Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Rate limiting
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Limiting the data rate on network controllers}} {{about|computer networks|the rate-limiting step in chemical kinetics|Rate-determining step}} In [[computer network]]s, '''rate limiting''' is used to control the rate of requests sent or received by a [[network interface controller]]. It can be used to prevent [[denial-of-service attack|DoS attacks]]<ref name="cisco"/> and limit [[web scraping]].<ref>{{cite magazine |last1=Greenberg |first1=Andy |title=An Absurdly Basic Bug Let Anyone Grab All of Parler's Data |url=https://www.wired.com/story/parler-hack-data-public-posts-images-video/ |access-date=12 January 2021 |magazine=Wired |date=12 January 2021 |language=en-us |url-access=limited |url-status=live |archive-url=https://web.archive.org/web/20210112164535/https://www.wired.com/story/parler-hack-data-public-posts-images-video/ |archive-date=12 January 2021 }}</ref> Research indicates flooding rates for one zombie machine are in excess of 20 [[Hypertext_Transfer_Protocol|HTTP]] GET requests per second,<ref name="request rate">{{cite web |author1=Jinghe Jin |author2=Nazarov Nodir |author3=Chaetae Im |author4=Seung Yeob Nam |url=https://www.researchgate.net/publication/267384975_Mitigating_HTTP_GET_Flooding_Attacks_through_Modified_NetFPGA_Reference_Router |title=Mitigating HTTP GET Flooding Attacks through Modified NetFPGA Reference Router |date=7 November 2014 |page= 1 |via=ResearchGate |access-date=19 December 2021 |url-status=live |archive-url=https://web.archive.org/web/20230306015051/https://www.researchgate.net/publication/267384975_Mitigating_HTTP_GET_Flooding_Attacks_through_Modified_NetFPGA_Reference_Router |archive-date= Mar 6, 2023 }}</ref> legitimate rates much less. Rate limiting should be used along with [[Bandwidth throttling|throttling pattern]] to minimize the number of throttling errors.<ref>{{Cite book |title=Cloud Native Using Containers, Functions, and Data to Build Next-Generation Applications |publisher=O'Reilly Media |year=2019 |isbn=9781492053798}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)