Rate Limiting

Rate limiting sets specific guidelines for user or system requests to an application or application programming interface (API). Though requests are often for a particular server (such as a business’s website), they are processed at the application level on the server. Administrators can navigate to their server’s configuration file and write their own rate limits, defined specifically for their website. Rate limits are set to prevent distributed denial of service (DDoS) attacks or to keep an application from being overwhelmed by excessive traffic.

DDoS attacks overwhelm a server with multiple requests from multiple Internet sessions, typically all controlled by one hacker. This sometimes forces that server to shut down temporarily and is very difficult to halt once the attack has been launched. Rate limiting attempts to prevent being overwhelmed by limiting how many users can access the server or how much traffic the server itself will allow at one time. This manages server resources as well so that it can run more efficiently. Rate limiting provides greater security for application programming interfaces (APIs) and optimizes their efficiency. APIs, which manage application design and application interactions, require rate limiting to avoid being overwhelmed.

In data centers and cloud platforms, rate limiting manages traffic, depending on the volume of activity. Ideally, in such environments, computing processes will set rate limits automatically without requiring human administration.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

Phishing

What is phishing? Phishing is a type of cybercrime in which victims are contacted by email, telephone, or text message by an attacker posing as...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...