Traffic surge management for points of presence
First Claim
Patent Images
1. A computer-implemented method for detecting traffic surges on networks, the computer-implemented method comprising:
- under control of one or more computing devices configured with specific computer executable instructions,obtaining first data regarding requests for network resources received at a first point of presence (POP) of a plurality of POPs during a recent period of time, wherein the first data includes a first list of resource groups, wherein each resource group of the first list is associated with a first request volume of network resource requests associated with the resource group received at the first POP during the recent period of time, and wherein the first list of resource groups is ordered based on the associated first request volumes;
comparing the first data against second data regarding requests for network resources received at the first POP during a second period of time before the recent period of time, wherein the second data includes a second list of resource groups, wherein each resource group of the second list is associated with a second request volume quantifying network resource requests corresponding to the resource group received at the first POP during the second period of time, and wherein the second list of resource groups is ordered based on the associated second request volumes;
identifying a target resource group common to both the first and second lists as a resource group currently receiving flash crowd traffic based, at least in part, on the comparison between the first data and the second data, wherein the target resource group is ranked higher than a first threshold position in the first list and ranked lower than a second threshold position in the second list; and
generating a traffic surge alert based on the identified target resource group.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method, and computer-readable medium for point of presence (POP) based traffic surge detection and mitigation are provided. The system detects a traffic surge for a target group of resources directed at a source POP based on the target group'"'"'s rank shifts and volume changes among recent time intervals. The system mitigates the detected traffic surge by identifying destination POPs with spare capacity and routing at least a portion of incoming requests for the target group of resources to the destination POPs in accordance with their spare capacities.
1262 Citations
20 Claims
-
1. A computer-implemented method for detecting traffic surges on networks, the computer-implemented method comprising:
under control of one or more computing devices configured with specific computer executable instructions, obtaining first data regarding requests for network resources received at a first point of presence (POP) of a plurality of POPs during a recent period of time, wherein the first data includes a first list of resource groups, wherein each resource group of the first list is associated with a first request volume of network resource requests associated with the resource group received at the first POP during the recent period of time, and wherein the first list of resource groups is ordered based on the associated first request volumes; comparing the first data against second data regarding requests for network resources received at the first POP during a second period of time before the recent period of time, wherein the second data includes a second list of resource groups, wherein each resource group of the second list is associated with a second request volume quantifying network resource requests corresponding to the resource group received at the first POP during the second period of time, and wherein the second list of resource groups is ordered based on the associated second request volumes; identifying a target resource group common to both the first and second lists as a resource group currently receiving flash crowd traffic based, at least in part, on the comparison between the first data and the second data, wherein the target resource group is ranked higher than a first threshold position in the first list and ranked lower than a second threshold position in the second list; and generating a traffic surge alert based on the identified target resource group. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A non-transitory computer readable storage medium storing computer executable instructions that when executed by a processor perform operations comprising:
-
identifying a target resource group from a first list of resource groups, wherein each resource group of the first list of resource groups is associated with a first request volume for network resource requests for the respective resource group received at a point of presence (POP) during a first period of time; locating the target resource group within a second list of resource groups, wherein each resource group of the second list of resource groups is associated with a second request volume for network resource requests for the respective resource group received at the POP during a second period of time, and wherein the second period of time precedes the first period of time; determining that the target resource group is receiving a traffic surge at the POP based, at least in part, on a difference between the first request volume and the second request volume; and generating an indication based on the determined target resource group receiving a traffic surge. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
at least one data store configured to at least store computer-executable instructions; and at least one processor in communication with the data store, the processor configured to execute the computer-executable instructions to at least; identify a target resource group from a first list of resource groups, wherein the resource groups of the first list of resource groups are associated with a first request volume quantifying network resource requests corresponding to the resource group received at a point of presence (POP) during a first period of time; obtain data regarding a plurality of second lists of resource groups, wherein the second lists correspond to respective second periods of time preceding the first period of time, and wherein the resource groups of each second set are associated with a respective second request volume quantifying network resource requests corresponding to the resource group received at the POP during a corresponding second period of time; locate the target resource group within at least one of the second lists; determine that the target resource group is receiving a traffic surge based, at least in part, on a difference between an attribute of a first request volume associated with the target resource group and a function of respective second request volume attributes of the target resource group within at least a subset of the plurality of second lists of resource groups; and generate an indication based on the determined target resource group receiving a traffic surge. - View Dependent Claims (19, 20)
-
Specification