Download the PHP package thealgoslingers/ddos without Composer
On this page you can find all versions of the php package thealgoslingers/ddos. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Download thealgoslingers/ddos
More information about thealgoslingers/ddos
Files in thealgoslingers/ddos
Package ddos
Short Description Safeguard your website from DDoS attack.
License MIT
Informations about the package ddos
ddos
Protect Your Website from DDoS Attacks
Installation
Usage
Note
• There are two optional params accepted. The first param is an 'ip address' and the second is 'options'. Both are optional.
IP Address
• By default, DDoS use the ip address from the user making the request. • You can manually monitor or log a preferred ip address.
Example:
Options param
The $options is an array of DDoS settings. Here is the list:
cache
: This is set TRUE or FALSE(FALSE by default). It only has effect on the ip2location whether to cache its dataset (for faster ip lookup) or not.
WARNING: This should be set TRUE once per session. Else, the caching will keep restarting anytime this feature is enabled. Make sure you have enough RAM to enable this feature.
log_file
: This option is a path to .txt file to log requests. Please make sure you create the file before setting this option(path/to/the/log/file.txt). By default, DDoS create a log file on its own.
rate
and timesamp
: These two options work together. They specify how many requests allowed(rate) per day/hours/minutes/etc(timesamp). The timesamp option should be in seconds.
By default, it is 100 requests per 600(10 minutes).
Example - All together
• log()
in DDoS also accept one optional param which is a function. This function is executed by DDoS when users hit their limit.
• By default, when a user hits its limit, he is automatically redirected to a "429 Too Many Requests".
• To prevent this from happening, you can tell DDoS to execute your function if a user hit the limit.
Example
• Please note that this function will only be called when the user hits his request limit.
note
DDoS is highly recommended for applications which have main controller or the MVC architecture; where all requets are managed by a single file controller.