Solved

Server Ressource!

Posted on 2001-06-06
6
166 Views
Last Modified: 2006-11-17
Here is the situation:

I made an affiliate program for a search engine.
it logs each searches, all click on the results. We now need a fraud prevention system. I want to log only click that have been made for a given keyword only once per 24h period as well as all clicks within a resonable time (let's say 1 min between each click). So as an exemple,
if a user would search for 'casino' and clicks 2 results then get out of the site.. and come back a few hours later and again, search for 'casino' and clicks 3 other results, none of the 3 clicks would have been recorded, but the first 2 would have been recorded. follow me?!

So I guess I need to use session to do that, along with IP/Cookie.. correct? we got about 100k searches done per day.. so it logs 100k searches, 40k clicks, queries the data base to get some info of the affiliates to put in the DB along with the logging of the searches/clicks .. so that's a hell of a lot stuff being stored into the DB.

My question, what would be the best way to put a fraud protection as mentionned above? Session?
if so.. can you provide me with the basement of such a class? Thanks!
0
Comment
Question by:nfuids
6 Comments
 
LVL 8

Accepted Solution

by:
us111 earned 50 total points
ID: 6162810
very small base:)

if ($PHPSESSID)
   session_start($PHPSESSID);
else
   session_start();

0
 
LVL 2

Expert Comment

by:higijj
ID: 6164687
but will this take a lot of ressource if I got 100k searches a day?
0
 
LVL 2

Expert Comment

by:higijj
ID: 6164694
I would rather suggest you go with logging the IP/Time in the DB and check it out along with cookie.

so in a first step, I would check for cookie, if there.. no need to queries the DB, if not, query the DB to make sure the user didn't just delete the cookie.

0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 1

Expert Comment

by:Moondancer
ID: 6419203
It's time to clean up this topic area and that means taking care of this question. Your options at this point are:

1. Award points to the Expert who provided an answer, or who helped you most. Do this by clicking on the "Accept Comment as Answer" button that lies above and to the right of the appropriate expert's name.

2. PAQ the question because the information might be useful to others, but was not useful to you. To use this option, you must state why the question is no longer useful to you, and the experts need to let me know if they feel that you're being unfair.

3.  Ask Community Support to help split points between participating experts.  Just comment here with details.

4.  Delete the question because it is of no value to you or to anyone else.  To use this option, you must state why the question is no longer useful to you, and the experts need to let me know if they feel that you're being unfair.

If you elect for option 2, 3 or 4, just post comment with details here and I'll take it from there.  We also request that you review any other open questions you might have and update/close them.  Display all your question history from your Member Profile to view details.

PLEASE DO NOT AWARD THE POINTS TO ME.

____________________________________________



Hi Experts:

In the event that the Asker does not respond, I would very much appreciate your opinions as to which Expert ought to receive points (if any) as a result of this question.  Likewise, you can also suggest that I PAQ or delete the question.

Experts, please do not add further "answer" information to this question.  I will be back in about one week to finalize this question.

Thank you everyone.

Moondancer :)
Community Support Moderator @ Experts Exchange

P.S.  REGARDING POINTS, Guidelines and more:  http://www.experts-exchange.com/jsp/cmtyHelpDesk.jsp  
0
 
LVL 5

Expert Comment

by:andriv
ID: 6929738
In the attempt to help clean up abandoned Questions, I will ask Community Support to close this Question. Unless there is objection or further activity, I will suggest to split points between us111 & higijj comment(s) as an answer as soon as possible.

If you think your question was not answered at all, you can post a request in Community support (please
include this link) to refund your points.
The link to the Community Support area is: http://www.experts-exchange.com/jsp/qList.jsp?ta=commspt

Please do not accept this comment as an answer!

Andriv
0
 
LVL 1

Expert Comment

by:Moondancer
ID: 6929772
Thanks, Andriv.

Points have been split.  The other half awaits comments here, this TA.
Points for higijj -> http://www.experts-exchange.com/jsp/qShow.jsp?qid=20286752

Moondancer - EE Moderator
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Author Note: Since this E-E article was originally written, years ago, formal testing has come into common use in the world of PHP.  PHPUnit (http://en.wikipedia.org/wiki/PHPUnit) and similar technologies have enjoyed wide adoption, making it possib…
Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
Learn how to match and substitute tagged data using PHP regular expressions. Demonstrated on Windows 7, but also applies to other operating systems. Demonstrated technique applies to PHP (all versions) and Firefox, but very similar techniques will w…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now