additionally operable to execute storage
The program of the limiting server visit capacity stored in device, to realize following steps:
When monitoring that any terminal is not based on the verification information access server within the set duration, prohibit
Only any terminal accesses the server, and sends authentication failed information to any terminal.
The present invention also provides a kind of computer readable storage medium, there are one the computer-readable recording medium storages
Or multiple programs, one or more of programs can be executed by one or more processor, to realize that above-mentioned limitation takes
The step of method for device visit capacity of being engaged in.
Using above-mentioned technical proposal, the present invention at least has following advantages:
Method, equipment and the computer readable storage medium of a kind of limiting server visit capacity of the present invention, Neng Gouyou
The effective control for avoiding the additional server expense that malicious access server is brought, realizing to server resource of effect.
Description of the drawings
Fig. 1 is the method flow diagram of the limiting server visit capacity of first to fourth embodiment of the invention;
Fig. 2 is the method flow diagram of the limiting server visit capacity of fifth embodiment of the invention;
Fig. 3 is the method flow diagram of the limiting server visit capacity of sixth embodiment of the invention;
Fig. 4 is that the equipment of the access server of the 7th to the 12nd embodiment of the invention forms structural schematic diagram;
Fig. 5 is the method flow diagram of the limiting server visit capacity of fourteenth embodiment of the invention.
Specific implementation mode
Further to illustrate the present invention to reach the technological means and effect that predetermined purpose is taken, below in conjunction with attached drawing
And preferred embodiment, the present invention is described in detail as after.
First embodiment of the invention, a kind of method of limiting server visit capacity, as shown in Figure 1, including walking in detail below
Suddenly:
Step S101 determines that setting interior the maximum of server that access access cycle accesses according to the configuration information of server
Number.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server,
And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes
It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory,
And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server
Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server
Quantity can also be multiple.
Step S102, when any terminal accesses server, according to the characteristic information of any terminal, with maximum access times
It is limited, the access limited number of times that any terminal is accessed to server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal
Front position information.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed
Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter
The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer
Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having
Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The method of limiting server visit capacity described in first embodiment of the invention, effectively can avoid malicious access from taking
The additional server expense that business device is brought, realizes effective control to server resource.
Second embodiment of the invention, a kind of method of limiting server visit capacity, as shown in Figure 1, including walking in detail below
Suddenly:
Step S101 determines that setting interior the maximum of server that access access cycle accesses according to the configuration information of server
Number.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server,
And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes
It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory,
And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server
Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server
Quantity can also be multiple.
Step S102, when any terminal accesses server, according to the characteristic information of any terminal, with maximum access times
It is limited, the access limited number of times that any terminal is accessed to server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal
Front position information.
Optionally, step S102, including:
Include the feelings of the logon information of any terminal in the characteristic information of any terminal when any terminal accesses server
Under condition, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then be limited with maximum access times, by any terminal in current accessed
The access limited number of times that server is accessed in period is set as the first access value;
If it is determined that any terminal is not logged in server, then any terminal is accessed to the visit of server in current access cycle
Ask that limited number of times is set as the second access value;
Wherein, the first access value is more than the second access value.
Such as:Include that any terminal logs in letter in the characteristic information of any terminal when any terminal accesses server
In the case of breath, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then it is limited for 50 times with maximum access times, by any terminal current
The access limited number of times that server is accessed in 10 minutes access cycles is set as the first access value 40 times;
If it is determined that any terminal is not logged in server, then any terminal is accessed in current access cycle in 10 minutes and serviced
The access limited number of times of device is set as the second access value 30 times.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed
Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter
The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer
Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having
Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The method of limiting server visit capacity described in second embodiment of the invention, effectively can avoid malicious access from taking
The additional server expense that business device is brought, realizes effective control to server resource.
Third embodiment of the invention, a kind of method of limiting server visit capacity, as shown in Figure 1, including walking in detail below
Suddenly:
Step S101 determines that setting interior the maximum of server that access access cycle accesses according to the configuration information of server
Number.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server,
And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes
It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory,
And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server
Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server
Quantity can also be multiple.
Step S102, when any terminal accesses server, according to the characteristic information of any terminal, with maximum access times
It is limited, the access limited number of times that any terminal is accessed to server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal
Front position information.
Optionally, step S102, including:
Include the current location information of any terminal in the characteristic information of any terminal when any terminal accesses server
In the case of, obtain the information releasing position information that the information in any terminal current accessed server includes;
Judge current location information with information releasing position information whether in the territorial scope of setting;
If it is determined that current location information and information releasing position information in the territorial scope of setting, are then accessed secondary with maximum
Number is limited, and the access limited number of times that any terminal is accessed to server in current access cycle is set as third access value;
If it is determined that current location information and information releasing position information is in the territorial scope of setting, then by any terminal
The access limited number of times that server is accessed in current access cycle is set as the 4th access value;
Wherein, third access value is more than the 4th access value.
Such as:Include the present bit of any terminal in the characteristic information of any terminal when any terminal accesses server
In the case that confidence ceases (Fengtai District, Beijing City), the information publication that the information in any terminal current accessed server includes is obtained
Location information (Haidian District, Beijing City);
Judge current location information (Fengtai District, Beijing City) and information releasing position information (Haidian District, Beijing City) whether
In the territorial scope (Beijing) of setting;
It is being set with information releasing position information (Haidian District, Beijing City) in judgement current location information (Fengtai District, Beijing City)
In the case of in fixed territorial scope (Beijing), then it is limited with maximum access times, by any terminal in current access cycle
The access limited number of times that server is accessed in 10 minutes is set as third access value 25 times.
For another example:Include the present bit of any terminal in the characteristic information of any terminal when any terminal accesses server
In the case that confidence ceases (Tianjin), the information releasing position letter that the information in any terminal current accessed server includes is obtained
It ceases (Haidian District, Beijing City);
Judge current location information (Tianjin) with information releasing position information (Haidian District, Beijing City) whether in setting
In territorial scope (Beijing);
In judgement current location information (Tianjin) with information releasing position information (Haidian District, Beijing City) not in setting
In the case of in territorial scope (Beijing), the access that any terminal is accessed in current access cycle in 10 minutes to server limits
Number processed is set as the 4th access value 15 times.
Optionally, the current location information of any terminal, including but not limited to:
The current IP address (Internet Protocol, the agreement interconnected between network) of any terminal is corresponding current
Location information;
Work as alternatively, the current MAC address (Media Access Control, media access control) of any terminal is corresponding
Front position information;
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed
Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter
The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer
Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having
Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The method of limiting server visit capacity described in third embodiment of the invention, effectively can avoid malicious access from taking
The additional server expense that business device is brought, realizes effective control to server resource.
Fourth embodiment of the invention, a kind of method of limiting server visit capacity, as shown in Figure 1, including walking in detail below
Suddenly:
Step S101 determines that setting interior the maximum of server that access access cycle accesses according to the configuration information of server
Number.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server,
And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes
It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory,
And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server
Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server
Quantity can also be multiple.
Step S102, when any terminal accesses server, according to the characteristic information of any terminal, with maximum access times
It is limited, the access limited number of times that any terminal is accessed to server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal
Front position information.
Optionally, step S102, including:
The characteristic information of any terminal includes:The logon information of any terminal and the current location information of any terminal;
When any terminal accesses server, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then be limited with maximum access times, by any terminal in current accessed
The access limited number of times that server is accessed in period is set as the first access value;
If it is determined that any terminal is not logged in server, then any terminal is accessed to the visit of server in current access cycle
Ask that limited number of times is set as the second access value;Wherein, the first access value is more than the second access value;
Obtain the information releasing position information that the information in any terminal current accessed server includes;
Judge current location information with information releasing position information whether in the territorial scope of setting;
If it is determined that current location information and information releasing position information in the territorial scope of setting, are then accessed secondary with maximum
Number is limited, and the access limited number of times that any terminal is accessed to server in current access cycle is set as third access value;
If it is determined that current location information and information releasing position information is in the territorial scope of setting, then by any terminal
The access limited number of times that server is accessed in current access cycle is set as the 4th access value;Wherein, third access value is more than
4th access value;
Optionally, the second access value is more than third access value.
Such as:The characteristic information of any terminal includes:The logon information of any terminal and the current location of any terminal
Information;
When any terminal accesses server, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then it is limited for 50 times with maximum access times, by any terminal current
The access limited number of times that server is accessed in 15 minutes access cycles is set as the first access value 50 times;
If it is determined that any terminal is not logged in server, then any terminal is accessed in current access cycle in 15 minutes and serviced
The access limited number of times of device is set as the second access value 30 times;
Obtain information releasing position information (Beijing Haidian that the information in any terminal current accessed server includes
Area);
Whether the current location information and information releasing position information (Haidian District, Beijing City) for judging any terminal are setting
Region (Beijing) range in;
If it is determined that current location information (such as Fengtai District, Beijing City) and information releasing position information (Haidian District, Beijing City)
In region (Beijing) range of setting, then it is limited for 50 times with maximum access times, by any terminal in current access cycle
The access limited number of times that server is accessed in 15 minutes is set as third access value 25 times;
If it is determined that current location information (such as Tianjin) is not being set with information releasing position information (Haidian District, Beijing City)
In fixed region (Beijing) range, then the access that any terminal is accessed to server in current access cycle 15 minutes limits
Number is set as the 4th access value 15 times.
Optionally, the current location information of any terminal, including but not limited to:
The current IP address (Internet Protocol, the agreement interconnected between network) of any terminal is corresponding current
Location information;
Work as alternatively, the current MAC address (Media Access Control, media access control) of any terminal is corresponding
Front position information;
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed
Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter
The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer
Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having
Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The method of limiting server visit capacity described in fourth embodiment of the invention, effectively can avoid malicious access from taking
The additional server expense that business device is brought, realizes effective control to server resource.
Fifth embodiment of the invention, a kind of method of limiting server visit capacity, as shown in Fig. 2, including walking in detail below
Suddenly:
Step S501 determines that setting interior the maximum of server that access access cycle accesses according to the configuration information of server
Number.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server,
And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes
It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory,
And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server
Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server
Quantity can also be multiple.
Step S502, when any terminal accesses server, according to the characteristic information of any terminal, with maximum access times
It is limited, the access limited number of times that any terminal is accessed to server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal
Front position information.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed
Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter
The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer
Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having
Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
Step S503 obtains any terminal and accesses the first access times of server and any in current access cycle
Terminal accessed the second access times of server within a upper access cycle;
In the case where the first access times are more than given threshold than the growth rate of the second access times, sent out to any terminal
Verification information is sent, server is accessed so that any terminal is based on verification information.
Such as:It obtains any terminal and accesses the first access times 80 times of server and any in current access cycle
Terminal accessed the second access times 40 times of server within a upper access cycle;
In the case where the first access times are more than given threshold 50% than the growth rate 100% of the second access times, to
Any terminal sends verification information, and server is accessed so that any terminal is based on verification information.
The method of limiting server visit capacity described in fifth embodiment of the invention, effectively can avoid malicious access from taking
The additional server expense that business device is brought, realizes effective control to server resource.
Sixth embodiment of the invention, a kind of method of limiting server visit capacity, as shown in figure 3, including walking in detail below
Suddenly:
Step S601 determines that setting interior the maximum of server that access access cycle accesses according to the configuration information of server
Number.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server,
And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes
It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory,
And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server
Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server
Quantity can also be multiple.
Step S602, when any terminal accesses server, according to the characteristic information of any terminal, with maximum access times
It is limited, the access limited number of times that any terminal is accessed to server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal
Front position information.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed
Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter
The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer
Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having
Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
Step S603 obtains any terminal and accesses the first access times of server and any in current access cycle
Terminal accessed the second access times of server within a upper access cycle;
In the case where the first access times are more than given threshold than the growth rate of the second access times, sent out to any terminal
Verification information is sent, server is accessed so that any terminal is based on verification information.
Such as:It obtains any terminal and accesses the first access times 80 times of server and any in current access cycle
Terminal accessed the second access times 40 times of server within a upper access cycle;
In the case where the first access times are more than given threshold 50% than the growth rate 100% of the second access times, to
Any terminal sends verification information, and server is accessed so that any terminal is based on verification information.
Step S604 forbids when monitoring that any terminal is not based on verification information access server within the set duration
Any terminal accesses server, and sends authentication failed information to any terminal.
The method of limiting server visit capacity described in sixth embodiment of the invention, effectively can avoid malicious access from taking
The additional server expense that business device is brought, realizes effective control to server resource.
Seventh embodiment of the invention, a kind of equipment of limiting server visit capacity, as shown in figure 4, including consisting of portion
Point:
Processor 701 and memory 702.In some embodiments of the invention, processor 701 and memory 702 can lead to
Cross bus or other manner connection.
Processor 701 can be general processor, such as central processing unit (Central Processing Unit,
CPU), it can also be digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (English:
Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention
One or more integrated circuits.Wherein, memory 702 is used to store the executable instruction of processor 701;
Memory 702 is transferred to processor 701 for storing program code, and by the program code.Memory 702 can
To include volatile memory (Volatile Memory), such as random access memory (Random Access Memory,
RAM);Memory 702 can also include nonvolatile memory (Non-Volatile Memory), such as read-only memory
(Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid
State hard disk (Solid-State Drive, SSD);Memory 702 can also include the combination of the memory of mentioned kind.
Wherein, the program code management code that processor 701 is used to that memory 702 to be called to store executes following operation:
1) according to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server,
And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes
It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory,
And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server
Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server
Quantity can also be multiple.
2) when any terminal accesses server, according to the characteristic information of any terminal, it is limited with maximum access times, it will
The access limited number of times that any terminal accesses server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal
Front position information.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed
Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter
The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer
Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having
Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The equipment of limiting server visit capacity described in seventh embodiment of the invention, effectively can avoid malicious access from taking
The additional server expense that business device is brought, realizes effective control to server resource.
Eighth embodiment of the invention, a kind of equipment of limiting server visit capacity, as shown in figure 4, including consisting of portion
Point:
Processor 701 and memory 702.In some embodiments of the invention, processor 701 and memory 702 can lead to
Cross bus or other manner connection.
Processor 701 can be general processor, such as central processing unit (Central Processing Unit,
CPU), it can also be digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (English:
Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention
One or more integrated circuits.Wherein, memory 702 is used to store the executable instruction of processor 701;
Memory 702 is transferred to processor 701 for storing program code, and by the program code.Memory 702 can
To include volatile memory (Volatile Memory), such as random access memory (Random Access Memory,
RAM);Memory 702 can also include nonvolatile memory (Non-Volatile Memory), such as read-only memory
(Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid
State hard disk (Solid-State Drive, SSD);Memory 702 can also include the combination of the memory of mentioned kind.
Wherein, the program code management code that processor 701 is used to that memory 702 to be called to store executes following operation:
1) according to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server,
And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes
It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory,
And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server
Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server
Quantity can also be multiple.
2) when any terminal accesses server, according to the characteristic information of any terminal, it is limited with maximum access times, it will
The access limited number of times that any terminal accesses server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal
Front position information.
Optionally, when any terminal accesses server, according to the characteristic information of any terminal, it is with maximum access times
Limit, the access limited number of times that any terminal is accessed to server in current access cycle are set as the mode of setting access value,
Including:
Include the feelings of the logon information of any terminal in the characteristic information of any terminal when any terminal accesses server
Under condition, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then be limited with maximum access times, by any terminal in current accessed
The access limited number of times that server is accessed in period is set as the first access value;
If it is determined that any terminal is not logged in server, then any terminal is accessed to the visit of server in current access cycle
Ask that limited number of times is set as the second access value;
Wherein, the first access value is more than the second access value.
Such as:Include that any terminal logs in letter in the characteristic information of any terminal when any terminal accesses server
In the case of breath, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then it is limited for 50 times with maximum access times, by any terminal current
The access limited number of times that server is accessed in 10 minutes access cycles is set as the first access value 40 times;
If it is determined that any terminal is not logged in server, then any terminal is accessed in current access cycle in 10 minutes and serviced
The access limited number of times of device is set as the second access value 30 times.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed
Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter
The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer
Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having
Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The equipment of limiting server visit capacity described in eighth embodiment of the invention, effectively can avoid malicious access from taking
The additional server expense that business device is brought, realizes effective control to server resource.
Ninth embodiment of the invention, a kind of equipment of limiting server visit capacity, as shown in figure 4, including consisting of portion
Point:
Processor 701 and memory 702.In some embodiments of the invention, processor 701 and memory 702 can lead to
Cross bus or other manner connection.
Processor 701 can be general processor, such as central processing unit (Central Processing Unit,
CPU), it can also be digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (English:
Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention
One or more integrated circuits.Wherein, memory 702 is used to store the executable instruction of processor 701;
Memory 702 is transferred to processor 701 for storing program code, and by the program code.Memory 702 can
To include volatile memory (Volatile Memory), such as random access memory (Random Access Memory,
RAM);Memory 702 can also include nonvolatile memory (Non-Volatile Memory), such as read-only memory
(Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid
State hard disk (Solid-State Drive, SSD);Memory 702 can also include the combination of the memory of mentioned kind.
Wherein, the program code management code that processor 701 is used to that memory 702 to be called to store executes following operation:
1) according to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server,
And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes
It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory,
And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server
Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server
Quantity can also be multiple.
2) when any terminal accesses server, according to the characteristic information of any terminal, it is limited with maximum access times, it will
The access limited number of times that any terminal accesses server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal
Front position information.
Optionally, when any terminal accesses server, according to the characteristic information of any terminal, it is with maximum access times
Limit, the access limited number of times that any terminal is accessed to server in current access cycle are set as the mode of setting access value,
Including:
Include the current location information of any terminal in the characteristic information of any terminal when any terminal accesses server
In the case of, obtain the information releasing position information that the information in any terminal current accessed server includes;
Judge current location information with information releasing position information whether in the territorial scope of setting;
If it is determined that current location information and information releasing position information in the territorial scope of setting, are then accessed secondary with maximum
Number is limited, and the access limited number of times that any terminal is accessed to server in current access cycle is set as third access value;
If it is determined that current location information and information releasing position information is in the territorial scope of setting, then by any terminal
The access limited number of times that server is accessed in current access cycle is set as the 4th access value;
Wherein, third access value is more than the 4th access value.
Such as:Include the present bit of any terminal in the characteristic information of any terminal when any terminal accesses server
In the case that confidence ceases (Fengtai District, Beijing City), the information publication that the information in any terminal current accessed server includes is obtained
Location information (Haidian District, Beijing City);
Judge current location information (Fengtai District, Beijing City) and information releasing position information (Haidian District, Beijing City) whether
In the territorial scope (Beijing) of setting;
It is being set with information releasing position information (Haidian District, Beijing City) in judgement current location information (Fengtai District, Beijing City)
In the case of in fixed territorial scope (Beijing), then it is limited with maximum access times, by any terminal in current access cycle
The access limited number of times that server is accessed in 10 minutes is set as third access value 25 times.
For another example:Include the present bit of any terminal in the characteristic information of any terminal when any terminal accesses server
In the case that confidence ceases (Tianjin), the information releasing position letter that the information in any terminal current accessed server includes is obtained
It ceases (Haidian District, Beijing City);
Judge current location information (Tianjin) with information releasing position information (Haidian District, Beijing City) whether in setting
In territorial scope (Beijing);
In judgement current location information (Tianjin) with information releasing position information (Haidian District, Beijing City) not in setting
In the case of in territorial scope (Beijing), the access that any terminal is accessed in current access cycle in 10 minutes to server limits
Number processed is set as the 4th access value 15 times.
Optionally, the current location information of any terminal, including but not limited to:
The current IP address (Internet Protocol, the agreement interconnected between network) of any terminal is corresponding current
Location information;
Work as alternatively, the current MAC address (Media Access Control, media access control) of any terminal is corresponding
Front position information;
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed
Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter
The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer
Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having
Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The equipment of limiting server visit capacity described in ninth embodiment of the invention, effectively can avoid malicious access from taking
The additional server expense that business device is brought, realizes effective control to server resource.
Tenth embodiment of the invention, a kind of equipment of limiting server visit capacity, as shown in figure 4, including consisting of portion
Point:
Processor 701 and memory 702.In some embodiments of the invention, processor 701 and memory 702 can lead to
Cross bus or other manner connection.
Processor 701 can be general processor, such as central processing unit (Central Processing Unit,
CPU), it can also be digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (English:
Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention
One or more integrated circuits.Wherein, memory 702 is used to store the executable instruction of processor 701;
Memory 702 is transferred to processor 701 for storing program code, and by the program code.Memory 702 can
To include volatile memory (Volatile Memory), such as random access memory (Random Access Memory,
RAM);Memory 702 can also include nonvolatile memory (Non-Volatile Memory), such as read-only memory
(Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid
State hard disk (Solid-State Drive, SSD);Memory 702 can also include the combination of the memory of mentioned kind.
Wherein, the program code management code that processor 701 is used to that memory 702 to be called to store executes following operation:
1) according to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server,
And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes
It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory,
And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server
Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server
Quantity can also be multiple.
2) when any terminal accesses server, according to the characteristic information of any terminal, it is limited with maximum access times, it will
The access limited number of times that any terminal accesses server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal
Front position information.
Optionally, when any terminal accesses server, according to the characteristic information of any terminal, it is with maximum access times
Limit, the access limited number of times that any terminal is accessed to server in current access cycle are set as the mode of setting access value,
Including:
The characteristic information of any terminal includes:The logon information of any terminal and the current location information of any terminal;
When any terminal accesses server, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then be limited with maximum access times, by any terminal in current accessed
The access limited number of times that server is accessed in period is set as the first access value;
If it is determined that any terminal is not logged in server, then any terminal is accessed to the visit of server in current access cycle
Ask that limited number of times is set as the second access value;Wherein, the first access value is more than the second access value;
Obtain the information releasing position information that the information in any terminal current accessed server includes;
Judge current location information with information releasing position information whether in the territorial scope of setting;
If it is determined that current location information and information releasing position information in the territorial scope of setting, are then accessed secondary with maximum
Number is limited, and the access limited number of times that any terminal is accessed to server in current access cycle is set as third access value;
If it is determined that current location information and information releasing position information is in the territorial scope of setting, then by any terminal
The access limited number of times that server is accessed in current access cycle is set as the 4th access value;Wherein, third access value is more than
4th access value;
Optionally, the second access value is more than third access value.
Such as:The characteristic information of any terminal includes:The logon information of any terminal and the current location of any terminal
Information;
When any terminal accesses server, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then it is limited for 50 times with maximum access times, by any terminal current
The access limited number of times that server is accessed in 15 minutes access cycles is set as the first access value 50 times;
If it is determined that any terminal is not logged in server, then any terminal is accessed in current access cycle in 15 minutes and serviced
The access limited number of times of device is set as the second access value 30 times;
Obtain information releasing position information (Beijing Haidian that the information in any terminal current accessed server includes
Area);
Whether the current location information and information releasing position information (Haidian District, Beijing City) for judging any terminal are setting
Region (Beijing) range in;
If it is determined that current location information (such as Fengtai District, Beijing City) and information releasing position information (Haidian District, Beijing City)
In region (Beijing) range of setting, then it is limited for 50 times with maximum access times, by any terminal in current access cycle
The access limited number of times that server is accessed in 15 minutes is set as third access value 25 times;
If it is determined that current location information (such as Tianjin) is not being set with information releasing position information (Haidian District, Beijing City)
In fixed region (Beijing) range, then the access that any terminal is accessed to server in current access cycle 15 minutes limits
Number is set as the 4th access value 15 times.
Optionally, the current location information of any terminal, including but not limited to:
The current IP address (Internet Protocol, the agreement interconnected between network) of any terminal is corresponding current
Location information;
Work as alternatively, the current MAC address (Media Access Control, media access control) of any terminal is corresponding
Front position information;
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed
Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter
The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer
Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having
Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The equipment of limiting server visit capacity described in tenth embodiment of the invention, effectively can avoid malicious access from taking
The additional server expense that business device is brought, realizes effective control to server resource.
Eleventh embodiment of the invention, a kind of equipment of limiting server visit capacity, as shown in figure 4, including consisting of
Part:
Processor 701 and memory 702.In some embodiments of the invention, processor 701 and memory 702 can lead to
Cross bus or other manner connection.
Processor 701 can be general processor, such as central processing unit (Central Processing Unit,
CPU), it can also be digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (English:
Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention
One or more integrated circuits.Wherein, memory 702 is used to store the executable instruction of processor 701;
Memory 702 is transferred to processor 701 for storing program code, and by the program code.Memory 702 can
To include volatile memory (Volatile Memory), such as random access memory (Random Access Memory,
RAM);Memory 702 can also include nonvolatile memory (Non-Volatile Memory), such as read-only memory
(Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid
State hard disk (Solid-State Drive, SSD);Memory 702 can also include the combination of the memory of mentioned kind.
Wherein, the program code management code that processor 701 is used to that memory 702 to be called to store executes following operation:
1) according to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server,
And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes
It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory,
And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server
Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server
Quantity can also be multiple.
2) when any terminal accesses server, according to the characteristic information of any terminal, it is limited with maximum access times, it will
The access limited number of times that any terminal accesses server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal
Front position information.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed
Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter
The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer
Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having
Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
3) obtain any terminal accessed in current access cycle server the first access times and any terminal upper
The second access times of server are accessed in one access cycle;
In the case where the first access times are more than given threshold than the growth rate of the second access times, sent out to any terminal
Verification information is sent, server is accessed so that any terminal is based on verification information.
Such as:It obtains any terminal and accesses the first access times 80 times of server and any in current access cycle
Terminal accessed the second access times 40 times of server within a upper access cycle;
In the case where the first access times are more than given threshold 50% than the growth rate 100% of the second access times, to
Any terminal sends verification information, and server is accessed so that any terminal is based on verification information.
The equipment of limiting server visit capacity described in eleventh embodiment of the invention, can effectively avoid malicious access
The additional server expense that server is brought realizes effective control to server resource.
Twelveth embodiment of the invention, a kind of equipment of limiting server visit capacity, as shown in figure 4, including consisting of
Part:
Processor 701 and memory 702.In some embodiments of the invention, processor 701 and memory 702 can lead to
Cross bus or other manner connection.
Processor 701 can be general processor, such as central processing unit (Central Processing Unit,
CPU), it can also be digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (English:
Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention
One or more integrated circuits.Wherein, memory 702 is used to store the executable instruction of processor 701;
Memory 702 is transferred to processor 701 for storing program code, and by the program code.Memory 702 can
To include volatile memory (Volatile Memory), such as random access memory (Random Access Memory,
RAM);Memory 702 can also include nonvolatile memory (Non-Volatile Memory), such as read-only memory
(Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid
State hard disk (Solid-State Drive, SSD);Memory 702 can also include the combination of the memory of mentioned kind.
Wherein, the program code management code that processor 701 is used to that memory 702 to be called to store executes following operation:
1) according to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server,
And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes
It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory,
And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server
Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server
Quantity can also be multiple.
2) when any terminal accesses server, according to the characteristic information of any terminal, it is limited with maximum access times, it will
The access limited number of times that any terminal accesses server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal
Front position information.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed
Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter
The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer
Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having
Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
3) obtain any terminal accessed in current access cycle server the first access times and any terminal upper
The second access times of server are accessed in one access cycle;
In the case where the first access times are more than given threshold than the growth rate of the second access times, sent out to any terminal
Verification information is sent, server is accessed so that any terminal is based on verification information.
Such as:It obtains any terminal and accesses the first access times 80 times of server and any in current access cycle
Terminal accessed the second access times 40 times of server within a upper access cycle;
In the case where the first access times are more than given threshold 50% than the growth rate 100% of the second access times, to
Any terminal sends verification information, and server is accessed so that any terminal is based on verification information.
4) when monitoring that any terminal is not based on verification information access server within the set duration, forbid any terminal
Server is accessed, and sends authentication failed information to any terminal.
The equipment of limiting server visit capacity described in twelveth embodiment of the invention, can effectively avoid malicious access
The additional server expense that server is brought realizes effective control to server resource.
Thriteenth embodiment of the invention, a kind of computer readable storage medium.
Computer storage media can be RAM memory, flash memory, ROM memory, eprom memory, EEPROM storages
The storage medium of device, register, hard disk, mobile hard disk, CD-ROM or any other form known in the art.
Computer-readable recording medium storage there are one or multiple programs, one or more program can by one or
The multiple processors of person execute, with realize in first embodiment of the invention to sixth embodiment of the invention in any embodiment part or
Overall Steps.
Computer readable storage medium described in thriteenth embodiment of the invention is stored with one or more program, should
One or more program can be executed by one or more processor, can effectively avoid malicious access server from bringing
Additional server expense realizes effective control to server resource.
Fourteenth embodiment of the invention, the present embodiment are on the basis of the above embodiments, with limiting server visit capacity
Method for, introduce an application example of the invention in conjunction with attached drawing 5.
Step S1401, configuration server cluster.
Wherein, configuration server number of clusters is W, and the type of service of configuration server cluster, configuration server is loading
Energy threshold values etc.;W is positive integer.
Step S1402, when the list page in terminal request server cluster, judge terminal whether login service device collection
Group.
Step S1403, if terminal login service device cluster, by the current access cycle of terminal access server cluster
Interior access limited number of times is set as N;
Step S1404, if terminal is not logged in server cluster, in the current access cycle of terminal access server cluster
Access limited number of times be set as M;
Wherein, N is more than M;N and M is positive integer.
Step S1405, terminal by cookie (being stored in the data on user local terminal) information service device cluster,
Server cluster is saved cookie information by Redis databases, to be verified when details page is checked.
Wherein, Redis be based on memory also can persistence log type, Key-Value (key assignments) database.
Step S1406 judges whether the information in the server of terminal access is same according to the IP address information of terminal
City;
Step S1407, if the information in the server of terminal access is same city, by terminal access server cluster
Access limited number of times in current access cycle is set as P;
Step S1408 passes through preset nginx frequencies if the information in the server of terminal access is not same city
Control module sets the access limited number of times in the current access cycle of terminal access server cluster to Q;
Wherein, P is positive integer more than Q, P and Q.
Step S1409, in the case that information in the server for judging terminal access is same city, when terminal access takes
When the access times being engaged in the current access cycle of device cluster increase by 20% on a year-on-year basis, by nginx frequency control modules, control is eventually
Whether end input identifying code just can be accessed normally, for being letter in a large amount of acquisition servers of machine the terminal that verifies access
Breath.
Step S1410 is supervised after the original list in terminal access server has loaded by JavaScript
It listens, when user clicks URL (Uniform Resource Locator, uniform resource locator) by terminal, by cookie
Etc. marks be appended to behind URL, the information such as cookie are verified by Redis in details page.Verification unsuccessfully return 403 to
The terminal, so that tissue sampling person acquires.
A kind of method of limiting server visit capacity described in fourteenth embodiment of the invention can effectively avoid malice
The additional server expense that server is brought is accessed, effective control to server resource is realized.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements include not only those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
There is also other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form, all of these belong to the protection of the present invention.
Claims (11)
1. a kind of method of limiting server visit capacity, which is characterized in that including:
According to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined;
When any terminal accesses the server, according to the characteristic information of any terminal, with the maximum access times
It is limited, the access limited number of times that any terminal is accessed to the server in current access cycle is set as setting access
Value;
Wherein, the characteristic information includes at least one of following information:The logon information of any terminal and described any
The current location information of terminal.
2. according to the method described in claim 1, it is characterized in that, the characteristic information according to any terminal, with institute
It states maximum access times to be limited, any terminal is accessed to the access limited number of times of the server in current access cycle
It is set as setting access value, including:
In the case where the characteristic information includes the logon information, judge that any terminal is based on the logon information
It is no to have logged in the server;
If so, being limited with the maximum access times, any terminal is accessed into the service in current access cycle
The access limited number of times of device is set as the first access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as second
Access value;
Wherein, first access value is more than second access value.
3. method according to claim 1 or 2, which is characterized in that the characteristic information according to any terminal, with
The maximum access times are limited, and any terminal is accessed to the access limitation time of the server in current access cycle
Number is set as setting access value, including:
In the case where the characteristic information includes the current location information, obtains and taken described in any terminal current accessed
The information releasing position information that information in business device includes;
Judge the current location information with described information releasing position information whether in the territorial scope of setting;
If so, being limited with the maximum access times, any terminal is accessed into the service in current access cycle
The access limited number of times of device is set as third access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as the 4th
Access value;
Wherein, the third access value is more than the 4th access value.
4. according to the method described in claim 1, it is characterized in that, the method further includes:
It obtains any terminal and accesses the first access times of the server and any end in current access cycle
End accessed the second access times of the server within a upper access cycle;
In the case where first access times are more than given threshold than the growth rate of second access times, to described
One terminal sends verification information, and the server is accessed so that any terminal is based on the verification information.
5. according to the method described in claim 4, it is characterized in that, to any terminal send verification information after, institute
The method of stating further includes:
When monitoring that any terminal is not based on the verification information access server within the set duration, forbid institute
It states any terminal and accesses the server, and send authentication failed information to any terminal.
6. a kind of equipment of limiting server visit capacity, which is characterized in that the equipment includes processor and memory;
The processor is used to execute the program of the limiting server visit capacity stored in memory, to realize following steps:
According to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined;
When any terminal accesses the server, according to the characteristic information of any terminal, with the maximum access times
It is limited, the access limited number of times that any terminal is accessed to the server in current access cycle is set as setting access
Value;
Wherein, the characteristic information includes at least one of following information:The logon information of any terminal and described any
The current location information of terminal.
7. equipment according to claim 6, which is characterized in that the characteristic information according to any terminal, with institute
It states maximum access times to be limited, any terminal is accessed to the access limited number of times of the server in current access cycle
It is set as setting access value, including:
In the case where the characteristic information includes the logon information, judge that any terminal is based on the logon information
It is no to have logged in the server;
If so, being limited with the maximum access times, any terminal is accessed into the service in current access cycle
The access limited number of times of device is set as the first access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as second
Access value;
Wherein, first access value is more than second access value.
8. the equipment described according to claim 6 or 7, which is characterized in that the characteristic information according to any terminal, with
The maximum access times are limited, and any terminal is accessed to the access limitation time of the server in current access cycle
Number is set as setting access value, including:
In the case where the characteristic information includes the current location information, obtains and taken described in any terminal current accessed
The information releasing position information that information in business device includes;
Judge the current location information with described information releasing position information whether in the territorial scope of setting;
If so, being limited with the maximum access times, any terminal is accessed into the service in current access cycle
The access limited number of times of device is set as third access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as the 4th
Access value;
Wherein, the third access value is more than the 4th access value.
9. equipment according to claim 6, which is characterized in that the processor is additionally operable to execute the limit stored in memory
The program of control server visit capacity, to realize following steps:
It obtains any terminal and accesses the first access times of the server and any end in current access cycle
End accessed the second access times of the server within a upper access cycle;
In the case where first access times are more than given threshold than the growth rate of second access times, to described
One terminal sends verification information, and the server is accessed so that any terminal is based on the verification information.
10. equipment according to claim 9, which is characterized in that it is described to any terminal send verification information it
Afterwards, the processor is additionally operable to execute the program of the limiting server visit capacity stored in memory, to realize following steps:
When monitoring that any terminal is not based on the verification information access server within the set duration, forbid institute
It states any terminal and accesses the server, and send authentication failed information to any terminal.
11. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage there are one or
Multiple programs, one or more of programs can be executed by one or more processor, to realize in Claims 1 to 5
The step of method of any one of them limiting server visit capacity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711444298.5A CN108306859B (en) | 2017-12-27 | 2017-12-27 | Method, apparatus and computer-readable storage medium for limiting server access volume |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711444298.5A CN108306859B (en) | 2017-12-27 | 2017-12-27 | Method, apparatus and computer-readable storage medium for limiting server access volume |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108306859A true CN108306859A (en) | 2018-07-20 |
CN108306859B CN108306859B (en) | 2020-12-01 |
Family
ID=62867793
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711444298.5A Active CN108306859B (en) | 2017-12-27 | 2017-12-27 | Method, apparatus and computer-readable storage medium for limiting server access volume |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108306859B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109614255A (en) * | 2018-10-23 | 2019-04-12 | 平安科技(深圳)有限公司 | Processing method, device, medium and the electronic equipment of transaction request |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104767689A (en) * | 2014-01-07 | 2015-07-08 | 腾讯科技(深圳)有限公司 | Method of controlling network access amount and server |
CN105282047A (en) * | 2015-09-25 | 2016-01-27 | 小米科技有限责任公司 | Access request processing method and device |
US20170118249A1 (en) * | 2015-10-23 | 2017-04-27 | Oracle International Corporation | Managing security agents in a distributed environment |
CN107277008A (en) * | 2017-06-16 | 2017-10-20 | 福建中金在线信息科技有限公司 | It is a kind of to limit method, device and the electronic equipment for accessing network interface |
-
2017
- 2017-12-27 CN CN201711444298.5A patent/CN108306859B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104767689A (en) * | 2014-01-07 | 2015-07-08 | 腾讯科技(深圳)有限公司 | Method of controlling network access amount and server |
CN105282047A (en) * | 2015-09-25 | 2016-01-27 | 小米科技有限责任公司 | Access request processing method and device |
US20170118249A1 (en) * | 2015-10-23 | 2017-04-27 | Oracle International Corporation | Managing security agents in a distributed environment |
CN107277008A (en) * | 2017-06-16 | 2017-10-20 | 福建中金在线信息科技有限公司 | It is a kind of to limit method, device and the electronic equipment for accessing network interface |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109614255A (en) * | 2018-10-23 | 2019-04-12 | 平安科技(深圳)有限公司 | Processing method, device, medium and the electronic equipment of transaction request |
CN109614255B (en) * | 2018-10-23 | 2023-04-07 | 平安科技(深圳)有限公司 | Transaction request processing method, device, medium and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108306859B (en) | 2020-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101781339B1 (en) | Method and device for updating client | |
CN109327439B (en) | Risk identification method and device for service request data, storage medium and equipment | |
EP3396905B1 (en) | Method and device for securely sending a message | |
CN103718527B (en) | Communication security processing method, apparatus and system | |
CN109495467B (en) | Method and device for updating interception rule and computer readable storage medium | |
DE112012000744T5 (en) | Detection of a Trojan horse | |
CN105897674A (en) | DDoS attack protection method applied to CDN server group and system | |
CN105049290B (en) | Page access monitoring method and device | |
CN109981702B (en) | File storage method and system | |
CN114338064B (en) | Method, device, system, equipment and storage medium for identifying network traffic type | |
US10609206B1 (en) | Auto-repairing mobile communication device data streaming architecture | |
CN104301161A (en) | Computing method, computing device and communication system for business quality index | |
CN110830234A (en) | User traffic distribution method and device | |
CN107644161A (en) | Safety detecting method, device and the equipment of sample | |
CN105991596A (en) | Access control method and system | |
CN116015721A (en) | Illegal external connection detection method, system, electronic equipment and medium | |
KR102354058B1 (en) | Method for monitoring server, apparatus and system for executing the method | |
CN106067879A (en) | The detection method of information and device | |
CN108270753B (en) | Method and device for logging out user account | |
CN104519069A (en) | Method and device for intercepting resource requests | |
CN108306859A (en) | Method, equipment and the computer readable storage medium of limiting server visit capacity | |
CN113098852A (en) | Log processing method and device | |
CN110808967B (en) | Detection method for challenging black hole attack and related device | |
CN110557371A (en) | Access limiting method, system, readable storage medium and game server | |
CN114244555B (en) | Security policy adjusting method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |