Rate limiting

In computer networks, rate limiting is used to control the rate of requests sent or received by a network interface controller. It can be used to prevent DoS attacks[1] and limit web scraping.[2]

Research indicates flooding rates for one zombie machine are in excess of 20 HTTP GET requests per second,[3] legitimate rates much less.

Rate limiting should be used along with throttling pattern to minimize the number of throttling errors. [4]

  1. ^ Cite error: The named reference cisco was invoked but never defined (see the help page).
  2. ^ Greenberg, Andy (12 January 2021). "An Absurdly Basic Bug Let Anyone Grab All of Parler's Data". Wired. Archived from the original on 12 January 2021. Retrieved 12 January 2021.
  3. ^ Jinghe Jin; Nazarov Nodir; Chaetae Im; Seung Yeob Nam (7 November 2014). "Mitigating HTTP GET Flooding Attacks through Modified NetFPGA Reference Router". p. 1. Archived from the original on Mar 6, 2023. Retrieved 19 December 2021 – via ResearchGate.
  4. ^ Cloud Native Using Containers, Functions, and Data to Build Next-Generation Applications. O'Reilly Media. 2019. ISBN 9781492053798.