최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0673159 (2015-03-30) |
등록번호 | US-9887932 (2018-02-06) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 27 인용 특허 : 450 |
A system, method, and computer-readable medium for point of presence (POP) based traffic surge detection and mitigation are provided. The system detects a traffic surge for a target group of resources directed at a source POP based on the target group's rank shifts and volume changes among recent ti
A system, method, and computer-readable medium for point of presence (POP) based traffic surge detection and mitigation are provided. The system detects a traffic surge for a target group of resources directed at a source POP based on the target group's rank shifts and volume changes among recent time intervals. The system mitigates the detected traffic surge by identifying destination POPs with spare capacity and routing at least a portion of incoming requests for the target group of resources to the destination POPs in accordance with their spare capacities.
1. A computer-implemented method for concluding mitigation of flash crowd traffic on networks, the computer-implemented method comprising: under control of a computing device configured with specific computer executable instructions, for each destination point of presence (POP) of a plurality of POP
1. A computer-implemented method for concluding mitigation of flash crowd traffic on networks, the computer-implemented method comprising: under control of a computing device configured with specific computer executable instructions, for each destination point of presence (POP) of a plurality of POPs utilized for mitigating a traffic surge for a target group of network resources in which a number of requests for the network resources received by a source POP of the plurality of POPs during a first period of time exceeds a threshold, obtaining a request volume for requests for network resources corresponding to the target group received at the respective destination POP during a second period of time;determining an aggregate request volume based at least in part on request volumes associated with each of the plurality of POPs, wherein the plurality of POPS includes at least one destination POP and at least one source POP;determining that the aggregate request volume does not meet a traffic volume threshold associated with the source POP, wherein the source POP corresponds to a POP where the traffic surge for the target group was detected; andcausing termination of traffic surge mitigation for the target group by reducing the amount of request volume routed to the destination POPs in response to determining that the aggregate request volume does not meet the traffic volume threshold. 2. The computer-implemented method of claim 1, wherein determining an aggregate request volume comprises adding respective request volumes associated with each of the plurality of POPs. 3. The computer-implemented method of claim 1, wherein the traffic volume threshold is based, at least in part, on spare capacity associated with the source POP for processing requests for network resources corresponding to the target group. 4. The computer-implemented method of claim 3 further comprising determining the spare capacity associated with the source POP based, at least in part, on the second period of time. 5. The computer-implemented method of claim 3, wherein determining that the aggregate request volume does not meet the traffic volume threshold comprises comparing the aggregate request volume against the spare capacity associated with the source POP. 6. The computer-implemented method of claim 1, wherein the traffic volume threshold comprises a historical request volume for the target group received at the source POP prior to the detection of the traffic surge. 7. The computer-implemented method of claim 6, wherein the historical request volume is associated with request volumes received at the source POP during a plurality of time periods prior to the detection of the flash crowd traffic. 8. The computer-implemented method of claim 6, wherein determining that the aggregate request volume does not meet the traffic volume threshold comprises comparing the aggregate request volume against the historical request volume. 9. The computer-implemented method of claim 1, wherein termination of traffic surge mitigation for the target group comprises modifying a routing policy for routing requests for network resources corresponding to the target group to the plurality of POPs. 10. The computer-implemented method of claim 1, wherein causing termination of traffic surge mitigation for the target group further comprises ceasing request routing for the target group to at least one of the destination POPs. 11. A non-transitory computer readable storage medium storing computer executable instructions that when executed by a processor perform operations comprising: determining an aggregate request volume for requests for network resources corresponding to a target group received at a plurality of points of presence (POPs), wherein the plurality of POPs mitigate a traffic surge for the target group in which a number of requests for the network resources received by a source POP in the plurality of POPs during a first period of time exceeds a threshold;determining that the aggregate request volume does not meet a traffic volume threshold associated with the source POP, wherein the source POP corresponds to a POP where the traffic surge for the target group was detected; andcausing termination of traffic surge mitigation for the target group in response to determining that the aggregate request volume does not meet the traffic volume threshold. 12. The non-transitory computer readable storage medium of claim 11, wherein the target group corresponds to at least one of a Web page, Web application, Web site, domain, or sub-domain. 13. The non-transitory computer readable storage medium of claim 11, wherein the operations comprise determining that the aggregate request volume meets the traffic volume threshold at a time prior to determining that the aggregate request volume does not meet the traffic volume threshold. 14. The non-transitory computer readable storage medium of claim 13, wherein the operations further comprise adjusting the traffic surge mitigation based, at least in part, on the aggregate request volume. 15. The non-transitory computer readable storage medium of claim 14, wherein the operations further comprise determining respective spare capacities associated with individual POPs of the plurality of POPs. 16. The non-transitory computer readable storage medium of claim 15, wherein adjusting the traffic surge mitigation comprises causing routing of requests for network resources corresponding to the target group to at least a subset of the plurality of POPs in accordance with their respective spare capacities. 17. The non-transitory computer readable storage medium of claim 16, wherein the traffic surge mitigation is adjusted prior to the termination of the traffic surge mitigation. 18. A system comprising: at least one data store that stores computer-executable instructions; andat least one processor in communication with the data store, the processor configured with the computer-executable instructions such that the computer-executable instructions, when executed, cause the system to at least: determine an aggregate request volume for requests for network resources corresponding to a target group received at a plurality of points of presence (POPs), wherein the plurality of POPs mitigate a traffic surge for the target group in which a number of requests for the network resources received by a source POP in the plurality of POPs during a first period of time exceeds a threshold;determine that the aggregate request volume meets a traffic volume threshold associated with the source POP, wherein the source POP corresponds to a POP where the traffic surge for the target group was detected; andadjust the traffic surge mitigation for the target group in response to determining that the aggregate request volume does not meet the traffic volume threshold. 19. The system of claim 18, wherein the adjustments to the traffic surge mitigation comprise identifying one or more POPs from a second plurality of POPs, wherein at least one request for network resources corresponding to the target group is routed to the one or more POPs from the second plurality of POPs. 20. The system of claim 18, wherein the computer-executable instructions further cause the system to at least cause termination of the traffic surge mitigation for the target group.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.