flooding

How to check if a user of my web application is trying to login with different credentials?

不打扰是莪最后的温柔 提交于 2019-12-11 07:55:13
问题 I'm trying from 3 days to make or find good way to detect if there is a user trying to login my web application with many login credentials or making flood attack, so I can show captcha as example in this cause in my login page, but with no luck. I can know if there is user with login username : "xyz" trying many times to login, but what if a user trying to login with many usernames like "xyz1" , "xyz2", "xyz3" , "admin", "administrator", "root" .... etc. Specially that user maybe trying with

PHP, .htaccess, DDoS & speedy request protection

元气小坏坏 提交于 2019-12-10 17:17:02
问题 I have a question, i built this little script to check if a certain ip is flooding my website. When it does, i deny the ip in the .htaccess file. My question is, can somebody tell me if this script is completely useless or worth trying... The script is called in the config file therefore it runs on every pageload. <?php #get the visitor ip $ip = $_SERVER["REMOTE_ADDR"]; #start the session @session_start(); #check if the ip is banned if( $_SESSION['~b'] ){ #check if we can open htaccess $fp =

PHP: Anti-Flood/Spam system

佐手、 提交于 2019-12-03 09:22:29
问题 I'm actually working on a PHP project that will feature a user system (Login,Register,Send lost password to email,..) and I think that this may be very vulnerable to Brute-Force attacks and/or Spam (Send a password to someone's email like 1000 times, etc. use your fantasy) . Do today's webservers (Apache, IIS) have some sort of built-in defense against Brute-Force? What would be the best way to implement an Anti-Spam/Flood system, if I e.g.: want a page not be able to be called more than two

rails - Choosing captcha plugin [closed]

浪子不回头ぞ 提交于 2019-12-03 01:43:23
问题 Closed . This question is opinion-based. It is not currently accepting answers. Want to improve this question? Update the question so it can be answered with facts and citations by editing this post. Closed 6 years ago . There are a lot of captchas plugins in Rails and also many types of solutions for preventing spamming and flooding. So it isn't only Rails question. Let's see what types of plugins do we have: 1. Classic image captcha (zendesk's Captcha, Simple_captcha, Validates_captcha,

PHP: Anti-Flood/Spam system

核能气质少年 提交于 2019-12-02 23:38:02
I'm actually working on a PHP project that will feature a user system (Login,Register,Send lost password to email,..) and I think that this may be very vulnerable to Brute-Force attacks and/or Spam (Send a password to someone's email like 1000 times, etc. use your fantasy) . Do today's webservers (Apache, IIS) have some sort of built-in defense against Brute-Force? What would be the best way to implement an Anti-Spam/Flood system, if I e.g.: want a page not be able to be called more than two times a minute, however another page may be called up to 100 times a minute or so. I would definitely

rails - Choosing captcha plugin [closed]

落花浮王杯 提交于 2019-12-02 15:13:21
There are a lot of captchas plugins in Rails and also many types of solutions for preventing spamming and flooding. So it isn't only Rails question. Let's see what types of plugins do we have: 1. Classic image captcha ( zendesk's Captcha , Simple_captcha, Validates_captcha, winton's Captcha , Raptcha). positive: Can be effective to prevent automatic decrypt (not sure about Simple_captcha, but it seems that both zendesk's and winton's captchas don't achieve that, as they use pre-generated images (instead of on-demand), so our possible spam bots can be learned on that images). negative: Require

SYN flooding on port

拥有回忆 提交于 2019-11-26 17:34:53
kernel: possible SYN flooding on port 80. Sending cookies. 以上是系统日志中的信息,可能是遭到SYN洪水攻击(SYN Flood)。 那什么是SYN Flood呢 SYN Flood攻击是一种典型的拒绝服务型(Denial of Service)攻击。所谓拒绝服务型攻击就是通过进行攻击,使受害主机或网络不能够良好的提供服务(就是使服务器不能响应其他的访问请求),从而间接达到攻击的目的。 SYN Flood攻击利用的是IPv4中TCP协议的三次握手(Three-Way Handshake)过程进行的攻击。大家知道协议规定,如果一端想向另一端发起TCP连接,它需要首先发送TCP SYN 包到对方,对方收到后发送一个TCP SYN+ACK包回来,发起方再发送TCP ACK包回去,这样三次握手就结束了。我们把TCP连接的发起方叫作"TCP客户机(TCP Client)",TCP连接的接收方叫作"TCP服务器(TCP Server)"。值得注意的是在TCP服务器收到TCP SYN request包时,在发送TCP SYN+ACK包回TCP客户机前,TCP服务器要先分配好一个数据区专门服务于这个即将形成的TCP连接。一般把收到SYN包而还未收到ACK包时的连 接状态成为半开连接(Half-open Connection)。 在