Skip to content
This repository has been archived by the owner on Oct 7, 2024. It is now read-only.

Use message throttling #143

Open
sarroutbi opened this issue Aug 7, 2023 · 0 comments
Open

Use message throttling #143

sarroutbi opened this issue Aug 7, 2023 · 0 comments
Assignees
Labels
enhancement New feature or request security Security related stuff

Comments

@sarroutbi
Copy link
Collaborator

To protect against brute-force DoS attacks, use a feature that enforces a set number of failed attempts by a certain IP, API key, or request route during a set period. For example, a web API could allow an IP to have a maximum number of requests within a second, minute, or hour.

You should also consider using a feature that throttles multiple requests from, or originating from, the same user (API key). This reduces the likelihood of a brute-force attack.

@sarroutbi sarroutbi added security Security related stuff enhancement New feature or request labels Aug 7, 2023
@sarroutbi sarroutbi changed the title Use message throtling Use message throttling Aug 7, 2023
@sarroutbi sarroutbi self-assigned this Jan 5, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement New feature or request security Security related stuff
Projects
None yet
Development

No branches or pull requests

1 participant