Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Rate limiting

From Wikipedia, the free encyclopedia
(Redirected fromThrottling process (computing))
Limiting the data rate on network controllers
This article is about computer networks. For the rate-limiting step in chemical kinetics, seeRate-determining step.

Incomputer networks,rate limiting is used to control the rate of requests sent or received by anetwork interface controller. It can be used to preventDoS attacks[1] and limitweb scraping.[2]

Research indicates flooding rates for one zombie machine are in excess of 20HTTP GET requests per second,[3] legitimate rates much less.

Rate limiting should be used along withthrottling pattern to minimize the number of throttling errors.[4]

Hardware appliances

[edit]

Hardware appliances can limit the rate of requests on layer 4 or 5 of theOSI model.

Rate limiting can be induced by the network protocol stack of the sender due to a receivedECN-marked packet and also by thenetwork scheduler of any router along the way.

While a hardware appliance can limit the rate for a given range of IP-addresses on layer 4, it risks blocking a network with many users which are masked byNAT with a singleIP address of anISP.

Deep packet inspection can be used to filter on the session layer but will effectively disarm encryption protocols likeTLS andSSL between the appliance and the protocol server (i.e. web server).

Protocol servers

[edit]

Protocol servers using a request / response model, such asFTP servers or typicallyWeb servers may use a centralin-memorykey-value database, likeRedis orAerospike, for session management. A rate limiting algorithm is used to check if the user session (or IP address) has to be limited based on the information in the session cache.

In case a client made too many requests within a given time frame,HTTP servers can respond with status code429: Too Many Requests.

However, in some cases (i.e. web servers) the session management and rate limiting algorithm should be built into the application (used for dynamic content) running on the web server, rather than the web server itself.

When a protocol server or a network device notice that the configured request limit is reached, then it will offload new requests and not respond to them. Sometimes they may be added to aqueue to be processed once the input rate reaches an acceptable level, but at peak times the request rate can even exceed the capacities of such queues and requests have to be thrown away.

Data centers

[edit]

Data centers widely use rate limiting to control the share of resources given to different tenants and applications according to their service level agreement.[5] A variety of rate limiting techniques are applied in data centers using software and hardware. Virtualized data centers may also apply rate limiting at the hypervisor layer. Two important performance metrics of rate limiters in data centers are resource footprint (memory and CPU usage) which determines scalability, and precision. There usually exists a trade-off, that is, higher precision can be achieved by dedicating more resources to the rate limiters. A considerable body of research with focus on improving performance of rate limiting in data centers.[5]

See also

[edit]
Algorithms
Libraries

References

[edit]
  1. ^Richard A. Deal (September 22, 2004)."Cisco Router Firewall Security: DoS Protection".Cisco Press. RetrievedApril 16, 2017.
  2. ^Greenberg, Andy (12 January 2021)."An Absurdly Basic Bug Let Anyone Grab All of Parler's Data".Wired.Archived from the original on 12 January 2021. Retrieved12 January 2021.
  3. ^Jinghe Jin; Nazarov Nodir; Chaetae Im; Seung Yeob Nam (7 November 2014)."Mitigating HTTP GET Flooding Attacks through Modified NetFPGA Reference Router". p. 1.Archived from the original on Mar 6, 2023. Retrieved19 December 2021 – via ResearchGate.
  4. ^Cloud Native Using Containers, Functions, and Data to Build Next-Generation Applications. O'Reilly Media. 2019.ISBN 9781492053798.
  5. ^abNoormohammadpour, M.; Raghavendra, C. S. (May 2018)."Datacenter Traffic Control: Understanding Techniques and Trade-offs".IEEE Communications Surveys & Tutorials.20 (2): 1.arXiv:1712.03530.doi:10.1109/COMST.2017.2782753.Archived from the original on Jan 16, 2024 – via ResearchGate.
  6. ^abcdNikrad Mahdi (April 12, 2017)."An alternative approach to rate limiting".Medium. RetrievedApril 16, 2017.
Retrieved from "https://en.wikipedia.org/w/index.php?title=Rate_limiting&oldid=1292944239"
Category:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp