Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Voice over internet protocol data overload detection and mitigation system and method

Inactive Publication Date: 2006-04-06
PROLEXIC TECHNOLOGIES
View PDF33 Cites 378 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0027] Due to the large volume of GET commands that may be received, a database function may be performed on the received GET commands to determine if the GET commands are duplicates. The database function may include a hashing algorithm applied to the GET commands to speed processing and to use less memory.

Problems solved by technology

However, a preferred embodiment does not necessarily differentiate between client and server computers in detecting and mitigating the overload condition.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice over internet protocol data overload detection and mitigation system and method
  • Voice over internet protocol data overload detection and mitigation system and method
  • Voice over internet protocol data overload detection and mitigation system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] A preferred embodiment of a system and method for detecting and / or mitigating an overload condition, constructed in accordance with the claimed invention, provides detection and / or mitigation of an overload condition style attack from one or more first computers that target one or more of a plurality of second computers located on a network. Such attack includes, by way of example only, and not by way of limitation a distributed denial of service (DDoS) attack, viral attack or the like. The network may comprise any type of public or private network, such as the Internet, intranet, virtual private network (VPN) or the like.

[0051] Referring now to the drawings, like reference numerals denote like or corresponding parts throughout the drawing figures.

[0052] Referring now to the drawings, like reference numerals denote like or corresponding parts throughout the drawing figures. Shown in FIG. 1 is a preferred data cleaning center 100 according to an exemplary embodiment of the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method is disclosed for detecting and / or mitigating an attempted overload condition targeting a voice over data or Internet protocol system, and the like. A network connection receives a plurality of VOIP or IPTV requests, for example. A processor detects whether two or more of the requests are substantially duplicate. The processor discards further received requests that are determined to be substantially duplicate.

Description

CROSS REFERENCE TO RELATED DOCUMENTS [0001] This application is a continuation-in-part of U.S. patent application Ser. No. 10 / 956,721, filed Oct. 1, 2004.FIELD OF THE INVENTION [0002] This invention relates to a system and method for preventing distributed denial of service (DDoS) attacks, or the like, via a network, such as the Internet. In particular, the invention relates to a data cleaning center having attack detection and / or mitigation modules that provide DDoS attack-free data to back-end servers. BACKGROUND OF THE INVENTION [0003] During the past few decades, the Internet has provided a convenient way to obtain a wealth of information on almost any subject. Many paid and free information services may be offered over the Internet, including electronic mail, home shopping, gaming, paperless billing services, and the like. Users merely need to obtain a web page address or uniform resource locator (URL) for the service they desire. [0004] In this regard, commercial revenue for I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F15/173
CPCH04L29/06027H04L63/02H04L63/1458H04L65/104H04L65/1069H04L65/80H04L65/103H04L63/1416H04L65/1101
Inventor LYON, BARRETT
Owner PROLEXIC TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products