CN110035068A - It is a kind of it is counter grab station system close method and device down - Google Patents
It is a kind of it is counter grab station system close method and device down Download PDFInfo
- Publication number
- CN110035068A CN110035068A CN201910192236.2A CN201910192236A CN110035068A CN 110035068 A CN110035068 A CN 110035068A CN 201910192236 A CN201910192236 A CN 201910192236A CN 110035068 A CN110035068 A CN 110035068A
- Authority
- CN
- China
- Prior art keywords
- access
- return
- close
- return value
- special interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the present invention provide it is a kind of it is counter grab station system close method and device down, the described method includes: analyzing access log data in real time, when determining that the number for requesting access to special interface in the first set time period as access IP is more than the first given threshold, the access IP is labeled as to close IP down;When it is described close IP down access request issued again to the special interface when, intercept the access request, and return to the return value that the expression of dynamic mapping normally accesses to the IP address of closing down.According to the technique and scheme of the present invention, it is monitored by the IP for being greater than given threshold to access times, and return value setting is carried out to the IP, so that it is more persistently effective to close effect down.
Description
Technical field
The present invention relates to network safety fileds, and in particular to it is a kind of it is counter grab station system close method and device down.
Background technique
Website is to user's output data, and at this moment some users are in a variety of causes, uses the net of the machine simulation mankind
Access to web page request.Such machine access general quantity is very big also very frequent, will cause undesirable shadow to the health status of server
It rings.And it is crawled there are website core data by criminal or core interface is by the risk of a large amount of brush amounts.
In realizing process of the present invention, at least there are the following problems in the prior art for inventor's discovery:
In the prior art, for these access times, frequently and largely access IP will do it shielding, this to close immediately
Method, it is easy to the anti-means grabbing station system and using in website side are found out by criminal, criminal is sent out quickly
Show shielded IP and carry out other trials, criminal can analyze the reason of being sealed if finding that oneself is closed, then needle
The program for improving oneself of property is had access to reach its purpose to bypass shielding mode.Then one side of website needs to continue
It is fought with it, increases workload and difficulty to the maintenance work of website.
Summary of the invention
The embodiment of the present invention provide it is a kind of it is counter grab station system close method and device down, set by being greater than to access times
The IP of threshold value is monitored, and carries out return value setting to the IP, so that it is more persistently effective to close effect down.
On the one hand, the embodiment of the invention provides it is a kind of it is counter grab station system close method down, which comprises
Analysis access log data in real time determine to request access to special interface in the first set time period as access IP
Number be more than the first given threshold when, by the access IP be labeled as close IP down;
When it is described close IP down access request issued again to the special interface when, intercept the access request, and to institute
State close down IP address return can dynamic mapping the return value that normally accesses of expression.
On the other hand, the embodiment of the invention provides a kind of anti-device of closing down for grabbing station system, described device includes:
IP closes unit down, for analyzing access log data in real time, determines when access IP is in the first set time period
When requesting access to the number of special interface more than the first given threshold, the access IP is labeled as to close IP down;
Access value return unit, for when it is described close IP down access request issued again to the special interface when, intercept
The access request, and to it is described close down IP address return can dynamic mapping the return value that normally accesses of expression.
Above-mentioned technical proposal has the following beneficial effects:
According to the technical solution of the application, due to closing method using new in the anti-part of closing for grabbing station system, to
The IP address closed down returns to normal access value, prevent criminal has been sealed when its IP is closed from discovering oneself,
And the anti-working principle for grabbing station system in website can not be inferred according to access result, effectively avoid website core data by not
Method molecule crawls or core interface is by a large amount of brush amounts.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is the flow chart for closing method down of one of embodiment of the present invention;
Fig. 2 is the flow chart for closing method down of one of embodiment of the present invention;
Fig. 3 is the flow chart for closing method down of one of embodiment of the present invention;
Fig. 4 is the structural schematic diagram for closing device down of one of embodiment of the present invention.
Fig. 5 is the structural schematic diagram for closing device down of one of embodiment of the present invention.
Fig. 6 is the structural schematic diagram for closing device down of one of embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, one kind provided by the invention it is counter grab station system close method down, comprising:
101, in real time analysis access log data, determine when access IP requested access in the first set time period it is specific
When the number of interface is more than given threshold, the access IP is labeled as to close IP down;
102, when it is described close IP down access request issued again to the special interface when, intercept the access request, and
To the IP address return can dynamic mapping the return value that normally accesses of expression.
Anti- station system of grabbing analyzes data in real time, it is found that certain ip request certain interface daily is more than that n times then deposit these ip
Enter database.In the system of closing, periodic reading closes ip list from database.For the address the ip A closed and spy
Stationary interface O, if A issues the http request of a request O:
According to the format F appointed in advance, the data F (O) of the format is returned to A, and this http state returned is
200 (return for the normal request that do not close is 200).
Format F is referred to the normal return value format of O.It will appear special field in F and need to close system special disposal.
If there is interface O:abc.com/u in certain website? u=13334562345;Assuming that this interface is very crucial, input handset
Number, it returns and whether there is this user in website.Such interface can be programmed by criminal and access in batches, and then it can be criticized
Any cell-phone number is measured with the presence or absence of having registered account in website.
This interface return value are as follows:
{ " exist ": true } or { " exist ": false }
Present definition format F (O)={ " exist ": true }
If counter grab station system discovery, the address ip is more than the first given threshold for the O Interface that accesses for ip mono- day of A, such as
5000 times, A joined and close ip list and be stored in database.
System is closed at this time, and A is read by database.Later if A has initiated the access to O again, system is closed at this time
It can request to return to F (O) to this, i.e. return { " exist ": true }, while http status code is 200.It looks like and is not sealed
Prohibit, is to be closed in fact, the return of this data is invalid.
In fact, return value is not fixed and invariable in a practical situation, return value how to be allowed to more tend to true and make
Must appear as and not closed down, the application further provide can dynamic mapping the setting side of return value that normally accesses of expression
Formula.
It is further preferred that as shown in Fig. 2, determining in the real-time analysis access log data when access IP is first
When requesting access to the number of special interface in set time period more than the first given threshold, the access IP is labeled as closing down
Before IP, the method also includes:
100, by return to the return value for closing IP down be set as can dynamic mapping the return value that normally accesses of expression.
Further, the method also includes:
After being labeled as the access IP to close IP down, counts described in each second set time period and close IP down
Access the number of the special interface;
Next second set time period reach when, if it is described close down IP access the special interface number it is big
In the second given threshold, then replace return value generation mode, and by it is described close down IP access the special interface number it is clear
Zero;Otherwise, directly by the number clearing closed IP down and access the special interface.
For not closed ip, truthful data is returned, i.e., whether there is this user in website, there is return
{ " exist ": true }, there is no return to { " exist ": false }
For being closed ip, according to the technical solution of the application, no matter whether this user registers in website can all be returned
{ " exist ": true }, such data are false, and criminal will not have found exception therein immediately.If method F
It is processed according to following template, is less susceptible to be found.
Return value to access the expression of dynamic mapping normally level off to normal access when (as closed down IP access
When) return value, template can also be increased in method F, such as:
{ " exist ": the true } or { " exist ": false } returned at random when setting return value to return,
F (O)=" exist ": [true | false] }
Here [true | false] generates random true or false when showing by returning.
The Message Digest 5 value generated at random when setting return value to return,
F (O)=" exist ": [true | false], " mkid ": [randommd5]
Here [randommd5] generates random md5 value when showing by returning.
The numerical value between 10000 to 20000 generated at random when setting return value to return,
F (O)={ " posid ": [D10000, D20000] }
The numerical value between random 10000 to 20000 is generated when [D10000, D20000] shows by returning.
The website of one setting of access, the return value that the website of the setting is returned as the return value set,
F (O)=" data ": [URL | www.abc.com/c? u=1] }
Here in F (O) template, [URL | www.abc.com/c? u=1] do representative conference access www.abc.com/c in advance?
U=1 is attached to the return value of access in the return value to A.Such scheme has more scalability.The example of return value is for example
{“data”:{“at”:”20180808”}}。
A kind of this scheme is selected in actual production, because it is with scalability.Such as we build a domain name and are
The server of www.abc.com, this server be used to analyze and close situation, and does equipped with WebServer to F (O)
It returns out.Here all templates before the F (O) returned also may include.Such as interface c can be returned " posid ":
[D10000,D20000],”mkid”:[randommd5]}。
In practical operation, F (O) is also dynamic change, and the server that domain name is www.abc.com can real-time statistics interface
Close number, write as M:{ " a ": 30, " b ": 78800, " U ": 299 this form, each hour empties once.Empty it
Before, M is traversed, is found out and is closed number different F is taken in next hour to this interface greater than the interface of the second given threshold K
(O) method.
For example, M:{ " a ": 30, " b ": 78800, " U ": 299 }, this is to close statistical result in one hour.K=
10000.It is found that interface b is the more serious interface brushed.So there is the scheme of a set of replacement F (O) for this interface,
Assuming that the normal return value of b is as follows:
This hour is assumed again, and the F (O) of interface b is:
So next hour changes the F (O) of interface b are as follows:
The data that this change allows crawler side criminal to take are wrong.And crawler side criminal is difficult to find
What it was taken is the data of mistake, it is difficult to ponder correctness.
Select the strategy of F (O) that pseudo random number method: a such as c interface can also be used when a specific hour
There is M kind F (O) it can be selected that then: taking system timestamp T, obtains Tx divided by 1000*60*60, then several by pseudorandom of Tx
Son one pseudo random number of construction.Java code is as follows:
ChosenF=new Random (Tx*47*c.hashCode ()) .nextInt (M);
ChosenF is F (O) that should be selected in current hour lower interface c
47 be the prime number randomly selected, and any biggish prime number is ok, and the hashcode of the same c is identical, nextInt
(M) look like 0 Dao M-1 natural number being randomly generated.First nextInt that the same pseudo-random number seed generates is identical
, this is the cooperation problem for considering distributed system.
It is further preferred that as shown in figure 3, it is described by the access IP labeled as after closing IP down, further includes:
1011, closing down in IP address list in IP deposit real-time data base is closed down by described;
1012, it is periodically read in real-time data base and closes IP address list down.
As shown in figure 4, one kind provided by the invention it is counter grab station system close device down, comprising:
IP closes unit 21 down, for analyzing access log data in real time, determines when access IP is in the first set time period
When inside requesting access to the number of special interface more than given threshold, the access IP is labeled as to close IP down;
Return and ask value return unit 22, for when it is described close IP down access request issued again to the special interface when, block
Cut the access request, and to it is described close down IP address return can dynamic mapping the return value that normally accesses of expression.
It is further preferred that being used for as shown in figure 5, described device further includes return value setup unit 20:
In the real-time analysis access log data, determine to request access to spy in the first set time period as access IP
When the number of stationary interface is more than given threshold, by the access IP labeled as before closing IP down, the return for closing IP down will be returned to
Value be set as can dynamic mapping the return value that normally accesses of expression.
Further, device further include:
Mode conversion unit 23, for after being labeled as the access IP to close IP down, counting each second setting
It is described in time cycle to close the number that IP accesses the special interface down;
Next second set time period reach when, if it is described close down IP access the special interface number it is big
In the second given threshold, then replace return value generation mode, and by it is described close down IP access the special interface number it is clear
Zero;Otherwise, directly by the number clearing closed IP down and access the special interface.
It is further preferred that the mode that the return value generates includes:
The return value that the website of the setting returns is indicated that is normally accessed returns as described by the website of one setting of access
Return value;Or,
{ " exist ": the true } or { " exist ": false } generated at random when setting return value to return;Or,
The Message Digest 5 value generated at random when setting return value to return;Or,
The numerical value between 10000 to 20000 generated at random when setting return value to return;Or,
Return value is set as the pseudo random number that constructs according to pseudo random number method.
It is further preferred that as shown in fig. 6, described device further includes data storage cell 22 and data-reading unit 23,
The data storage cell 211 is used for, it is described by the access IP labeled as after closing IP down, closed down described
Closing down in IP address list in IP deposit real-time data base;
The data-reading unit 212 is used for, and is periodically read in real-time data base and is closed IP address list down.
Due to closing method using new in the anti-part of closing for grabbing station system, criminal cannot examine when being closed
Feel that oneself is sealed, and can not infer the anti-working principle for grabbing station system in website according to access result, effectively avoids
Website core data is crawled by criminal or core interface is by a large amount of brush amounts.
It should be understood that the particular order or level of the step of during disclosed are the examples of illustrative methods.Based on setting
Count preference, it should be appreciated that in the process the step of particular order or level can be in the feelings for the protection scope for not departing from the disclosure
It is rearranged under condition.Appended claim to a method is not illustratively sequentially to give the element of various steps, and not
It is to be limited to the particular order or level.
In above-mentioned detailed description, various features are combined together in single embodiment, to simplify the disclosure.No
This published method should be construed to reflect such intention, that is, the embodiment of theme claimed needs to compare
The more features of the feature clearly stated in each claim.On the contrary, as appended claims is reflected
Like that, the present invention is in the state fewer than whole features of disclosed single embodiment.Therefore, appended claims
It is hereby expressly incorporated into detailed description, wherein each claim is used as alone the individual preferred embodiment of the present invention.
For can be realized any technical staff in the art or using the present invention, above to disclosed embodiment into
Description is gone.To those skilled in the art;The various modifications mode of these embodiments will be apparent from, and this
The General Principle of text definition can also be suitable for other embodiments on the basis of not departing from the spirit and scope of the disclosure.
Therefore, the disclosure is not limited to embodiments set forth herein, but most wide with principle disclosed in the present application and novel features
Range is consistent.
Description above includes the citing of one or more embodiments.Certainly, in order to describe above-described embodiment and description portion
The all possible combination of part or method is impossible, but it will be appreciated by one of ordinary skill in the art that each implementation
Example can do further combinations and permutations.Therefore, embodiment described herein is intended to cover fall into the appended claims
Protection scope in all such changes, modifications and variations.In addition, with regard to term used in specification or claims
The mode that covers of "comprising", the word is similar to term " includes ", just as " including " solved in the claims as transitional word
As releasing.In addition, the use of any one of specification in claims term "or" being to indicate " non-exclusionism
Or ".
Those skilled in the art will also be appreciated that the various illustrative components, blocks that the embodiment of the present invention is listed
(illustrative logical block), unit and step can by electronic hardware, computer software, or both knot
Conjunction is realized.For the replaceability (interchangeability) for clearly showing that hardware and software, above-mentioned various explanations
Property component (illustrative components), unit and step universally describe their function.Such function
It can be that the design requirement for depending on specific application and whole system is realized by hardware or software.Those skilled in the art
Can be can be used by various methods and realize the function, but this realization is understood not to for every kind of specific application
Range beyond protection of the embodiment of the present invention.
Various illustrative logical blocks or unit described in the embodiment of the present invention can by general processor,
Digital signal processor, specific integrated circuit (ASIC), field programmable gate array or other programmable logic devices, discrete gate
Or transistor logic, discrete hardware components or above-mentioned any combination of design carry out implementation or operation described function.General place
Managing device can be microprocessor, and optionally, which may be any traditional processor, controller, microcontroller
Device or state machine.Processor can also be realized by the combination of computing device, such as digital signal processor and microprocessor,
Multi-microprocessor, one or more microprocessors combine a digital signal processor core or any other like configuration
To realize.
The step of method described in the embodiment of the present invention or algorithm can be directly embedded into hardware, processor execute it is soft
The combination of part module or the two.Software module can store in RAM memory, flash memory, ROM memory, EPROM storage
Other any form of storaging mediums in device, eeprom memory, register, hard disk, moveable magnetic disc, CD-ROM or this field
In.Illustratively, storaging medium can be connect with processor, so that processor can read information from storaging medium, and
It can be to storaging medium stored and written information.Optionally, storaging medium can also be integrated into the processor.Processor and storaging medium can
To be set in asic, ASIC be can be set in user terminal.Optionally, processor and storaging medium also can be set in
In different components in the terminal of family.
In one or more exemplary designs, above-mentioned function described in the embodiment of the present invention can be in hardware, soft
Part, firmware or any combination of this three are realized.If realized in software, these functions be can store and computer-readable
On medium, or it is transferred on a computer readable medium in the form of one or more instructions or code forms.Computer readable medium includes electricity
Brain storaging medium and convenient for so that computer program is allowed to be transferred to from a place telecommunication media in other places.Storaging medium can be with
It is that any general or special computer can be with the useable medium of access.For example, such computer readable media may include but
It is not limited to RAM, ROM, EEPROM, CD-ROM or other optical disc storages, disk storage or other magnetic storage devices or other
What can be used for carry or store with instruct or data structure and it is other can be by general or special computer or general or specially treated
The medium of the program code of device reading form.In addition, any connection can be properly termed computer readable medium, example
Such as, if software is to pass through a coaxial cable, fiber optic cables, double from a web-site, server or other remote resources
Twisted wire, Digital Subscriber Line (DSL) are defined with being also contained in for the wireless way for transmitting such as example infrared, wireless and microwave
In computer readable medium.The disk (disk) and disk (disc) includes compress disk, radium-shine disk, CD, DVD, floppy disk
And Blu-ray Disc, disk is usually with magnetic replicate data, and disk usually carries out optically replicated data with laser.Combinations of the above
Also it may be embodied in computer readable medium.
Above-described specific embodiment has carried out further the purpose of the present invention, technical scheme and beneficial effects
It is described in detail, it should be understood that being not intended to limit the present invention the foregoing is merely a specific embodiment of the invention
Protection scope, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include
Within protection scope of the present invention.
Claims (10)
1. it is a kind of it is counter grab station system close method down, which is characterized in that the described method includes:
Analysis access log data in real time, when the number that access IP requests access to special interface in the first set time period is super
When crossing the first given threshold, the access IP is labeled as to close IP down;
When it is described close IP down access request issued again to the special interface when, intercept the access request, and to the envelope
Prohibit IP address return can dynamic mapping the return value that normally accesses of expression.
2. one kind according to claim 1 is counter grab station system close method down, which is characterized in that visited in the real-time analysis
It asks daily record data, is more than the first given threshold when access IP requests access to the number of special interface in the first set time period
When, before being labeled as the access IP to close IP down, the method also includes:
By be used to return to close down IP return value be set as can dynamic mapping the return value that normally accesses of expression.
3. one kind according to claim 2 is counter grab station system close method down, which is characterized in that the method also includes:
The access IP is being accessed labeled as the IP that closes down in each second set time period after closing IP down, is counted
The number of the special interface;
When next second set time period reaches, if it is described close IP down and access the number of the special interface be greater than the
Two given thresholds, then replace return value generation mode, and by it is described close down IP access the special interface number reset;It is no
Then, directly by the number clearing closed IP down and access the special interface.
4. one kind according to claim 3 is counter grab station system close method down, which is characterized in that the return value generated
Mode includes:
The website of one setting of access, using the return value that the website of the setting returns as the return for indicating normally to access
Value;Or,
{ " exist ": the true } or { " exist ": false } generated at random when setting return value to return;Or,
The Message Digest 5 value generated at random when setting return value to return;Or,
The numerical value between 10000 to 20000 generated at random when setting return value to return;Or,
Return value is set as the pseudo random number that constructs according to pseudo random number method.
5. one kind according to claim 1 is counter grab station system close method down, which is characterized in that marked by the access IP
It is denoted as after closing IP down, further includes:
Closing down in IP address list in IP deposit real-time data base is closed down by described;
It is periodically read in real-time data base and closes IP address list down.
6. it is a kind of it is counter grab station system close device down, which is characterized in that described device includes:
IP closes unit down, for analyzing access log data in real time, when access IP is requested access in the first set time period
When the number of special interface is more than the first given threshold, the access IP is labeled as to close IP down;
Return value return unit, for when it is described close IP down access request issued again to the special interface when, described in interception
Access request, and to it is described close down IP address return can dynamic mapping the return value that normally accesses of expression.
7. one kind according to claim 6 is counter grab station system close device down, which is characterized in that described device further include:
Return value setup unit is used in the real-time analysis access log data, when access IP is in the first set time period
When inside requesting access to the number of special interface more than given threshold, by the access IP labeled as before closing IP down, it will return to
Close down IP return value be set as can dynamic mapping the return value that normally accesses of expression.
8. one kind according to claim 7 is counter grab station system close device down, which is characterized in that described device further include:
Mode conversion unit, for labeled as after closing IP down, it is all to be counted each second setting time by the access IP
It is described in phase to close the number that IP accesses the special interface down;
When next second set time period reaches, if it is described close IP down and access the number of the special interface be greater than the
Two given thresholds, then replace return value generation mode, and by it is described close down IP access the special interface number reset;It is no
Then, directly by the number clearing closed IP down and access the special interface.
9. one kind according to claim 8 is counter grab station system close device down, which is characterized in that the return value generated
Mode includes:
The website of one setting of access, using the return value that the website of the setting returns as the return for indicating normally to access
Value;Or,
{ " exist ": the true } or { " exist ": false } generated at random when setting return value to return;Or,
The Message Digest 5 value generated at random when setting return value to return;Or,
The numerical value between 10000 to 20000 generated at random when setting return value to return;Or,
Return value is set as the pseudo random number that constructs according to pseudo random number method.
10. one kind according to claim 9 is counter grab station system close device down, which is characterized in that described device further includes
Data storage cell and data-reading unit, in which:
The data storage cell, for labeled as after closing IP down, closing the access IP down IP deposit in real time for described
Closing down in IP address list in database;
The data-reading unit closes IP address list down for periodically reading in real-time data base.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910192236.2A CN110035068B (en) | 2019-03-14 | 2019-03-14 | Sealing forbidding method and device for anti-grabbing station system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910192236.2A CN110035068B (en) | 2019-03-14 | 2019-03-14 | Sealing forbidding method and device for anti-grabbing station system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110035068A true CN110035068A (en) | 2019-07-19 |
CN110035068B CN110035068B (en) | 2021-10-01 |
Family
ID=67236007
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910192236.2A Active CN110035068B (en) | 2019-03-14 | 2019-03-14 | Sealing forbidding method and device for anti-grabbing station system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110035068B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105187396A (en) * | 2015-08-11 | 2015-12-23 | 小米科技有限责任公司 | Method and device for identifying web crawler |
US20160277429A1 (en) * | 2014-03-28 | 2016-09-22 | Amazon Technologies, Inc. | Token based automated agent detection |
CN106060053A (en) * | 2016-06-12 | 2016-10-26 | 上海携程商务有限公司 | Method and system for automatically identifying and cleaning abnormal connection based on firewall |
CN106230835A (en) * | 2016-08-04 | 2016-12-14 | 摩贝(上海)生物科技有限公司 | Method based on the anti-malicious access that Nginx log analysis and IPTABLES forward |
CN107222471A (en) * | 2017-05-26 | 2017-09-29 | 微梦创科网络科技(中国)有限公司 | A kind of recognition methods of unartificial brush functional interface and identifying system |
CN107766727A (en) * | 2016-08-16 | 2018-03-06 | 联想(新加坡)私人有限公司 | For the device and method for allowing to conduct interviews to wrong data |
CN108173825A (en) * | 2017-12-21 | 2018-06-15 | 北京奇安信科技有限公司 | A kind of network flow auditing method and device |
CN108876058A (en) * | 2018-07-27 | 2018-11-23 | 南京航空航天大学 | A kind of media event influence force prediction method based on microblogging |
CN109246070A (en) * | 2018-06-28 | 2019-01-18 | 中译语通科技股份有限公司 | A kind of method that anti-data crawl |
-
2019
- 2019-03-14 CN CN201910192236.2A patent/CN110035068B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160277429A1 (en) * | 2014-03-28 | 2016-09-22 | Amazon Technologies, Inc. | Token based automated agent detection |
CN105187396A (en) * | 2015-08-11 | 2015-12-23 | 小米科技有限责任公司 | Method and device for identifying web crawler |
CN106060053A (en) * | 2016-06-12 | 2016-10-26 | 上海携程商务有限公司 | Method and system for automatically identifying and cleaning abnormal connection based on firewall |
CN106230835A (en) * | 2016-08-04 | 2016-12-14 | 摩贝(上海)生物科技有限公司 | Method based on the anti-malicious access that Nginx log analysis and IPTABLES forward |
CN107766727A (en) * | 2016-08-16 | 2018-03-06 | 联想(新加坡)私人有限公司 | For the device and method for allowing to conduct interviews to wrong data |
CN107222471A (en) * | 2017-05-26 | 2017-09-29 | 微梦创科网络科技(中国)有限公司 | A kind of recognition methods of unartificial brush functional interface and identifying system |
CN108173825A (en) * | 2017-12-21 | 2018-06-15 | 北京奇安信科技有限公司 | A kind of network flow auditing method and device |
CN109246070A (en) * | 2018-06-28 | 2019-01-18 | 中译语通科技股份有限公司 | A kind of method that anti-data crawl |
CN108876058A (en) * | 2018-07-27 | 2018-11-23 | 南京航空航天大学 | A kind of media event influence force prediction method based on microblogging |
Also Published As
Publication number | Publication date |
---|---|
CN110035068B (en) | 2021-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105933163B (en) | The real-time distributed debugging tracking of one kind and system | |
US11238036B2 (en) | System performance logging of complex remote query processor query operations | |
US8595847B2 (en) | Systems and methods to control web scraping | |
CN108920966A (en) | A kind of block chain deposits card, evidence collecting method and device | |
CN106302534B (en) | A kind of method and system of detection and processing illegal user | |
CN104765689B (en) | A kind of interface capability data supervise method and apparatus in real time | |
CN105306465B (en) | Web portal security accesses implementation method and device | |
CN103685304A (en) | Method and system for sharing session information | |
CN107122377A (en) | Automatic Adaptation Data collection and storage assembly | |
CN106027528B (en) | A kind of method and device of the horizontal permission automatic identification of WEB | |
CN106126551A (en) | A kind of generation method of Hbase database access daily record, Apparatus and system | |
CN110457626A (en) | A kind of abnormal access request screening technique and device | |
CN104156300A (en) | Log management system and log management method | |
CN103729166B (en) | Method, device and system for determining thread relation of program | |
CN109271600A (en) | A kind of monitoring method of performance data, system and device | |
CN110008197A (en) | A kind of data processing method, system and electronic equipment and storage medium | |
Aldin et al. | Strict timed causal consistency as a hybrid consistency model in the cloud environment | |
CN108363649A (en) | A kind of method and device of distribution statistical log visit capacity | |
CN107197000A (en) | Static dynamic hybrid cache method, apparatus and system | |
CN110035068A (en) | It is a kind of it is counter grab station system close method and device down | |
CN109040344A (en) | A kind of NAT penetrating method, device, equipment and storage medium | |
CN107040454A (en) | Unread message based reminding method and device under a kind of quick more new scene of big data quantity | |
US9329972B2 (en) | Implementing client based throttled error logging in a computing device | |
WO2020167469A1 (en) | Detecting second-order security vulnerabilities via modelling information flow through persistent storage | |
CN101383738A (en) | Internet interaction affair monitoring method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |