Home » Product Summary

Product Summaryjamhelper

Product SummaryProduct


It’s in trouble to ‘List type Attacks’ and ‘DoS attacks’.

jamhelper is resolves the problem in the 4 functions

 1. Avoidance of incorrect login
   Jamhelper will shut off automatically in illegal logging in the same person.

 2. Influx control of heavy function
   If access to the heavy function is concentrated, it will issue a “ticket” in automatic.

 3. Avoidance of DoS attacks
    jamhelper will automatically shut off the mass access (F5 attack) by the same person.

 4. Immediate cut-off of the specified IP address
   IP blocking and release is possible in immediately without having to restart the web server.

 
全体イメージ

 
Case of the congestion
Check every 15 seconds, and allows access if possible your order
 

User can wait in comfort by Since the connection is committed
Prevents service outages proactively by jamhelper.


 
整理券発行イメージ
 

The main feature list of jamhelperFeature

1. Defense Unauthorized login Cut off by the login of the continuous failure
it’s shut off, if not allowed to login after a certain number of times.
Ex: shut off for 10 minutes if you fail to log in three times in 30 seconds
Congestion prevention Will issue a ticket
Cases where access is not allowed to stop the service concentrated
Ex: to accept the 50,000 people, but you wait for more than 100 people
DoS Attacks Automatic cut-off of mass access
Will put a limit on the number of access within the specified period
Example: Shut off 1 minute once you access more than 20 times in 10 seconds
Shut off of immediately IP access blocking
Block specific IP without rebooting the web server
Example: you can shut off the IP immediately from the browser at a large amount access
2. Redundancy Distributed web server Centralized management of configuration
Enabling operational load reduction, Since sharing the set with a plurality of web server
Access management The redundancy management in access information
Even if abnormality occurs in the KVS to manage the access, and then continue the service by switching automatically
3. Log function Recording of the shutoff
output in a log file at unjust login, waiting, DoS attack.
4. Monitoring Grasp of access state
provides the function of only the log output (not blocking) for the purpose of setting
5. Exclusion feature URL exclusion Defense unnecessary function
Can be excluded from the subject at URL
IP exclusion Defense unnecessary IP
Can be excluded from the subject at IP
UserAgent exclusion Defense unnecessary U/A
Can be exclude such as mobile and crawlers in the specified User-Agent
Content exclusion Defense unnecessary contents
Can be excluded from the defense function in Content-Type (or extension) such as images and CSS
6. Customization Response code HTTP response code
Can be set HTTP response code during shut-off.
Wait-screen Customizing the design
Can be changed the “waiting screen” to suit to website design
Shut-off screen Customizing the design
Can be changed the “Shut-off screen” to suit to website design
7. Management IP Address the persistent blocking and Release of the IP Address
Provides the function of shut-off and release by the IP whitelist and blacklist
Wait release Release of the waiting user
Can be cancel the user in the waiting at the specified ticket number
8. Proxy server support mod_proxy support
It’s corresponds to “X-Forwarded-For”
9. Developer Log output Log output at details
Can Log output at the results in detail
Port control environment control by port
Will support the environment that is controlled by the port.
10. SSL Application of http/https
It’s also applicable in service to transition to https from http

 

Recommended BusinessRecommended website

We want to achieve the proper foundation and operation costs to website


・ feel the risk to information leak by unauthorized access
・ can’t be infrastructure investment to temporary congestion
・ we want to lower the cost of the monitoring system by 24h/365day

Normal access is small, but Recommend to the service there is a temporary access increasing concern.

・Electronic Commerce
 ・Access concentration occurs by the time sale, the service is delayed
 ・Access concentration occurs by the e-mail magazine, the service is stoped

・Public website
 ・In preparation for a disaster, it has an excess infrastructure facilities for peak characteristics
 ・However, disaster / emergency information want to always be delivered even waiting

・School or test related websites
 ・Access concentration occurs by the examination result announcement, the service is stoped

・Internal business systems
 ・it’s influenced to the business by concentrated access at the deadline day

・Advance order website
 ・Online ticket website
 ・Marathon reception website
 ・Fair held reception website

 

Demonstration

We’ve prepared a demo website

please check the blocking state by mass access.
will be blocking at the time of cart insertion or Unauthorized login.
also you can verify the priority indication and IP blocking and releasing of the waiting user by the management screen

Copyright(c) 2013 jamhelper All Rights Reserved.