This chapter will introduce the CC penetration attack of forging random directories, which is a popular CC penetration attack at present, especially for a large number of pagination types of domain names, such as movies, novels, anime, forums, pictures, etc. Domains with a large number of pagination,
Attackers are keen to forge random directories or random URL suffixes for CC attacks. The reason why this attack is easy to penetrate is that each URL request does not trigger the identification of the frequency. As a result, many conventional firewalls cannot have
After identifying the source of the attack, it is easy to penetrate the backend. Each time an attacker launches millions of IPs to randomly traverse the target domain name URL, each URL attacker IP will hardly visit it a second time, and each time a different IP traverses the URL suffix
And random directory suffix. So many firewalls in the current market are difficult to effectively identify this type of attack.
Therefore, this site has specially developed random number protection for this type of attack. Random number defense is to identify the CC attack behavior of a large number of different random numbers such as forged root directories and file names for a large number of IP requests at the same time; as shown in the figure,

Big data analytics will be carried out through the CDN background firewall system. Such behavior will be completely blocked. Ensure that malicious requests are completely blocked at the front firewall level and do not reach the back end.




