CN108306859A - Method, equipment and the computer readable storage medium of limiting server visit capacity - Google Patents

Method, equipment and the computer readable storage medium of limiting server visit capacity Download PDF

Info

Publication number
CN108306859A
CN108306859A CN201711444298.5A CN201711444298A CN108306859A CN 108306859 A CN108306859 A CN 108306859A CN 201711444298 A CN201711444298 A CN 201711444298A CN 108306859 A CN108306859 A CN 108306859A
Authority
CN
China
Prior art keywords
access
server
terminal
information
accessed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711444298.5A
Other languages
Chinese (zh)
Other versions
CN108306859B (en
Inventor
李跃红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuba Co Ltd
Original Assignee
Wuba Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuba Co Ltd filed Critical Wuba Co Ltd
Priority to CN201711444298.5A priority Critical patent/CN108306859B/en
Publication of CN108306859A publication Critical patent/CN108306859A/en
Application granted granted Critical
Publication of CN108306859B publication Critical patent/CN108306859B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention proposes a kind of method of limiting server visit capacity, including:According to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined;When any terminal accesses the server, according to the characteristic information of any terminal, it is limited with the maximum access times, the access limited number of times that any terminal is accessed to the server in current access cycle is set as setting access value.The invention also discloses a kind of equipment and computer readable storage medium of limiting server visit capacity, and by implementing said program, the additional server expense that can effectively avoid malicious access server from bringing realizes effective control to server resource.

Description

Method, equipment and the computer readable storage medium of limiting server visit capacity
Technical field
The present invention relates to server technology field more particularly to a kind of method, equipment and the meters of limiting server visit capacity Calculation machine readable storage medium storing program for executing.
Background technology
Due to the timeliness of classification information in website, many websites are all using capturing in other websites by the way of classification information Go to update the classification information of this website.The volume of Website server can be brought to the fallacious message grasping manipulation of classification information in website Overhead even results in Website server paralysis.Since the information scratching of Website server None- identified malice operates, lead to nothing Method accomplishes effectively to intercept to the information scratching operation of malice, can not ensure the normal access operation of user, can not be to website service Device resource carries out effectively save control.Therefore website effectively judges that the operation for accessing the website is the normal access behaviour of user Make or the operation of the information scratching of other websites is particularly important.
Under the premise of preventing the information scratching of other websites from operating, ensure the normal access behaviour of user to greatest extent Make, is the core index of Website server.The prior art is to prevent the information scratching of other websites from operating, and protect to greatest extent The normal access operation for demonstrate,proving user, generally according to User IP (Internet Protocol, the agreement interconnected between network) address Information limits user in the access times for setting the access Website server in access cycle, but information crawler is logical It can often use proxy server to replace IP address information and access Website server, to evade Website server to IP address information Access limitation.
Invention content
The present invention provides a kind of method, equipment and the computer readable storage medium of limiting server visit capacity, has solved Website server cannot operate the problem of controling effectively to the information scratching of malice in the prior art.
The technical solution adopted by the present invention is to provide a kind of method of limiting server visit capacity, including:
According to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined;
When any terminal accesses the server, according to the characteristic information of any terminal, with the maximum access Number is limited, and the access limited number of times that any terminal is accessed to the server in current access cycle is set as setting Access value;
Wherein, the characteristic information includes at least one of following information:The logon information of any terminal and described The current location information of any terminal.
Optionally, the characteristic information according to any terminal is limited with the maximum access times, described will be appointed The access limited number of times that one terminal accesses the server in current access cycle is set as setting access value, including:
In the case where the characteristic information includes the logon information, any end is judged based on the logon information Whether end has logged in the server;
If so, be limited with the maximum access times, any terminal is accessed in current access cycle described in The access limited number of times of server is set as the first access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as Second access value;
Wherein, first access value is more than second access value.
Optionally, the characteristic information according to any terminal is limited with the maximum access times, described will be appointed The access limited number of times that one terminal accesses the server in current access cycle is set as setting access value, including:
In the case where the characteristic information includes the current location information, any terminal current accessed institute is obtained State the information releasing position information that the information in server includes;
Judge the current location information with described information releasing position information whether in the territorial scope of setting;
If so, be limited with the maximum access times, any terminal is accessed in current access cycle described in The access limited number of times of server is set as third access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as 4th access value;
Wherein, the third access value is more than the 4th access value.
Optionally, the method further includes:
Obtain any terminal accessed in current access cycle the server the first access times and described One terminal accessed the second access times of the server within a upper access cycle;
In the case where first access times are more than given threshold than the growth rate of second access times, to institute It states any terminal and sends verification information, the server is accessed so that any terminal is based on the verification information.
Optionally, after sending verification information to any terminal, the method further includes:
When monitoring that any terminal is not based on the verification information access server within the set duration, prohibit Only any terminal accesses the server, and sends authentication failed information to any terminal.
The present invention also provides a kind of equipment of limiting server visit capacity, and the equipment includes processor and memory;
The processor is used to execute the program of the limiting server visit capacity stored in memory, to realize following step Suddenly:
According to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined;
When any terminal accesses the server, according to the characteristic information of any terminal, with the maximum access Number is limited, and the access limited number of times that any terminal is accessed to the server in current access cycle is set as setting Access value;
Wherein, the characteristic information includes at least one of following information:The logon information of any terminal and described The current location information of any terminal.
Optionally, the characteristic information according to any terminal is limited with the maximum access times, described will be appointed The access limited number of times that one terminal accesses the server in current access cycle is set as setting access value, including:
In the case where the characteristic information includes the logon information, any end is judged based on the logon information Whether end has logged in the server;
If so, be limited with the maximum access times, any terminal is accessed in current access cycle described in The access limited number of times of server is set as the first access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as Second access value;
Wherein, first access value is more than second access value.
Optionally, the characteristic information according to any terminal is limited with the maximum access times, described will be appointed The access limited number of times that one terminal accesses the server in current access cycle is set as setting access value, including:
In the case where the characteristic information includes the current location information, any terminal current accessed institute is obtained State the information releasing position information that the information in server includes;
Judge the current location information with described information releasing position information whether in the territorial scope of setting;
If so, be limited with the maximum access times, any terminal is accessed in current access cycle described in The access limited number of times of server is set as third access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as 4th access value;
Wherein, the third access value is more than the 4th access value.
Optionally, the processor is additionally operable to execute the program of the limiting server visit capacity stored in memory, with reality Existing following steps:
Obtain any terminal accessed in current access cycle the server the first access times and described One terminal accessed the second access times of the server within a upper access cycle;
In the case where first access times are more than given threshold than the growth rate of second access times, to institute It states any terminal and sends verification information, the server is accessed so that any terminal is based on the verification information.
Optionally, after the transmission verification information to any terminal, the processor is additionally operable to execute storage The program of the limiting server visit capacity stored in device, to realize following steps:
When monitoring that any terminal is not based on the verification information access server within the set duration, prohibit Only any terminal accesses the server, and sends authentication failed information to any terminal.
The present invention also provides a kind of computer readable storage medium, there are one the computer-readable recording medium storages Or multiple programs, one or more of programs can be executed by one or more processor, to realize that above-mentioned limitation takes The step of method for device visit capacity of being engaged in.
Using above-mentioned technical proposal, the present invention at least has following advantages:
Method, equipment and the computer readable storage medium of a kind of limiting server visit capacity of the present invention, Neng Gouyou The effective control for avoiding the additional server expense that malicious access server is brought, realizing to server resource of effect.
Description of the drawings
Fig. 1 is the method flow diagram of the limiting server visit capacity of first to fourth embodiment of the invention;
Fig. 2 is the method flow diagram of the limiting server visit capacity of fifth embodiment of the invention;
Fig. 3 is the method flow diagram of the limiting server visit capacity of sixth embodiment of the invention;
Fig. 4 is that the equipment of the access server of the 7th to the 12nd embodiment of the invention forms structural schematic diagram;
Fig. 5 is the method flow diagram of the limiting server visit capacity of fourteenth embodiment of the invention.
Specific implementation mode
Further to illustrate the present invention to reach the technological means and effect that predetermined purpose is taken, below in conjunction with attached drawing And preferred embodiment, the present invention is described in detail as after.
First embodiment of the invention, a kind of method of limiting server visit capacity, as shown in Figure 1, including walking in detail below Suddenly:
Step S101 determines that setting interior the maximum of server that access access cycle accesses according to the configuration information of server Number.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server, And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory, And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server Quantity can also be multiple.
Step S102, when any terminal accesses server, according to the characteristic information of any terminal, with maximum access times It is limited, the access limited number of times that any terminal is accessed to server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal Front position information.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The method of limiting server visit capacity described in first embodiment of the invention, effectively can avoid malicious access from taking The additional server expense that business device is brought, realizes effective control to server resource.
Second embodiment of the invention, a kind of method of limiting server visit capacity, as shown in Figure 1, including walking in detail below Suddenly:
Step S101 determines that setting interior the maximum of server that access access cycle accesses according to the configuration information of server Number.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server, And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory, And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server Quantity can also be multiple.
Step S102, when any terminal accesses server, according to the characteristic information of any terminal, with maximum access times It is limited, the access limited number of times that any terminal is accessed to server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal Front position information.
Optionally, step S102, including:
Include the feelings of the logon information of any terminal in the characteristic information of any terminal when any terminal accesses server Under condition, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then be limited with maximum access times, by any terminal in current accessed The access limited number of times that server is accessed in period is set as the first access value;
If it is determined that any terminal is not logged in server, then any terminal is accessed to the visit of server in current access cycle Ask that limited number of times is set as the second access value;
Wherein, the first access value is more than the second access value.
Such as:Include that any terminal logs in letter in the characteristic information of any terminal when any terminal accesses server In the case of breath, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then it is limited for 50 times with maximum access times, by any terminal current The access limited number of times that server is accessed in 10 minutes access cycles is set as the first access value 40 times;
If it is determined that any terminal is not logged in server, then any terminal is accessed in current access cycle in 10 minutes and serviced The access limited number of times of device is set as the second access value 30 times.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The method of limiting server visit capacity described in second embodiment of the invention, effectively can avoid malicious access from taking The additional server expense that business device is brought, realizes effective control to server resource.
Third embodiment of the invention, a kind of method of limiting server visit capacity, as shown in Figure 1, including walking in detail below Suddenly:
Step S101 determines that setting interior the maximum of server that access access cycle accesses according to the configuration information of server Number.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server, And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory, And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server Quantity can also be multiple.
Step S102, when any terminal accesses server, according to the characteristic information of any terminal, with maximum access times It is limited, the access limited number of times that any terminal is accessed to server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal Front position information.
Optionally, step S102, including:
Include the current location information of any terminal in the characteristic information of any terminal when any terminal accesses server In the case of, obtain the information releasing position information that the information in any terminal current accessed server includes;
Judge current location information with information releasing position information whether in the territorial scope of setting;
If it is determined that current location information and information releasing position information in the territorial scope of setting, are then accessed secondary with maximum Number is limited, and the access limited number of times that any terminal is accessed to server in current access cycle is set as third access value;
If it is determined that current location information and information releasing position information is in the territorial scope of setting, then by any terminal The access limited number of times that server is accessed in current access cycle is set as the 4th access value;
Wherein, third access value is more than the 4th access value.
Such as:Include the present bit of any terminal in the characteristic information of any terminal when any terminal accesses server In the case that confidence ceases (Fengtai District, Beijing City), the information publication that the information in any terminal current accessed server includes is obtained Location information (Haidian District, Beijing City);
Judge current location information (Fengtai District, Beijing City) and information releasing position information (Haidian District, Beijing City) whether In the territorial scope (Beijing) of setting;
It is being set with information releasing position information (Haidian District, Beijing City) in judgement current location information (Fengtai District, Beijing City) In the case of in fixed territorial scope (Beijing), then it is limited with maximum access times, by any terminal in current access cycle The access limited number of times that server is accessed in 10 minutes is set as third access value 25 times.
For another example:Include the present bit of any terminal in the characteristic information of any terminal when any terminal accesses server In the case that confidence ceases (Tianjin), the information releasing position letter that the information in any terminal current accessed server includes is obtained It ceases (Haidian District, Beijing City);
Judge current location information (Tianjin) with information releasing position information (Haidian District, Beijing City) whether in setting In territorial scope (Beijing);
In judgement current location information (Tianjin) with information releasing position information (Haidian District, Beijing City) not in setting In the case of in territorial scope (Beijing), the access that any terminal is accessed in current access cycle in 10 minutes to server limits Number processed is set as the 4th access value 15 times.
Optionally, the current location information of any terminal, including but not limited to:
The current IP address (Internet Protocol, the agreement interconnected between network) of any terminal is corresponding current Location information;
Work as alternatively, the current MAC address (Media Access Control, media access control) of any terminal is corresponding Front position information;
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The method of limiting server visit capacity described in third embodiment of the invention, effectively can avoid malicious access from taking The additional server expense that business device is brought, realizes effective control to server resource.
Fourth embodiment of the invention, a kind of method of limiting server visit capacity, as shown in Figure 1, including walking in detail below Suddenly:
Step S101 determines that setting interior the maximum of server that access access cycle accesses according to the configuration information of server Number.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server, And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory, And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server Quantity can also be multiple.
Step S102, when any terminal accesses server, according to the characteristic information of any terminal, with maximum access times It is limited, the access limited number of times that any terminal is accessed to server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal Front position information.
Optionally, step S102, including:
The characteristic information of any terminal includes:The logon information of any terminal and the current location information of any terminal;
When any terminal accesses server, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then be limited with maximum access times, by any terminal in current accessed The access limited number of times that server is accessed in period is set as the first access value;
If it is determined that any terminal is not logged in server, then any terminal is accessed to the visit of server in current access cycle Ask that limited number of times is set as the second access value;Wherein, the first access value is more than the second access value;
Obtain the information releasing position information that the information in any terminal current accessed server includes;
Judge current location information with information releasing position information whether in the territorial scope of setting;
If it is determined that current location information and information releasing position information in the territorial scope of setting, are then accessed secondary with maximum Number is limited, and the access limited number of times that any terminal is accessed to server in current access cycle is set as third access value;
If it is determined that current location information and information releasing position information is in the territorial scope of setting, then by any terminal The access limited number of times that server is accessed in current access cycle is set as the 4th access value;Wherein, third access value is more than 4th access value;
Optionally, the second access value is more than third access value.
Such as:The characteristic information of any terminal includes:The logon information of any terminal and the current location of any terminal Information;
When any terminal accesses server, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then it is limited for 50 times with maximum access times, by any terminal current The access limited number of times that server is accessed in 15 minutes access cycles is set as the first access value 50 times;
If it is determined that any terminal is not logged in server, then any terminal is accessed in current access cycle in 15 minutes and serviced The access limited number of times of device is set as the second access value 30 times;
Obtain information releasing position information (Beijing Haidian that the information in any terminal current accessed server includes Area);
Whether the current location information and information releasing position information (Haidian District, Beijing City) for judging any terminal are setting Region (Beijing) range in;
If it is determined that current location information (such as Fengtai District, Beijing City) and information releasing position information (Haidian District, Beijing City) In region (Beijing) range of setting, then it is limited for 50 times with maximum access times, by any terminal in current access cycle The access limited number of times that server is accessed in 15 minutes is set as third access value 25 times;
If it is determined that current location information (such as Tianjin) is not being set with information releasing position information (Haidian District, Beijing City) In fixed region (Beijing) range, then the access that any terminal is accessed to server in current access cycle 15 minutes limits Number is set as the 4th access value 15 times.
Optionally, the current location information of any terminal, including but not limited to:
The current IP address (Internet Protocol, the agreement interconnected between network) of any terminal is corresponding current Location information;
Work as alternatively, the current MAC address (Media Access Control, media access control) of any terminal is corresponding Front position information;
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The method of limiting server visit capacity described in fourth embodiment of the invention, effectively can avoid malicious access from taking The additional server expense that business device is brought, realizes effective control to server resource.
Fifth embodiment of the invention, a kind of method of limiting server visit capacity, as shown in Fig. 2, including walking in detail below Suddenly:
Step S501 determines that setting interior the maximum of server that access access cycle accesses according to the configuration information of server Number.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server, And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory, And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server Quantity can also be multiple.
Step S502, when any terminal accesses server, according to the characteristic information of any terminal, with maximum access times It is limited, the access limited number of times that any terminal is accessed to server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal Front position information.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
Step S503 obtains any terminal and accesses the first access times of server and any in current access cycle Terminal accessed the second access times of server within a upper access cycle;
In the case where the first access times are more than given threshold than the growth rate of the second access times, sent out to any terminal Verification information is sent, server is accessed so that any terminal is based on verification information.
Such as:It obtains any terminal and accesses the first access times 80 times of server and any in current access cycle Terminal accessed the second access times 40 times of server within a upper access cycle;
In the case where the first access times are more than given threshold 50% than the growth rate 100% of the second access times, to Any terminal sends verification information, and server is accessed so that any terminal is based on verification information.
The method of limiting server visit capacity described in fifth embodiment of the invention, effectively can avoid malicious access from taking The additional server expense that business device is brought, realizes effective control to server resource.
Sixth embodiment of the invention, a kind of method of limiting server visit capacity, as shown in figure 3, including walking in detail below Suddenly:
Step S601 determines that setting interior the maximum of server that access access cycle accesses according to the configuration information of server Number.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server, And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory, And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server Quantity can also be multiple.
Step S602, when any terminal accesses server, according to the characteristic information of any terminal, with maximum access times It is limited, the access limited number of times that any terminal is accessed to server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal Front position information.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
Step S603 obtains any terminal and accesses the first access times of server and any in current access cycle Terminal accessed the second access times of server within a upper access cycle;
In the case where the first access times are more than given threshold than the growth rate of the second access times, sent out to any terminal Verification information is sent, server is accessed so that any terminal is based on verification information.
Such as:It obtains any terminal and accesses the first access times 80 times of server and any in current access cycle Terminal accessed the second access times 40 times of server within a upper access cycle;
In the case where the first access times are more than given threshold 50% than the growth rate 100% of the second access times, to Any terminal sends verification information, and server is accessed so that any terminal is based on verification information.
Step S604 forbids when monitoring that any terminal is not based on verification information access server within the set duration Any terminal accesses server, and sends authentication failed information to any terminal.
The method of limiting server visit capacity described in sixth embodiment of the invention, effectively can avoid malicious access from taking The additional server expense that business device is brought, realizes effective control to server resource.
Seventh embodiment of the invention, a kind of equipment of limiting server visit capacity, as shown in figure 4, including consisting of portion Point:
Processor 701 and memory 702.In some embodiments of the invention, processor 701 and memory 702 can lead to Cross bus or other manner connection.
Processor 701 can be general processor, such as central processing unit (Central Processing Unit, CPU), it can also be digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (English: Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention One or more integrated circuits.Wherein, memory 702 is used to store the executable instruction of processor 701;
Memory 702 is transferred to processor 701 for storing program code, and by the program code.Memory 702 can To include volatile memory (Volatile Memory), such as random access memory (Random Access Memory, RAM);Memory 702 can also include nonvolatile memory (Non-Volatile Memory), such as read-only memory (Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid State hard disk (Solid-State Drive, SSD);Memory 702 can also include the combination of the memory of mentioned kind.
Wherein, the program code management code that processor 701 is used to that memory 702 to be called to store executes following operation:
1) according to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server, And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory, And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server Quantity can also be multiple.
2) when any terminal accesses server, according to the characteristic information of any terminal, it is limited with maximum access times, it will The access limited number of times that any terminal accesses server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal Front position information.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The equipment of limiting server visit capacity described in seventh embodiment of the invention, effectively can avoid malicious access from taking The additional server expense that business device is brought, realizes effective control to server resource.
Eighth embodiment of the invention, a kind of equipment of limiting server visit capacity, as shown in figure 4, including consisting of portion Point:
Processor 701 and memory 702.In some embodiments of the invention, processor 701 and memory 702 can lead to Cross bus or other manner connection.
Processor 701 can be general processor, such as central processing unit (Central Processing Unit, CPU), it can also be digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (English: Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention One or more integrated circuits.Wherein, memory 702 is used to store the executable instruction of processor 701;
Memory 702 is transferred to processor 701 for storing program code, and by the program code.Memory 702 can To include volatile memory (Volatile Memory), such as random access memory (Random Access Memory, RAM);Memory 702 can also include nonvolatile memory (Non-Volatile Memory), such as read-only memory (Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid State hard disk (Solid-State Drive, SSD);Memory 702 can also include the combination of the memory of mentioned kind.
Wherein, the program code management code that processor 701 is used to that memory 702 to be called to store executes following operation:
1) according to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server, And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory, And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server Quantity can also be multiple.
2) when any terminal accesses server, according to the characteristic information of any terminal, it is limited with maximum access times, it will The access limited number of times that any terminal accesses server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal Front position information.
Optionally, when any terminal accesses server, according to the characteristic information of any terminal, it is with maximum access times Limit, the access limited number of times that any terminal is accessed to server in current access cycle are set as the mode of setting access value, Including:
Include the feelings of the logon information of any terminal in the characteristic information of any terminal when any terminal accesses server Under condition, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then be limited with maximum access times, by any terminal in current accessed The access limited number of times that server is accessed in period is set as the first access value;
If it is determined that any terminal is not logged in server, then any terminal is accessed to the visit of server in current access cycle Ask that limited number of times is set as the second access value;
Wherein, the first access value is more than the second access value.
Such as:Include that any terminal logs in letter in the characteristic information of any terminal when any terminal accesses server In the case of breath, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then it is limited for 50 times with maximum access times, by any terminal current The access limited number of times that server is accessed in 10 minutes access cycles is set as the first access value 40 times;
If it is determined that any terminal is not logged in server, then any terminal is accessed in current access cycle in 10 minutes and serviced The access limited number of times of device is set as the second access value 30 times.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The equipment of limiting server visit capacity described in eighth embodiment of the invention, effectively can avoid malicious access from taking The additional server expense that business device is brought, realizes effective control to server resource.
Ninth embodiment of the invention, a kind of equipment of limiting server visit capacity, as shown in figure 4, including consisting of portion Point:
Processor 701 and memory 702.In some embodiments of the invention, processor 701 and memory 702 can lead to Cross bus or other manner connection.
Processor 701 can be general processor, such as central processing unit (Central Processing Unit, CPU), it can also be digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (English: Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention One or more integrated circuits.Wherein, memory 702 is used to store the executable instruction of processor 701;
Memory 702 is transferred to processor 701 for storing program code, and by the program code.Memory 702 can To include volatile memory (Volatile Memory), such as random access memory (Random Access Memory, RAM);Memory 702 can also include nonvolatile memory (Non-Volatile Memory), such as read-only memory (Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid State hard disk (Solid-State Drive, SSD);Memory 702 can also include the combination of the memory of mentioned kind.
Wherein, the program code management code that processor 701 is used to that memory 702 to be called to store executes following operation:
1) according to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server, And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory, And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server Quantity can also be multiple.
2) when any terminal accesses server, according to the characteristic information of any terminal, it is limited with maximum access times, it will The access limited number of times that any terminal accesses server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal Front position information.
Optionally, when any terminal accesses server, according to the characteristic information of any terminal, it is with maximum access times Limit, the access limited number of times that any terminal is accessed to server in current access cycle are set as the mode of setting access value, Including:
Include the current location information of any terminal in the characteristic information of any terminal when any terminal accesses server In the case of, obtain the information releasing position information that the information in any terminal current accessed server includes;
Judge current location information with information releasing position information whether in the territorial scope of setting;
If it is determined that current location information and information releasing position information in the territorial scope of setting, are then accessed secondary with maximum Number is limited, and the access limited number of times that any terminal is accessed to server in current access cycle is set as third access value;
If it is determined that current location information and information releasing position information is in the territorial scope of setting, then by any terminal The access limited number of times that server is accessed in current access cycle is set as the 4th access value;
Wherein, third access value is more than the 4th access value.
Such as:Include the present bit of any terminal in the characteristic information of any terminal when any terminal accesses server In the case that confidence ceases (Fengtai District, Beijing City), the information publication that the information in any terminal current accessed server includes is obtained Location information (Haidian District, Beijing City);
Judge current location information (Fengtai District, Beijing City) and information releasing position information (Haidian District, Beijing City) whether In the territorial scope (Beijing) of setting;
It is being set with information releasing position information (Haidian District, Beijing City) in judgement current location information (Fengtai District, Beijing City) In the case of in fixed territorial scope (Beijing), then it is limited with maximum access times, by any terminal in current access cycle The access limited number of times that server is accessed in 10 minutes is set as third access value 25 times.
For another example:Include the present bit of any terminal in the characteristic information of any terminal when any terminal accesses server In the case that confidence ceases (Tianjin), the information releasing position letter that the information in any terminal current accessed server includes is obtained It ceases (Haidian District, Beijing City);
Judge current location information (Tianjin) with information releasing position information (Haidian District, Beijing City) whether in setting In territorial scope (Beijing);
In judgement current location information (Tianjin) with information releasing position information (Haidian District, Beijing City) not in setting In the case of in territorial scope (Beijing), the access that any terminal is accessed in current access cycle in 10 minutes to server limits Number processed is set as the 4th access value 15 times.
Optionally, the current location information of any terminal, including but not limited to:
The current IP address (Internet Protocol, the agreement interconnected between network) of any terminal is corresponding current Location information;
Work as alternatively, the current MAC address (Media Access Control, media access control) of any terminal is corresponding Front position information;
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The equipment of limiting server visit capacity described in ninth embodiment of the invention, effectively can avoid malicious access from taking The additional server expense that business device is brought, realizes effective control to server resource.
Tenth embodiment of the invention, a kind of equipment of limiting server visit capacity, as shown in figure 4, including consisting of portion Point:
Processor 701 and memory 702.In some embodiments of the invention, processor 701 and memory 702 can lead to Cross bus or other manner connection.
Processor 701 can be general processor, such as central processing unit (Central Processing Unit, CPU), it can also be digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (English: Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention One or more integrated circuits.Wherein, memory 702 is used to store the executable instruction of processor 701;
Memory 702 is transferred to processor 701 for storing program code, and by the program code.Memory 702 can To include volatile memory (Volatile Memory), such as random access memory (Random Access Memory, RAM);Memory 702 can also include nonvolatile memory (Non-Volatile Memory), such as read-only memory (Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid State hard disk (Solid-State Drive, SSD);Memory 702 can also include the combination of the memory of mentioned kind.
Wherein, the program code management code that processor 701 is used to that memory 702 to be called to store executes following operation:
1) according to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server, And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory, And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server Quantity can also be multiple.
2) when any terminal accesses server, according to the characteristic information of any terminal, it is limited with maximum access times, it will The access limited number of times that any terminal accesses server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal Front position information.
Optionally, when any terminal accesses server, according to the characteristic information of any terminal, it is with maximum access times Limit, the access limited number of times that any terminal is accessed to server in current access cycle are set as the mode of setting access value, Including:
The characteristic information of any terminal includes:The logon information of any terminal and the current location information of any terminal;
When any terminal accesses server, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then be limited with maximum access times, by any terminal in current accessed The access limited number of times that server is accessed in period is set as the first access value;
If it is determined that any terminal is not logged in server, then any terminal is accessed to the visit of server in current access cycle Ask that limited number of times is set as the second access value;Wherein, the first access value is more than the second access value;
Obtain the information releasing position information that the information in any terminal current accessed server includes;
Judge current location information with information releasing position information whether in the territorial scope of setting;
If it is determined that current location information and information releasing position information in the territorial scope of setting, are then accessed secondary with maximum Number is limited, and the access limited number of times that any terminal is accessed to server in current access cycle is set as third access value;
If it is determined that current location information and information releasing position information is in the territorial scope of setting, then by any terminal The access limited number of times that server is accessed in current access cycle is set as the 4th access value;Wherein, third access value is more than 4th access value;
Optionally, the second access value is more than third access value.
Such as:The characteristic information of any terminal includes:The logon information of any terminal and the current location of any terminal Information;
When any terminal accesses server, whether any terminal login service device is judged based on logon information;
If it is determined that any terminal login service device, then it is limited for 50 times with maximum access times, by any terminal current The access limited number of times that server is accessed in 15 minutes access cycles is set as the first access value 50 times;
If it is determined that any terminal is not logged in server, then any terminal is accessed in current access cycle in 15 minutes and serviced The access limited number of times of device is set as the second access value 30 times;
Obtain information releasing position information (Beijing Haidian that the information in any terminal current accessed server includes Area);
Whether the current location information and information releasing position information (Haidian District, Beijing City) for judging any terminal are setting Region (Beijing) range in;
If it is determined that current location information (such as Fengtai District, Beijing City) and information releasing position information (Haidian District, Beijing City) In region (Beijing) range of setting, then it is limited for 50 times with maximum access times, by any terminal in current access cycle The access limited number of times that server is accessed in 15 minutes is set as third access value 25 times;
If it is determined that current location information (such as Tianjin) is not being set with information releasing position information (Haidian District, Beijing City) In fixed region (Beijing) range, then the access that any terminal is accessed to server in current access cycle 15 minutes limits Number is set as the 4th access value 15 times.
Optionally, the current location information of any terminal, including but not limited to:
The current IP address (Internet Protocol, the agreement interconnected between network) of any terminal is corresponding current Location information;
Work as alternatively, the current MAC address (Media Access Control, media access control) of any terminal is corresponding Front position information;
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
The equipment of limiting server visit capacity described in tenth embodiment of the invention, effectively can avoid malicious access from taking The additional server expense that business device is brought, realizes effective control to server resource.
Eleventh embodiment of the invention, a kind of equipment of limiting server visit capacity, as shown in figure 4, including consisting of Part:
Processor 701 and memory 702.In some embodiments of the invention, processor 701 and memory 702 can lead to Cross bus or other manner connection.
Processor 701 can be general processor, such as central processing unit (Central Processing Unit, CPU), it can also be digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (English: Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention One or more integrated circuits.Wherein, memory 702 is used to store the executable instruction of processor 701;
Memory 702 is transferred to processor 701 for storing program code, and by the program code.Memory 702 can To include volatile memory (Volatile Memory), such as random access memory (Random Access Memory, RAM);Memory 702 can also include nonvolatile memory (Non-Volatile Memory), such as read-only memory (Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid State hard disk (Solid-State Drive, SSD);Memory 702 can also include the combination of the memory of mentioned kind.
Wherein, the program code management code that processor 701 is used to that memory 702 to be called to store executes following operation:
1) according to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server, And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory, And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server Quantity can also be multiple.
2) when any terminal accesses server, according to the characteristic information of any terminal, it is limited with maximum access times, it will The access limited number of times that any terminal accesses server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal Front position information.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
3) obtain any terminal accessed in current access cycle server the first access times and any terminal upper The second access times of server are accessed in one access cycle;
In the case where the first access times are more than given threshold than the growth rate of the second access times, sent out to any terminal Verification information is sent, server is accessed so that any terminal is based on verification information.
Such as:It obtains any terminal and accesses the first access times 80 times of server and any in current access cycle Terminal accessed the second access times 40 times of server within a upper access cycle;
In the case where the first access times are more than given threshold 50% than the growth rate 100% of the second access times, to Any terminal sends verification information, and server is accessed so that any terminal is based on verification information.
The equipment of limiting server visit capacity described in eleventh embodiment of the invention, can effectively avoid malicious access The additional server expense that server is brought realizes effective control to server resource.
Twelveth embodiment of the invention, a kind of equipment of limiting server visit capacity, as shown in figure 4, including consisting of Part:
Processor 701 and memory 702.In some embodiments of the invention, processor 701 and memory 702 can lead to Cross bus or other manner connection.
Processor 701 can be general processor, such as central processing unit (Central Processing Unit, CPU), it can also be digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (English: Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention One or more integrated circuits.Wherein, memory 702 is used to store the executable instruction of processor 701;
Memory 702 is transferred to processor 701 for storing program code, and by the program code.Memory 702 can To include volatile memory (Volatile Memory), such as random access memory (Random Access Memory, RAM);Memory 702 can also include nonvolatile memory (Non-Volatile Memory), such as read-only memory (Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid State hard disk (Solid-State Drive, SSD);Memory 702 can also include the combination of the memory of mentioned kind.
Wherein, the program code management code that processor 701 is used to that memory 702 to be called to store executes following operation:
1) according to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined.
Wherein, the configuration information of server includes but not limited to:The quantity of server, the type of service of each server, And the load threshold of each server.
The load threshold of server includes at least following one:
The load threshold of server CPU, the load threshold of server memory and the load threshold of server network interface card.
In the load threshold for including server CPU of the load threshold of server, the load threshold of server memory, and clothes It is engaged in the case of the load threshold of device network interface card, calculating separately the load threshold of server CPU, the load threshold of server memory, And the percentage of the load threshold of server network interface card, set the percentage of maximum load threshold to the load of server Threshold value.
In the present embodiment, the quantity of server is not specifically limited, the quantity of server can be one, server Quantity can also be multiple.
2) when any terminal accesses server, according to the characteristic information of any terminal, it is limited with maximum access times, it will The access limited number of times that any terminal accesses server in current access cycle is set as setting access value.
Wherein, characteristic information includes at least one of following information:The logon information of any terminal and working as any terminal Front position information.
In the present embodiment, access cycle is not specifically limited, can be arranged according to engineering experience by designer and be accessed Period can also test according to limited number of time and obtain to reach the best access cycle for accessing limitation, can also be according to limited number of time meter The emulation of calculation machine is obtained to reach the best access cycle for accessing limitation time.
In the present embodiment, setting access value is not specifically limited, can be set according to engineering experience by designer Determine access value, can also be tested and be obtained to reach the best setting access value for accessing limitation according to limited number of time, it can also be according to having Limit time Computer Simulation is obtained to reach the best setting access value for accessing limitation time.
3) obtain any terminal accessed in current access cycle server the first access times and any terminal upper The second access times of server are accessed in one access cycle;
In the case where the first access times are more than given threshold than the growth rate of the second access times, sent out to any terminal Verification information is sent, server is accessed so that any terminal is based on verification information.
Such as:It obtains any terminal and accesses the first access times 80 times of server and any in current access cycle Terminal accessed the second access times 40 times of server within a upper access cycle;
In the case where the first access times are more than given threshold 50% than the growth rate 100% of the second access times, to Any terminal sends verification information, and server is accessed so that any terminal is based on verification information.
4) when monitoring that any terminal is not based on verification information access server within the set duration, forbid any terminal Server is accessed, and sends authentication failed information to any terminal.
The equipment of limiting server visit capacity described in twelveth embodiment of the invention, can effectively avoid malicious access The additional server expense that server is brought realizes effective control to server resource.
Thriteenth embodiment of the invention, a kind of computer readable storage medium.
Computer storage media can be RAM memory, flash memory, ROM memory, eprom memory, EEPROM storages The storage medium of device, register, hard disk, mobile hard disk, CD-ROM or any other form known in the art.
Computer-readable recording medium storage there are one or multiple programs, one or more program can by one or The multiple processors of person execute, with realize in first embodiment of the invention to sixth embodiment of the invention in any embodiment part or Overall Steps.
Computer readable storage medium described in thriteenth embodiment of the invention is stored with one or more program, should One or more program can be executed by one or more processor, can effectively avoid malicious access server from bringing Additional server expense realizes effective control to server resource.
Fourteenth embodiment of the invention, the present embodiment are on the basis of the above embodiments, with limiting server visit capacity Method for, introduce an application example of the invention in conjunction with attached drawing 5.
Step S1401, configuration server cluster.
Wherein, configuration server number of clusters is W, and the type of service of configuration server cluster, configuration server is loading Energy threshold values etc.;W is positive integer.
Step S1402, when the list page in terminal request server cluster, judge terminal whether login service device collection Group.
Step S1403, if terminal login service device cluster, by the current access cycle of terminal access server cluster Interior access limited number of times is set as N;
Step S1404, if terminal is not logged in server cluster, in the current access cycle of terminal access server cluster Access limited number of times be set as M;
Wherein, N is more than M;N and M is positive integer.
Step S1405, terminal by cookie (being stored in the data on user local terminal) information service device cluster, Server cluster is saved cookie information by Redis databases, to be verified when details page is checked.
Wherein, Redis be based on memory also can persistence log type, Key-Value (key assignments) database.
Step S1406 judges whether the information in the server of terminal access is same according to the IP address information of terminal City;
Step S1407, if the information in the server of terminal access is same city, by terminal access server cluster Access limited number of times in current access cycle is set as P;
Step S1408 passes through preset nginx frequencies if the information in the server of terminal access is not same city Control module sets the access limited number of times in the current access cycle of terminal access server cluster to Q;
Wherein, P is positive integer more than Q, P and Q.
Step S1409, in the case that information in the server for judging terminal access is same city, when terminal access takes When the access times being engaged in the current access cycle of device cluster increase by 20% on a year-on-year basis, by nginx frequency control modules, control is eventually Whether end input identifying code just can be accessed normally, for being letter in a large amount of acquisition servers of machine the terminal that verifies access Breath.
Step S1410 is supervised after the original list in terminal access server has loaded by JavaScript It listens, when user clicks URL (Uniform Resource Locator, uniform resource locator) by terminal, by cookie Etc. marks be appended to behind URL, the information such as cookie are verified by Redis in details page.Verification unsuccessfully return 403 to The terminal, so that tissue sampling person acquires.
A kind of method of limiting server visit capacity described in fourteenth embodiment of the invention can effectively avoid malice The additional server expense that server is brought is accessed, effective control to server resource is realized.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (11)

1. a kind of method of limiting server visit capacity, which is characterized in that including:
According to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined;
When any terminal accesses the server, according to the characteristic information of any terminal, with the maximum access times It is limited, the access limited number of times that any terminal is accessed to the server in current access cycle is set as setting access Value;
Wherein, the characteristic information includes at least one of following information:The logon information of any terminal and described any The current location information of terminal.
2. according to the method described in claim 1, it is characterized in that, the characteristic information according to any terminal, with institute It states maximum access times to be limited, any terminal is accessed to the access limited number of times of the server in current access cycle It is set as setting access value, including:
In the case where the characteristic information includes the logon information, judge that any terminal is based on the logon information It is no to have logged in the server;
If so, being limited with the maximum access times, any terminal is accessed into the service in current access cycle The access limited number of times of device is set as the first access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as second Access value;
Wherein, first access value is more than second access value.
3. method according to claim 1 or 2, which is characterized in that the characteristic information according to any terminal, with The maximum access times are limited, and any terminal is accessed to the access limitation time of the server in current access cycle Number is set as setting access value, including:
In the case where the characteristic information includes the current location information, obtains and taken described in any terminal current accessed The information releasing position information that information in business device includes;
Judge the current location information with described information releasing position information whether in the territorial scope of setting;
If so, being limited with the maximum access times, any terminal is accessed into the service in current access cycle The access limited number of times of device is set as third access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as the 4th Access value;
Wherein, the third access value is more than the 4th access value.
4. according to the method described in claim 1, it is characterized in that, the method further includes:
It obtains any terminal and accesses the first access times of the server and any end in current access cycle End accessed the second access times of the server within a upper access cycle;
In the case where first access times are more than given threshold than the growth rate of second access times, to described One terminal sends verification information, and the server is accessed so that any terminal is based on the verification information.
5. according to the method described in claim 4, it is characterized in that, to any terminal send verification information after, institute The method of stating further includes:
When monitoring that any terminal is not based on the verification information access server within the set duration, forbid institute It states any terminal and accesses the server, and send authentication failed information to any terminal.
6. a kind of equipment of limiting server visit capacity, which is characterized in that the equipment includes processor and memory;
The processor is used to execute the program of the limiting server visit capacity stored in memory, to realize following steps:
According to the configuration information of server, the setting interior maximum access times for accessing server access cycle are determined;
When any terminal accesses the server, according to the characteristic information of any terminal, with the maximum access times It is limited, the access limited number of times that any terminal is accessed to the server in current access cycle is set as setting access Value;
Wherein, the characteristic information includes at least one of following information:The logon information of any terminal and described any The current location information of terminal.
7. equipment according to claim 6, which is characterized in that the characteristic information according to any terminal, with institute It states maximum access times to be limited, any terminal is accessed to the access limited number of times of the server in current access cycle It is set as setting access value, including:
In the case where the characteristic information includes the logon information, judge that any terminal is based on the logon information It is no to have logged in the server;
If so, being limited with the maximum access times, any terminal is accessed into the service in current access cycle The access limited number of times of device is set as the first access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as second Access value;
Wherein, first access value is more than second access value.
8. the equipment described according to claim 6 or 7, which is characterized in that the characteristic information according to any terminal, with The maximum access times are limited, and any terminal is accessed to the access limitation time of the server in current access cycle Number is set as setting access value, including:
In the case where the characteristic information includes the current location information, obtains and taken described in any terminal current accessed The information releasing position information that information in business device includes;
Judge the current location information with described information releasing position information whether in the territorial scope of setting;
If so, being limited with the maximum access times, any terminal is accessed into the service in current access cycle The access limited number of times of device is set as third access value;
Otherwise access limited number of times that any terminal is accessed to the server in current access cycle is set as the 4th Access value;
Wherein, the third access value is more than the 4th access value.
9. equipment according to claim 6, which is characterized in that the processor is additionally operable to execute the limit stored in memory The program of control server visit capacity, to realize following steps:
It obtains any terminal and accesses the first access times of the server and any end in current access cycle End accessed the second access times of the server within a upper access cycle;
In the case where first access times are more than given threshold than the growth rate of second access times, to described One terminal sends verification information, and the server is accessed so that any terminal is based on the verification information.
10. equipment according to claim 9, which is characterized in that it is described to any terminal send verification information it Afterwards, the processor is additionally operable to execute the program of the limiting server visit capacity stored in memory, to realize following steps:
When monitoring that any terminal is not based on the verification information access server within the set duration, forbid institute It states any terminal and accesses the server, and send authentication failed information to any terminal.
11. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage there are one or Multiple programs, one or more of programs can be executed by one or more processor, to realize in Claims 1 to 5 The step of method of any one of them limiting server visit capacity.
CN201711444298.5A 2017-12-27 2017-12-27 Method, apparatus and computer-readable storage medium for limiting server access volume Active CN108306859B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711444298.5A CN108306859B (en) 2017-12-27 2017-12-27 Method, apparatus and computer-readable storage medium for limiting server access volume

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711444298.5A CN108306859B (en) 2017-12-27 2017-12-27 Method, apparatus and computer-readable storage medium for limiting server access volume

Publications (2)

Publication Number Publication Date
CN108306859A true CN108306859A (en) 2018-07-20
CN108306859B CN108306859B (en) 2020-12-01

Family

ID=62867793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711444298.5A Active CN108306859B (en) 2017-12-27 2017-12-27 Method, apparatus and computer-readable storage medium for limiting server access volume

Country Status (1)

Country Link
CN (1) CN108306859B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614255A (en) * 2018-10-23 2019-04-12 平安科技(深圳)有限公司 Processing method, device, medium and the electronic equipment of transaction request

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104767689A (en) * 2014-01-07 2015-07-08 腾讯科技(深圳)有限公司 Method of controlling network access amount and server
CN105282047A (en) * 2015-09-25 2016-01-27 小米科技有限责任公司 Access request processing method and device
US20170118249A1 (en) * 2015-10-23 2017-04-27 Oracle International Corporation Managing security agents in a distributed environment
CN107277008A (en) * 2017-06-16 2017-10-20 福建中金在线信息科技有限公司 It is a kind of to limit method, device and the electronic equipment for accessing network interface

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104767689A (en) * 2014-01-07 2015-07-08 腾讯科技(深圳)有限公司 Method of controlling network access amount and server
CN105282047A (en) * 2015-09-25 2016-01-27 小米科技有限责任公司 Access request processing method and device
US20170118249A1 (en) * 2015-10-23 2017-04-27 Oracle International Corporation Managing security agents in a distributed environment
CN107277008A (en) * 2017-06-16 2017-10-20 福建中金在线信息科技有限公司 It is a kind of to limit method, device and the electronic equipment for accessing network interface

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614255A (en) * 2018-10-23 2019-04-12 平安科技(深圳)有限公司 Processing method, device, medium and the electronic equipment of transaction request
CN109614255B (en) * 2018-10-23 2023-04-07 平安科技(深圳)有限公司 Transaction request processing method, device, medium and electronic equipment

Also Published As

Publication number Publication date
CN108306859B (en) 2020-12-01

Similar Documents

Publication Publication Date Title
KR101781339B1 (en) Method and device for updating client
CN109327439B (en) Risk identification method and device for service request data, storage medium and equipment
EP3396905B1 (en) Method and device for securely sending a message
CN103718527B (en) Communication security processing method, apparatus and system
CN109495467B (en) Method and device for updating interception rule and computer readable storage medium
DE112012000744T5 (en) Detection of a Trojan horse
CN105897674A (en) DDoS attack protection method applied to CDN server group and system
CN105049290B (en) Page access monitoring method and device
CN109981702B (en) File storage method and system
CN114338064B (en) Method, device, system, equipment and storage medium for identifying network traffic type
US10609206B1 (en) Auto-repairing mobile communication device data streaming architecture
CN104301161A (en) Computing method, computing device and communication system for business quality index
CN110830234A (en) User traffic distribution method and device
CN107644161A (en) Safety detecting method, device and the equipment of sample
CN105991596A (en) Access control method and system
CN116015721A (en) Illegal external connection detection method, system, electronic equipment and medium
KR102354058B1 (en) Method for monitoring server, apparatus and system for executing the method
CN106067879A (en) The detection method of information and device
CN108270753B (en) Method and device for logging out user account
CN104519069A (en) Method and device for intercepting resource requests
CN108306859A (en) Method, equipment and the computer readable storage medium of limiting server visit capacity
CN113098852A (en) Log processing method and device
CN110808967B (en) Detection method for challenging black hole attack and related device
CN110557371A (en) Access limiting method, system, readable storage medium and game server
CN114244555B (en) Security policy adjusting method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant