Home Backend Development PHP Problem How to prevent CC attacks in PHP? (code example)

How to prevent CC attacks in PHP? (code example)

Mar 22, 2023 am 11:24 AM
php CC attack

With the development of the Internet, the importance of websites has become more and more prominent, but at the same time it is also facing increasingly severe security problems, one of which is CC attacks. CC attacks refer to malicious attackers sending a large number of requests to the website by simulating user access, causing server resources to crash. In order to ensure the security of the website, we need to take a series of measures to prevent CC attacks, the most common of which is to use PHP technology to achieve defense.

Below we will introduce a simple and easy-to-use implementation code for PHP to prevent CC attacks.

1. Set the access frequency

First, we need to calculate the frequency of visits by visitors within the unit time. If the frequency exceeds the preset threshold, it will be considered for CC attacks, thereby denying access. The following is an example of a PHP program code that can calculate and store the number of visits for each IP address:

//设置阈值为100次/分钟
$throttle=100;
//获取访问者的IP地址
$ip=$_SERVER['REMOTE_ADDR'];
//获取当前时间的时间戳
$time=time();
//读取ip_access.log文件记录的IP地址访问次数
$log=file_get_contents("ip_access.log");
//将读取到的记录解析成数组
$log_arr=explode("\n",$log);
//初始化访问次数为0
$access_num=0;
//循环数组,查找当前访问IP地址的访问记录
foreach($log_arr as $access_log){
    $access_ip=explode("|",$access_log);
    if($access_ip[0]==$ip){
        $access_num=$access_ip[1];
        break;
    }
}
//计算这一分钟内的启动时间
$start_time=$time-60;
//将时间戳和访问次数以"|"的形式拼接成字符串,并存入ip_access.log文件
$log_str=$ip."|".($access_num+1)."\n";
file_put_contents("ip_access.log",$log_str,FILE_APPEND);
//获取这一分钟内所有IP地址的访问次数总和
$access_all=0;
foreach($log_arr as $access_log){
    $access_ip=explode("|",$access_log);
    if($access_ip[1]>0 && $access_ip[0]!=$ip && $access_ip[2]>$start_time){
        $access_all+=$access_ip[1];
    }
}
//如果访问次数超过了阈值,就将其视为CC攻击,停止访问
if($access_all>$throttle){
    die();
}
Copy after login

2. Set the access interval

In addition to restrictions Access frequency, we can also set the access interval, that is, there needs to be a certain period of time between two accesses, thereby preventing malicious attackers from attacking the server through malicious refresh. The following is an example of a PHP program code that can implement the function of calculating visitor access intervals:

//设置允许的最小访问间隔为3秒
$interval=3;
//获取访问者的IP地址
$ip=$_SERVER["REMOTE_ADDR"];
//获取当前时间的时间戳
$time=time();
//读取ip_access_time.log文件记录的IP地址的最近访问时间
$log=file_get_contents("ip_access_time.log");
//将读取到的记录解析成数组
$log_arr=explode("\n",$log);
//初始化最近访问时间为空
$last_access_time="";
//循环数组,查找当前访问IP地址的访问记录
foreach($log_arr as $access_time){
    $access_ip=explode("|",$access_time);
    if($access_ip[0]==$ip){
        $last_access_time=$access_ip[1];
        break;
    }
}
//如果最近访问时间不为空,并且与当前时间的差值小于设置的间隔时间,就将其视为CC攻击,停止访问
if(!empty($last_access_time) && ($time-$last_access_time)<$interval){
    die();
}
//将当前时间的时间戳以"|"的形式拼接成字符串,并存入ip_access_time.log文件
$log_str=$ip."|".$time."\n";
file_put_contents("ip_access_time.log",$log_str,FILE_APPEND);
Copy after login

3. Other necessary measures

Defense against CC attacks is also needed Other necessary measures, such as setting encryption verification codes, restricting access to pages, etc. We can refer to the following PHP program code to implement specific operations:

//生成随机验证码,用于限制机器人访问
$captcha=rand(1000,9999);
//将验证码保存到session中,方便后期验证
session_start();
$_SESSION["captcha"]=$captcha;
//设置验证码图片的大小和颜色
$img_width=50;
$img_height=25;
$background_color=imagecolorallocate($img,238,238,238);
$text_color=imagecolorallocate($img,0,0,0);
//将验证码以图片形式输出
header("Content-type:image/png");
$img=imagecreate($img_width,$img_height);
imagefill($img,0,0,$background_color);
imagestring($img,5,10,5,$captcha,$text_color);
imagepng($img);
imagedestroy($img);
//限制特定的IP地址访问特定的页面
$ip=$_SERVER["REMOTE_ADDR"];
if($ip=="192.168.1.1"){
    die();
}
Copy after login

To sum up, preventing CC attacks requires us to take a series of measures, including setting access frequency, access interval, verification code, etc. The above implementation code is only a preliminary implementation method, and it needs to be adjusted according to specific needs in actual applications. I hope this article can provide you with some reference.

The above is the detailed content of How to prevent CC attacks in PHP? (code example). For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

CakePHP Project Configuration CakePHP Project Configuration Sep 10, 2024 pm 05:25 PM

In this chapter, we will understand the Environment Variables, General Configuration, Database Configuration and Email Configuration in CakePHP.

PHP 8.4 Installation and Upgrade guide for Ubuntu and Debian PHP 8.4 Installation and Upgrade guide for Ubuntu and Debian Dec 24, 2024 pm 04:42 PM

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

CakePHP Date and Time CakePHP Date and Time Sep 10, 2024 pm 05:27 PM

To work with date and time in cakephp4, we are going to make use of the available FrozenTime class.

CakePHP Working with Database CakePHP Working with Database Sep 10, 2024 pm 05:25 PM

Working with database in CakePHP is very easy. We will understand the CRUD (Create, Read, Update, Delete) operations in this chapter.

CakePHP File upload CakePHP File upload Sep 10, 2024 pm 05:27 PM

To work on file upload we are going to use the form helper. Here, is an example for file upload.

CakePHP Routing CakePHP Routing Sep 10, 2024 pm 05:25 PM

In this chapter, we are going to learn the following topics related to routing ?

Discuss CakePHP Discuss CakePHP Sep 10, 2024 pm 05:28 PM

CakePHP is an open-source framework for PHP. It is intended to make developing, deploying and maintaining applications much easier. CakePHP is based on a MVC-like architecture that is both powerful and easy to grasp. Models, Views, and Controllers gu

CakePHP Creating Validators CakePHP Creating Validators Sep 10, 2024 pm 05:26 PM

Validator can be created by adding the following two lines in the controller.

See all articles