Prevent new users from browsing comments

problem description

the system wants to limit the number of posts posted by newly registered users or prevent malicious comments

the environmental background of the problems and what methods you have tried

generally speaking, browsing comments are maliciously brushed by registering new users. Here, I consider using redis to generate a key to record the effective time by judging whether key exists or not, and regenerating a key to record the cumulative number of posts after user registration. Use the program to limit the number of posts. I don"t know if this is feasible. Are there any other good ideas and code examples that do not limit the language

?
Jun.15,2022

is it possible to add a grade and integral field to the user table like the forum, and then newly registered users can only comment at a certain level after completing some tasks and getting points? different levels have restrictions on the number of posts and comments


you can limit the number of comments per day according to ip


redis record id, times and timestamps, and limit the frequency of posts. For example, you can only send 10 messages a minute


simply by setting the expiration time limit of redis through the user's id.
complex points are suitable for semantic analysis, real-time and offline check whether they are water army, and delete messages so as to avoid the impact on real users.


there are restrictions on IP upstairs. This is good. Let me improve it a little bit. Limit IP while you can once again distinguish between browsers and other physical factors, such as Baidu ads to prevent malicious clicks are very good, we can refer to


feasible. Logging to the database can also be


1 New users cannot post within 24 hours of registration. Reply

2 limit the interval between posts

3 limit the total number of posts per user within 24 hours cannot exceed 10, and the number of replies cannot exceed 20

4. To register, you need to verify your mobile phone number

5. Registration Verification IP

6. Post the verification code


the amount of brushing wins by quantity, but because of this, the amount of brushing must be traceable. The underground industry has a huge supply of upstream basic resources, but it is also very dependent on these resources. these are the key nodes of the industrial chain, that is, the effective nodes for you to identify, combat and protect. For example, the excuse that the underground industry is ready to attack, the trading platform involved, the target interface of the attack, the attack tools used, the related resources involved (mobile phone number, IP) and so on. Through the layout and control of these nodes, we can effectively find the risk in time when preparing the resources of the underground industry, understand the attack path and logic of the underground industry, and make the risk control strategy in advance.

In addition, regardless of the technical and equipment iterations of the underground industry, they always launch attacks without bypassing the reserve of some basic fraudulent resources, such as the mobile phone number used for registration and the IP accessed. According to our statistics, the daily malicious registration attacks launched by the underground industry of the whole network reach 800W, and the daily active fraudulent mobile phone number is more than 150W, with an average of 6 attacks per mobile phone number per day. If we monitor the basic resources used from the perspective of the underground industry and identify the fraudulent resources of the underground industry in the business scene, we can directly intercept or reduce the rights of these false accounts. The risk control mode of identifying the basic resources of the underground industry can reduce the misjudgment rate of risk control and improve the interpretability to a certain extent. I hope this article introduces group control , but this short video can help you.

Menu