Spring Boot 防止接口恶意刷新和暴力请求的实现

网友投稿 337 2022-07-26


在实际项目使用中,必须要考虑服务的安全性,当服务部署到互联网以后,就要考虑服务被恶意请求和暴力攻击的情况,下面的教程,通过intercept和redis针对url+ip在一定时间内访问的次数来将ip禁用,可以根据自己的需求进行相应的修改,来打打自己的目的;

首先工程为springboot框架搭建,不再详细叙述。直接上核心代码。

首先创建一个自定义的拦截器类,也是最核心的代码;

/**

* @package: com.technicalinterest.group.interceptor

* @className: IpUrlLimitInterceptor

* @description: ip+url重复请求现在拦截器

* @author: Shuyu.Wang

* @date: 2019-10-12 12:34

* @since: 0.1

**/

@Slf4j

public class IpUrlLimitInterceptor implements HandlerInterceptor {

private RedisUtil getRedisUtil() {

return SpringContextUtil.getBean(RedisUtil.class);

}

private static final String LOCK_IP_URL_KEY="lock_ip_";

private static final String IP_URL_REQ_TIME="ip_url_times_";

private static final long LIMIT_TIMES=5;

private static final int IP_LOCK_TIME=60;

@Override

public boolean preHandle(HttpServletRequest httpServletRequest, HttpServletResponse httpServletResponse, Object o) throws Exception {

log.info("request请求地址uri={},ip={}", httpServletRequest.getRequestURI(), IpAdrressUtil.getIpAdrress(httpServletRequest));

if (ipIsLock(IpAdrressUtil.getIpAdrress(httpServletRequest))){

log.info("ip访问被禁止={}",IpAdrressUtil.getIpAdrress(httpServletRequest));

ApiResult result = new ApiResult(ResultEnum.LOCK_IP);

returnjson(httpServletResponse, JSONNVeFFOLG.toJSONString(result));

return false;

}

if(!addRequestTime(IpAdrressUtil.getIpAdrress(httpServletRequest),httpServletRequest.getRequestURI())){

ApiResult result = new ApiResult(ResultEnum.LOCK_IP);

returnJson(httpServletResponse, JSON.toJSONString(result));

return false;

}

return true;

}

@Override

public void postHandle(HttpServletRequest httpServletRequest, HttpServletResponse httpServletResponse, Object o, ModelAndView modelAndView) throws Exception {

}

@Override

public void afterCompletion(HttpServletRequest httpServletRequest, HttpServletResponse httpServletResponse, Object o, Exception e) throws Exception {

}

/**

* @Description: 判断ip是否被禁用

* @author: shuyu.wang

* @date: 2019-10-12 13:08

* @param ip

* @return java.lang.Boolean

*/

private Boolean ipIsLock(String ip){

RedisUtil redisUtil=getRedisUtil();

if(redisUtil.hasKey(LOCK_IP_URL_KEY+ip)){

return true;

}

return false;

}

/**

* @Description: 记录请求次数

* @author: shuyu.wang

* @date: 2019-10-12 17:18

* @param ip

* @param uri

* @return java.lang.Boolean

*/

private Boolean addRequestTime(String ip,String uri){

String key=IP_URL_REQ_TIME+ip+uri;

RedisUtil redisUtil=getRedisUtil();

if (redisUtil.hasKey(key)){

long time=redisUtil.incr(key,(long)1);

if (time>=LIMIT_TIMES){

redisUtil.getLock(LOCK_IP_URL_KEY+ip,ip,IP_LOCK_TIME);

return false;

}

}else {

redisUtil.getLock(key,(long)1,1);

}

return true;

}

private void returnJson(HttpServletResponse response, String json) throws Exception {

PrintWriter writer = null;

response.setCharacterEncoding("UTF-8");

response.setContentType("text/json; charset=utf-8");

try {

writer = response.getWriter();

writer.print(json);

} catch (IOException e) {

log.error("LoginInterceptor response error ---> {}", e.getMessage(), e);

} finally {

if (writer != null) {

writer.close();

}

}

}

}

代码中redis的使用的是分布式锁的http://形式,这样可以最大程度保证线程安全和功能的实现效果。代码中设置的是1S内同一个接口通过同一个ip访问5次,就将该ip禁用1个小时,根据自己项目需求可以自己适当修改,实现自己想要的功能;

redis分布式锁的关键代码:

/**

* @package: com.shuyu.blog.util

* @className: RedisUtil

* @description:

* @author: Shuyu.Wang

* @date: 2019-07-14 14:42

* @since: 0.1

**/

@Component

@Slf4j

public class RedisUtil {

private static final Long SUCCESS = 1L;

@Autowired

private RedisTemplate redisTemplate;

// =============================common============================

/**

* 获取锁

* @param lockKey

* @param value

* @param expireTime:单位-秒

* @return

*/

public boolean getLock(String lockKey, Object value, int expireTime) {

try {

log.info("添加分布式锁key={},expireTime={}",lockKey,expireTime);

String script = "if redis.call('setNx',KEYS[1],ARGV[1]) then if redis.call('get',KEYS[1])==ARGV[1] then return redis.call('expire',KEYS[1],ARGV[2]) else return 0 end end";

RedisScript redisScript = new DefaultRedisScript<>(script, String.class);

Object result = redisTemplate.execute(redisScript, Collections.singletonList(lockKey), value, expireTime);

if (SUCCESS.equals(result)) {

return true;

}

} catch (Exception e) {

e.printStackTrace();

}

return false;

}

/**

* 释放锁

* @param lockKey

* @param value

* @return

*/

public boolean releaseLock(String lockKey, String value) {

String script = "if redis.call('get', KEYS[1]) == ARGV[1] then return redis.call('del', KEYS[1]) else return 0 end";

RedisScript redisScript = new DefaultRedisScript<>(script, String.class);

Object result = redisTemplate.execute(redisScript, Collections.singletonList(lockKey), value);

if (SUCCESS.equals(result)) {

return true;

}

return false;

}

}

最后将上面自定义的拦截器通过registry.addInterceptor添加一下,就生效了;

@Configuration

@Slf4j

public class MyWebAppConfig extends WebMvcConfigurerAdapter {

@Bean

IpUrlLimitInterceptor getIpUrlLimitInterceptor(){

return new IpUrlLimitInterceptor();

}

@Override

public void addInterceptors(InterceptorRegistry registry) {

registry.addInterceptor(getIpUrlLimitInterceptor()).addPathPatterns("/**");

super.addInterceptors(registry);

}

}

自己可以写一个for循环来测试方面的功能,这里就不详细介绍了;


版权声明:本文内容由网络用户投稿,版权归原作者所有,本站不拥有其著作权,亦不承担相应法律责任。如果您发现本站中有涉嫌抄袭或描述失实的内容,请联系我们jiasou666@gmail.com 处理,核实后本网站将在24小时内删除侵权内容。

上一篇:Mybatis中&lt;if&gt;和&lt;choose&gt;的区别及“=”判断方式
下一篇:Java自动释放锁的三种实现方案
相关文章

 发表评论

暂时没有评论,来抢沙发吧~