Method and system for detecting failure-causing client with failure handling edge server grouping

Inactive Publication Date: 2022-11-10
INNOGS KOREA CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The first-type DDoS attack may paralyze the server by burdening the server with an excessive load.
When such an attack occurs, the server may be paralyzed by failing to process other jobs due to an excessive load thereon.
That is, even if there is no problem with the server, a problem may happen in the network, so it may be difficult to maintain a service.
Despite many DDoS security technologies developed to address the above-described situation, none of them is considered a permanent solution.
Although the conventional DDoS security technologies are capable of blocking a DDoS attack, but it is not possible to search for and identify the IP of a DDoS attacker.
In addition, if an attacked line or IP range is blocked in order to block a DDoS attack, even a normal user belonging to the corresponding line or range may not use a service.
This may cause a time loss and an excessive cost in financial institutions, public institutions, and service providers, such as game service providers, that should continuously maintain a service 24 hours a day.
When there is a single client that causes a network failure, the above-described related art relating to a method for detecting a failure-causing client using a client route control system has no difference compared to the present disclosure; however, the related art has a possibility that false detection can happen when a network failure occurs in several clients simultaneously.
When a failure occurs in the operation of the failure-handling edge server and there is a single client terminal allocated to the failure-handling edge server, the processor may determine the single client terminal as a failure-causing client terminal.
This means that it is not possible for a DDoS attacker to directly interfere with the server, so it is not possible to carry out a DDoS attack directly on the server.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting failure-causing client with failure handling edge server grouping
  • Method and system for detecting failure-causing client with failure handling edge server grouping
  • Method and system for detecting failure-causing client with failure handling edge server grouping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044]Hereinafter, embodiments of the present disclosure will be described in detail with reference to the accompanying drawings. The embodiments described in this specification and the configurations shown in the drawings are just preferable examples of the present disclosure and are not intended to limit the scope of the disclosure, so it should be understood that other equivalents and modifications could be made thereto without departing from the spirit and scope of the disclosure.

[0045]FIG. 1 is a block diagram showing an example of the configuration of an entire system to which the present disclosure is applied. A system to which the present disclosure is applied includes a plurality of clients 100, a DNS server 110, a client route control server 120, a service relay network 130, and a service server 140.

[0046]In the present disclosure, the service relay network 130 may include an edge server group 132 and network equipment such as a gateway, a router, a switch and a hub, and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is a client terminal access control method, and the method includes: allocating a communication process of a first client group comprising a plurality of client terminals to an edge server; when a failure occurs in an operation of the edge server, allocating a communication process of a second client group comprising at least one client terminal belonging to the first client group to a failure-handling edge server; and determining whether a failure occurs in an operation of the failure-handling edge serve.

Description

BACKGROUND OF THE DISCLOSUREField of the disclosure[0001]The present disclosure relates to detection of a client causing a network failure and, more particularly, to a method and a system for detecting a failure-causing client with failure-handling edge server grouping to detect a failure-causing client, which causes a network failure, through grouping of failure-handling edge servers.Related Art[0002]Detecting a network failure-causing client using a client route control system, for example, identifying an Internet Protocol (IP) of a distributed denial-of-service (DDoS) attacker may refer to designating an edge server to be accessed by a user using several edge servers, a client route control server, and a domain name server (DNS) to detect and identify a DDoS attack by controlling a client route.[0003]DDoS attacks may be generally classified into two types. The first-type DDoS attack may paralyze the server by burdening the server with an excessive load. When such an attack occurs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L41/0631H04L41/0668
CPCH04L41/065H04L41/0668H04L61/4511H04L41/0645H04L63/1458H04L63/101H04L41/0695
Inventor LIMSEO
Owner INNOGS KOREA CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products