CN115396509A - IPv6 network proxy service-based method and equipment for processing access limitation - Google Patents

IPv6 network proxy service-based method and equipment for processing access limitation Download PDF

Info

Publication number
CN115396509A
CN115396509A CN202210948650.3A CN202210948650A CN115396509A CN 115396509 A CN115396509 A CN 115396509A CN 202210948650 A CN202210948650 A CN 202210948650A CN 115396509 A CN115396509 A CN 115396509A
Authority
CN
China
Prior art keywords
address
access request
access
proxy server
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210948650.3A
Other languages
Chinese (zh)
Inventor
薛丽峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Baochuang Network Technology Co ltd
Original Assignee
Shanghai Baochuang Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Baochuang Network Technology Co ltd filed Critical Shanghai Baochuang Network Technology Co ltd
Priority to CN202210948650.3A priority Critical patent/CN115396509A/en
Publication of CN115396509A publication Critical patent/CN115396509A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The method comprises the steps of establishing a back-end address pool on a back-end network port used for accessing a source station server in the current proxy server; receiving an access request sent by a client, wherein the access request comprises an IP address of a current proxy server; replacing the IP address of the current proxy server with a target IP address selected from a back-end address pool according to a preset address hopping rule to serve as a back-end access address of the access request; the access request is sent to the target proxy server corresponding to the target IP address, so that the back end of the target proxy server accesses the source station server corresponding to the access request, different proxy servers can be ensured to process the access request of the current proxy server, the problems of access limitation and the like caused by malicious access or frequent access of the same IP address are effectively avoided, and the access is not limited any more.

Description

IPv6 network proxy service-based method and equipment for processing access limitation
Technical Field
The present application relates to the technical field of IPv6 network proxy services, and in particular, to a method and an apparatus for processing access restriction based on IPv6 network proxy services.
Background
With the rapid development of the Internet and Intranet, the proxy server plays an extremely important role in practical application as a bridge for connecting the Internet and Intranet.
The proxy server is a transfer station for network information. Generally, when a web browser is used to directly link other Internet sites and obtain web information, a request signal is sent to obtain a response, and then the other party transmits the information back. The proxy server is a server between the browser and the Web server, and after the proxy server is available, the browser does not directly go to the Web server to retrieve the Web page, but sends a request to the proxy server, and a request signal is sent to the proxy server, so that the proxy server retrieves the information required by the browser and transmits the information to the browser. Moreover, most proxy servers have a buffering function, and are like a large Cache memory, so that newly fetched data packets are continuously stored in the local memory of the proxy server, and if the data requested by the browser is already stored and is latest in the local memory of the proxy server, the proxy server does not fetch the data from the Web server again, but directly transmits the data existing in the local memory to the browser of the user, so that the browsing speed and efficiency can be obviously improved.
The proxy server can not only realize the functions of improving browsing speed and efficiency, but also realize the functions of safe filtering, flow control (reducing Internet use cost), user management and the like of the network, so that the proxy server is a network firewall technology, and can solve the problem of insufficient IP addresses caused by connecting a plurality of units with the Internet.
The network proxy service is a widely used network technology. The proxy server accesses the source station server by using the own back-end address, and transmits the content to the client of the proxy service after obtaining the access content; when the threshold value is broken, the source station server may suspend providing the service, so that the proxy server cannot respond to each client of the corresponding proxy service in time. The proxy server uses the IP address of the proxy server to access the source station server, and actually proxies a plurality of clients for access, but the source station server is frequently accessed by a client and is considered as malicious access, and when the source station server reaches a certain threshold value, the access is temporarily prohibited, so that the proxy server works abnormally. In order to solve the problem, the existing solutions include disabling malicious access rules, which may bring certain network security risks, and deploying multiple proxy servers, which may cause an increase in construction cost.
Disclosure of Invention
The method and the device for processing access limitation based on IPv6 network proxy service are characterized in that a back-end address pool is created on a back-end network port of a current proxy server to select a back-end access address for each received access request, so that different proxy servers can be ensured to process the access request of the current proxy server, the problems of access limitation and the like caused by malicious access or frequent access of the same address in the prior art can be effectively avoided, the access requests received by the current server can be ensured to be subjected to proxy service by the selected proxy server, and the access is not limited any more.
According to one aspect of the application, a method for processing limited access based on an IPv6 network proxy service is provided, wherein the method comprises the following steps:
establishing a back-end address pool on a back-end network port used for accessing a source station server in a current proxy server, wherein the back-end address pool comprises at least two Internet Protocol (IP) addresses, and each IP address corresponds to a real proxy server;
receiving an access request sent by a client, wherein the access request comprises an IP address of the current proxy server;
replacing the IP address of the current proxy server in the access request with a target IP address selected from the back-end address pool according to a preset address hopping rule to serve as the back-end access address of the access request;
and sending the access request to a target proxy server corresponding to the target IP address so that the back end of the target proxy server accesses a source station server corresponding to the access request.
Further, in the above method, replacing the IP address of the current proxy server in the access request with a target IP address selected from the backend address pool according to a preset address hopping rule, so as to serve as the backend access address of the access request, including:
and if the preset address hopping rule is random address hopping, replacing the IP address of the current proxy server in the access request with a randomly selected target IP address in the back-end address pool to serve as the back-end access address of the access request.
Further, in the above method, replacing the IP address of the current proxy server in the access request with a target IP address selected from the backend address pool according to a preset address hopping rule, so as to serve as the backend access address of the access request, including:
and if the preset address hopping rule is address hopping one by one, replacing the IP address of the current proxy server in the access request with a target IP address which is selected alternately in the back-end address pool to serve as the back-end access address of the access request.
Further, in the above method, the access request further includes a port address of the client;
wherein, according to a preset address jump rule, replacing the IP address of the current proxy server in the access request with a target IP address selected from the backend address pool as the backend access address of the access request includes:
and replacing the IP address of the current proxy server in the access request with a target IP address selected from the back-end address pool according to the preset address hopping rule and the port address of the client, so as to serve as the proxy service address of the access request.
According to another aspect of the present application, there is also provided a non-volatile storage medium having stored thereon computer readable instructions, which, when executed by a processor, cause the processor to implement the method for processing access restriction based on an IPv6 network proxy service as described above.
According to another aspect of the present application, there is also provided an IPv6 network proxy service-based device with limited access to processing, wherein the device includes:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement a method for processing access restriction based on an IPv6 network proxy service as described above.
Compared with the prior art, the method comprises the steps that a back-end address pool is established on a back-end network port used for accessing a source station server in the current proxy server, the back-end address pool comprises at least two Internet Protocol (IP) addresses, and each IP address corresponds to a real proxy server; receiving an access request sent by a client, wherein the access request comprises an IP address of the current proxy server; replacing the IP address of the current proxy server in the access request with a target IP address selected from the back-end address pool according to a preset address hopping rule to serve as the back-end access address of the access request; the access request is sent to the target proxy server corresponding to the target IP address, so that the back end of the target proxy server accesses the source station server corresponding to the access request, a back-end address pool is created on a back-end network port of the current proxy server to replace the IP address of the current server in the access request sent to the current server each time and serve as the back-end access address for processing the access request, namely the IP address of the current server corresponds to the back-end address pool, the access request of the current proxy server can be processed by different proxy servers, the problems of access limitation and the like caused by malicious access or frequent access of the same IP address in the prior art can be effectively avoided, the access request received by the current server can be subjected to proxy service by the selected proxy server, and the access is not limited any more.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
FIG. 1 illustrates a flow diagram of a method for handling access restrictions based on an IPv6 network proxy service in accordance with an aspect of the subject application;
fig. 2 is a diagram illustrating a relationship among a backend network port, a backend address pool, and a source server of a current proxy server in a method for handling access restriction based on an IPv6 network proxy service according to an aspect of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
As shown in fig. 1, an aspect of the present application provides a flowchart of a method for handling access restriction based on an IPv6 network proxy service, where IPv6 (Internet Protocol Version 6, version 6 of the Internet Protocol) is a next-generation IP Protocol designed by the Internet Engineering Task Force (IETF) to replace IPv4, and the address number of the next-generation IP Protocol is huge. The method uses the dynamic back-end address pool corresponding to the IP address of the current server as the back-end access address of all access requests received by the current proxy server, thereby effectively avoiding the problems of access limitation and the like caused by malicious access or frequent access of the same address in the prior art, wherein the method comprises the following steps of S11, S12, S13 and S14:
step S11, a back-end address pool is established on a back-end network port used for accessing a source station server in the current proxy server, the back-end address pool comprises at least two Internet protocol IP addresses, and each IP address corresponds to a real proxy server.
Here, as shown in fig. 2, on a backend network port for accessing a source station server in a proxy service, a backend address pool is created, where the backend address pool includes N IP addresses and each IP address corresponds to a real proxy server, which are respectively a dynamic IP address 1, an IP address 2, … …, an IP address (N-1), and an IP address N, and the real proxy server corresponding to each IP address, where N is a positive integer greater than or equal to 2; meanwhile, the back-end access address corresponding to the back-end network port corresponds to the N IP addresses in the back-end address pool, so that the N IP addresses in the back-end address pool are sequentially and dynamically replaced by the IP address of the current proxy server to serve as the back-end access address of the access request, different proxy servers can process each access request of the current proxy server, which needs to access the source station server, and therefore the problems of access limitation and the like caused by malicious access or frequent access of the same IP address in the prior art are effectively avoided, the fact that the access requests received by the current server can be all subjected to proxy service by the selected proxy server is ensured, and access is not limited any more.
In an actual application scenario, after a client initiates an access request to a current proxy server, in step S12, receiving an access request sent by the client, where the access request includes an IP address of the current proxy server;
step S13, replacing the IP address of the current proxy server in the access request with a target IP address selected from the back-end address pool according to a preset address jump rule to serve as the back-end access address of the access request;
step S14, the access request is sent to the target proxy server corresponding to the target IP address, so that the back end of the target proxy server accesses the source station server corresponding to the access request. And the source station server corresponding to the access request is a server where the content requested by the access request or the required feedback is sent.
Through the steps S11 to S14, the back-end address pool is created on the back-end network port of the current proxy server to replace the IP address of the current server in the access request sent to the current server each time, so as to serve as the back-end access address for processing the access request, that is, the IP address of the current server corresponds to the back-end address pool, thereby ensuring that different proxy servers can process the access request of the current proxy server, effectively avoiding the problems of access limitation caused by malicious access or frequent access of the same address in the prior art, ensuring that the access requests received by the current server can all be subjected to proxy service by the selected proxy server, and ensuring that the access is no longer limited.
For example, a backend address pool is created on a backend network port for accessing a source station server in a current proxy server, the backend address pool includes N IP addresses, each IP address corresponds to a real proxy server, and the backend address pool includes a dynamic IP address 1 and a corresponding proxy server 1, an IP address 2 and a corresponding proxy server 2, … …, an IP address (N-1) and a corresponding proxy server (N-1) and an IP address N and a corresponding proxy server N, and simultaneously, a backend access address corresponding to the backend network port corresponds to N IP addresses in the backend address pool, so that the subsequent dynamic replacement of the N IP addresses in the backend address pool with the IP address of the current proxy server is used as a backend access address; in an actual application scenario, receiving an access request sent by a client, where the access request includes an IP address of the current proxy server: an IP address X; in order to avoid frequent access to the source station server by the IP address X of the current proxy server, the IP address of the current proxy server in the access request is: replacing the IP address X with a target IP address selected from the backend address pool to serve as the backend access address of the access request, for example, if a target IP address selected from N IP addresses in the backend address pool is an IP address M, where M is a serial number of any one of the N IP addresses, the IP address of the current proxy server in the access request is: replacing the IP address X with an IP address M, and taking the IP address M as a rear-end access address of the access request; and sending the access request carrying the IP address M to a target proxy server M corresponding to the IP address M, so that the rear end of the target proxy server M accesses a source station server corresponding to the access request, and realizing that the IP address of the current server in the access request sent to the current server each time is replaced by creating a rear-end address pool on the rear-end network port of the current proxy server, so as to be used as a rear-end access address for processing the access request, namely the IP address of the current server corresponds to the rear-end address pool, so that different proxy servers can be ensured to process the access request of the current proxy server, the problems of access limitation and the like caused by malicious access or frequent access of the same address in the prior art can be effectively avoided, and the access requests received by the current server can be subjected to proxy service by the selected proxy server, so that the access is not limited any more.
Next to the foregoing embodiment of the present application, in step S13, according to a preset address hopping rule, replacing an IP address of the current proxy server in the access request with a target IP address selected from the backend address pool, so as to serve as a backend access address of the access request, specifically including:
and if the preset address hopping rule is random address hopping, replacing the IP address of the current proxy server in the access request with a randomly selected target IP address in the back-end address pool to serve as the back-end access address of the access request.
For example, in an actual application scenario, an access request sent by a client is received, where the access request includes an IP address of the current proxy server: an IP address X; in order to avoid that the IP address X of the current proxy server frequently accesses the source station server and ensure that the proxy server is used for random replacement, if the preset address hopping rule is random address hopping, a target IP address is randomly selected from the N IP addresses in the back-end address pool to replace the IP address of the current proxy server in the access request: if a target IP address selected randomly is an IP address M, the IP address of the current proxy server in the access request is: the IP address X is replaced by a randomly selected IP address M, the randomly selected IP address M is used as a rear-end access address of the access request, so that a source station server corresponding to the access request is accessed from the rear end through a proxy server M corresponding to the IP address M, a target IP address is randomly selected from N IP addresses in a rear-end address pool to be used as the rear-end access address of the access request received by the current proxy server, the IP addresses in the rear-end address pool can be randomly recycled, the source station server corresponding to the access request is accessed from the rear end through the randomly selected proxy server, the problems of access limitation and the like caused by the fact that the current proxy server frequently accesses the source station server are effectively avoided, and the random use of each proxy server corresponding to the N IP addresses in the rear-end address pool is also ensured.
Next to the foregoing embodiment of the present application, in step S13, according to a preset address hopping rule, replacing an IP address of the current proxy server in the access request with a target IP address selected from the backend address pool, so as to serve as a backend access address of the access request, specifically including:
and if the preset address hopping rule is that the addresses hop one by one, replacing the IP address of the current proxy server in the access request with a target IP address which is selected alternately in the back-end address pool to serve as the back-end access address of the access request.
For example, in an actual application scenario, an access request sent by a client is received, where the access request includes an IP address of the current proxy server: an IP address X; in order to avoid that the IP address X of the current proxy server frequently accesses the source station server and ensure that the proxy servers are replaced one by one, if the preset address hopping rule is that the addresses hop one by one, a target IP address is selected from N IP addresses in the rear-end address pool in a rotating manner one by one to replace the IP address of the current proxy server in the access request: if the target IP address selected by turns one by one is an IP address M, for example, N IP addresses in a back-end address pool have a certain sequence, for example, the sequence is IP address N, IP address (N-1), … …, IP address 2 and IP address 1, if the IP address of an access request sent by a client that is processed last time is an IP address (M + 1), then when the access request sent by the client is processed this time, then the IP address M is selected by turns one by one from the N IP addresses in the back-end address pool, and then the IP address of the current proxy server in the access request is: the IP address X is replaced by the randomly selected IP address M, the IP address M selected in turn one by one is used as a rear-end access address of the access request, and when the access request sent by another client is processed next time, the IP address M-1 can be selected in turn one by one for replacement, so that a target IP address is selected in turn one by one from N IP addresses in a rear-end address pool as the rear-end access address for processing the access request, the IP addresses in the rear-end address pool can be circularly used in turn one by one, the purpose of selecting each proxy server in turn to process a source station server which is required to be accessed by the access request of each client and received by the current proxy server is achieved, the use probability of each proxy server in the process of sequentially accessing the source station server is ensured to be consistent, and the problem of limited access caused by frequent access of the same IP address is avoided.
Next to the above embodiment of the present application, wherein the access request further includes a port address of the client; in step S13, according to a preset address hopping rule, replacing the IP address of the current proxy server in the access request with a target IP address selected from the backend address pool, so as to serve as the backend access address of the access request, which specifically includes:
and replacing the IP address of the current proxy server in the access request with a target IP address selected from the back-end address pool according to the preset address hopping rule and the port address of the client, so as to serve as the proxy service address of the access request.
For example, in an actual application scenario, an access request sent by a client is received, where the access request includes the IP address of the current proxy server: IP address X, meanwhile, the access request also includes the port address of the client initiating the request; in order to avoid that the IP address X of the current proxy server frequently accesses the source station server and ensure that the proxy servers corresponding to the N IP addresses of the back-end address pool are replaced, the IP address of the current proxy server in the access request is converted into the IP address of the current proxy server according to a preset address hopping rule and the port address of the client: and replacing the IP address X with a target IP address selected from the back-end address pool to serve as a back-end access address of the access request. If the client-side port address meets the preset port number, the random hopping or the one-by-one alternate hopping rule in the preset address hopping rule can randomly hop or hop one by one, for example, when the client-side port address is randomly hopped or hopped one by one at intervals of a preset number, in a preferred embodiment of the application, if the access request of the previous client-side is 1000, the selected target IP address is an IP address (M + 1), and if the port address of the current client-side is 1001, the next IP address is randomly selected or selected one by one as the target IP address, for example, an IP address M, so that the random selection or one-by-one selection of N IP addresses in a back-end address pool is performed in combination with the port address of the client-side, and the purpose that the IP address in the back-end address pool can be randomly selected or selected one by one is achieved, thereby realizing the use of different proxy servers, ensuring that the proxy servers are continuously changed, and effectively avoiding the problem that the same source station is accessed by malicious access servers or the same source station is limited.
According to another aspect of the present application, there is also provided a non-volatile storage medium having stored thereon computer readable instructions, which, when executed by a processor, cause the processor to implement the method for processing access restriction based on an IPv6 network proxy service as described above.
According to another aspect of the present application, there is also provided an IPv6 network proxy service-based device with limited access to processing, wherein the device includes:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement a method for processing access restriction based on an IPv6 network proxy service as described above.
Here, for details of each embodiment in the device with limited processing access based on the IPv6 network proxy service, reference may be specifically made to the corresponding part of the embodiment of the method with limited processing access based on the IPv6 network proxy service, and details are not described herein again.
To sum up, the present application creates a back-end address pool on a back-end network port for accessing a source station server in a current proxy server, where the back-end address pool includes at least two internet protocol IP addresses, and each IP address corresponds to a real proxy server; receiving an access request sent by a client, wherein the access request comprises an IP address of the current proxy server; replacing the IP address of the current proxy server in the access request with a target IP address selected from the back-end address pool according to a preset address hopping rule to serve as the back-end access address of the access request; the access request is sent to the target proxy server corresponding to the target IP address, so that the back end of the target proxy server accesses the source station server corresponding to the access request, a back-end address pool is created on a back-end network port of the current proxy server to replace the IP address of the current server in the access request sent to the current server each time and serve as the back-end access address for processing the access request, namely the IP address of the current server corresponds to the back-end address pool, the access request of the current proxy server can be processed by different proxy servers, the problems of access limitation and the like caused by malicious access or frequent access of the same IP address in the prior art can be effectively avoided, the access request received by the current server can be subjected to proxy service by the selected proxy server, and the access is not limited any more.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. As such, the software programs (including associated data structures) of the present application can be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it will be obvious that the term "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (6)

1. A method for processing access restriction based on IPv6 network proxy service, wherein the method comprises:
establishing a back-end address pool on a back-end network port used for accessing a source station server in a current proxy server, wherein the back-end address pool comprises at least two Internet Protocol (IP) addresses, and each IP address corresponds to a real proxy server;
receiving an access request sent by a client, wherein the access request comprises an IP address of the current proxy server;
replacing the IP address of the current proxy server in the access request with a target IP address selected from the back-end address pool according to a preset address hopping rule to serve as the back-end access address of the access request;
and sending the access request to a target proxy server corresponding to the target IP address so that the back end of the target proxy server accesses a source station server corresponding to the access request.
2. The method of claim 1, wherein replacing the IP address of the current proxy server in the access request with a target IP address selected from the backend address pool as the backend access address of the access request according to a preset address hopping rule comprises:
and if the preset address hopping rule is random address hopping, replacing the IP address of the current proxy server in the access request with a randomly selected target IP address in the back-end address pool to serve as the back-end access address of the access request.
3. The method of claim 1, wherein replacing the IP address of the current proxy server in the access request with a target IP address selected from the backend address pool as the backend access address of the access request according to a preset address hopping rule comprises:
and if the preset address hopping rule is that the addresses hop one by one, replacing the IP address of the current proxy server in the access request with a target IP address which is selected alternately in the back-end address pool to serve as the back-end access address of the access request.
4. The method of any of claims 1-3, wherein the access request further includes a port address of the client;
wherein, according to a preset address jump rule, replacing the IP address of the current proxy server in the access request with a target IP address selected from the backend address pool as the backend access address of the access request includes:
and replacing the IP address of the current proxy server in the access request with a target IP address selected from the back-end address pool according to the preset address hopping rule and the port address of the client, so as to serve as the proxy service address of the access request.
5. A non-transitory storage medium having stored thereon computer readable instructions which, when executed by a processor, cause the processor to implement the method of any one of claims 1 to 4.
6. An IPv6 network proxy service-based device with restricted access to processing, wherein the device comprises:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
the one or more computer-readable instructions, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-4.
CN202210948650.3A 2022-08-09 2022-08-09 IPv6 network proxy service-based method and equipment for processing access limitation Pending CN115396509A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210948650.3A CN115396509A (en) 2022-08-09 2022-08-09 IPv6 network proxy service-based method and equipment for processing access limitation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210948650.3A CN115396509A (en) 2022-08-09 2022-08-09 IPv6 network proxy service-based method and equipment for processing access limitation

Publications (1)

Publication Number Publication Date
CN115396509A true CN115396509A (en) 2022-11-25

Family

ID=84119634

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210948650.3A Pending CN115396509A (en) 2022-08-09 2022-08-09 IPv6 network proxy service-based method and equipment for processing access limitation

Country Status (1)

Country Link
CN (1) CN115396509A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624920A (en) * 2012-03-31 2012-08-01 奇智软件(北京)有限公司 Method and device for performing access through proxy server
CN106547793A (en) * 2015-09-22 2017-03-29 北京国双科技有限公司 The method and apparatus for obtaining proxy server address
CN110851753A (en) * 2019-11-07 2020-02-28 亿企赢网络科技有限公司 Website access method, device, equipment and storage medium
CN111177513A (en) * 2019-12-31 2020-05-19 北京百度网讯科技有限公司 Method and device for determining abnormal access address, electronic equipment and storage medium
WO2022134768A1 (en) * 2020-12-21 2022-06-30 深圳壹账通智能科技有限公司 Method and apparatus for managing ip proxy pool, and computer device and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624920A (en) * 2012-03-31 2012-08-01 奇智软件(北京)有限公司 Method and device for performing access through proxy server
CN106547793A (en) * 2015-09-22 2017-03-29 北京国双科技有限公司 The method and apparatus for obtaining proxy server address
CN110851753A (en) * 2019-11-07 2020-02-28 亿企赢网络科技有限公司 Website access method, device, equipment and storage medium
CN111177513A (en) * 2019-12-31 2020-05-19 北京百度网讯科技有限公司 Method and device for determining abnormal access address, electronic equipment and storage medium
WO2022134768A1 (en) * 2020-12-21 2022-06-30 深圳壹账通智能科技有限公司 Method and apparatus for managing ip proxy pool, and computer device and storage medium

Similar Documents

Publication Publication Date Title
US20240146796A1 (en) System providing faster and more efficient data communication
US10263958B2 (en) Internet mediation
US8321503B2 (en) Context-specific network resource addressing model for distributed services
US8689280B2 (en) DNS-based content routing
US9900341B2 (en) Web redirection for caching
US10079800B2 (en) Client subnet efficiency by equivalence class aggregation
CN113315706B (en) Private cloud flow control method, device and system
CN111064804B (en) Network access method and device
US10404651B2 (en) Domain name system network traffic management
US11122106B2 (en) Method and apparatus for providing web service using edge computing service
CN115396509A (en) IPv6 network proxy service-based method and equipment for processing access limitation
US20230008525A1 (en) Self-trace for client-server connections
EP4115580B1 (en) Hostname pre-localization
US8615548B1 (en) System and method for deferred data downloading
CN113301081B (en) Data processing method and device for content distribution network and electronic equipment
CN115314462A (en) Processing method and equipment for high-concurrency access based on IPv6 network proxy service
CN111818038B (en) Network data acquisition and identification method and device
CN110247996B (en) Wireless router device of configurable cache system based on intelligent classroom
US11190815B2 (en) Multimedia service content providing device and method
CN112968980B (en) Probability determination method and device, storage medium and server
WO2013055341A1 (en) Network address protocol
US20200402115A1 (en) Serving an Online Advertisement Asynchronously
CN116566673A (en) Network address scanning method and scanning host
CN115277383A (en) Log generation method and device, electronic equipment and computer readable storage medium
CN117579288A (en) Handshake multiplexing method, device and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination