TW201526589A - Method for selectively allowing or stopping the internet access request traffic sharing the public IP on the basis of present time, and the current state detecting and stopping system for executing the method sharing the public IP - Google Patents

Method for selectively allowing or stopping the internet access request traffic sharing the public IP on the basis of present time, and the current state detecting and stopping system for executing the method sharing the public IP Download PDF

Info

Publication number
TW201526589A
TW201526589A TW103102803A TW103102803A TW201526589A TW 201526589 A TW201526589 A TW 201526589A TW 103102803 A TW103102803 A TW 103102803A TW 103102803 A TW103102803 A TW 103102803A TW 201526589 A TW201526589 A TW 201526589A
Authority
TW
Taiwan
Prior art keywords
user
traffic
client terminal
router
website
Prior art date
Application number
TW103102803A
Other languages
Chinese (zh)
Other versions
TWI577163B (en
Inventor
Jong-Ho Choi
Seung-Kwang Koh
Original Assignee
Planty Net Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Planty Net Co Ltd filed Critical Planty Net Co Ltd
Publication of TW201526589A publication Critical patent/TW201526589A/en
Application granted granted Critical
Publication of TWI577163B publication Critical patent/TWI577163B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2514Translation of Internet protocol [IP] addresses between local and global IP addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a method for selectively allowing or stopping the internet access request traffic sharing the public IP on the basis of present time, and the current state detecting and stopping system for executing the method sharing the public IP. The method and system are configured to selectively allow or stop the internet access request traffic by detecting the quantity of a plurality of user terminals using the same public IP in private network, and comparing with an assigned allowing quantity of the terminals to perform the access request, after pre-detecting the suspected user who overuses the router, the user using the public IP is only detected for real router overuse state to stop operation of webpage traffic, thereby the user unrelated to the router is almost not affected by the router detecting system. In addition, during detecting the suspected user who overuses the router, Internet speed is almost not decreased. Even the detecting system has an error or fails, the user of Internet is not affected. Moreover, during a stage of detecting correct overuse state of router to stop the access, by using the flash shared object with cookies which are not easy to delete by user, the possibility of erroneous detecting or miss stopping is decreased, so as to provide high efficiency through dynamic classifying the terminals to be accessed and the terminals to be stopped for processing during the real stopping stage.

Description

以當前時間為基準共享公網IP之因特網連接請求流量之選擇性允許或阻止方法及用以執行該方法之公網IP共享之當前狀態檢測及阻止系統 Selective permission or blocking method for sharing Internet connection request traffic of public network IP based on current time and current state detection and blocking system for public IP sharing of the method for performing the method

本發明係關於一種針對複數個用戶一面利用藉由網絡地址轉換(NAT)或網絡路由器等IP地址轉換之IP路由器而以共享一個公網IP之方式連接到由因特網服務提供商所提供之因特網服務網,於因特網服務用戶中檢測於當前狀態中藉由IP路由器而超出針對用戶允許之線路而實施多址連接之用戶,針對該IP共享用戶之IP共享狀態,允許以當前狀態為基準應允許因特網連接之終端之網頁使用,而阻止以當前狀態為基準應阻止因特網連接之終端之網頁使用之裝置及利用其裝置之阻止方法。 The present invention relates to an Internet service provided by an Internet service provider in a manner of sharing a public IP by using an IP router by IP address translation such as Network Address Translation (NAT) or a network router for a plurality of users. The network detects, in the Internet service user, the user who performs the multiple access connection by the IP router beyond the line allowed for the user in the current state, and allows the Internet to be allowed based on the current state for the IP sharing status of the IP sharing user. The webpage of the connected terminal is used, and the device for preventing the webpage of the terminal connected to the Internet from being connected based on the current state and the blocking method using the device are blocked.

近年來,多用戶計算機等之客戶終端於同時使用網絡之過程中,使用IP路由器共享分配於因特網服務用戶之一個公網IP而利用因特網之情況非常多,越來越多之公司或企業內部為了構建公司內部網絡與外部因特網之間之防火牆而於路由器上構成網絡地址轉換(NAT,Network Address Translation),內部亦多使用私有IP。 In recent years, in the process of simultaneously using a network by a client terminal such as a multi-user computer, there are many cases in which an IP router is used to share a public network IP assigned to an Internet service user, and the Internet is used in an increasing number of companies or companies. A firewall is formed between the company's internal network and the external Internet, and Network Address Translation (NAT) is formed on the router. Private IP is also used internally.

另一方面,於由現有之因特網服務提供商(ISP:Internet Service Provider)所構建之基礎設施中,裝備及網絡維護費、網絡速度等資源有限,另一方面,隨著使用網絡地址轉換或IP路由器等之頻率之增加,複數個用戶連接於藉由網絡所提供之一個線路上,從而導致發生無序之流量增加,藉此,針對每個線路之因特網公網IP僅有一個客戶終端(計算機)正常使用之用戶,或者,藉由申請相當於因特網使用需求客戶終端之數字之因特網公網IP線路而正常使用之用戶,相對地需承擔其造成之損失。 On the other hand, in the infrastructure built by the existing Internet Service Provider (ISP), equipment and network maintenance fees, network speed and other resources are limited, on the other hand, with the use of network address translation or IP As the frequency of routers and the like increases, a plurality of users are connected to one line provided by the network, resulting in an unordered increase in traffic, whereby there is only one client terminal for the Internet public IP of each line (computer A user who is in normal use, or a user who normally uses the Internet public IP line equivalent to the number of Internet-required client terminals, is relatively liable for the loss.

然而,為了正確地掌握此種使用超過藉由因特網服務使用線路之公網IP線路之相應數量之客戶終端(用戶終端,用戶計算機)之用戶,需跟蹤實際用戶終端(用戶計算機)之IP地址,然而,由於網絡地址轉換(NAT)或IP路由器內部之用戶之實際IP(私有IP)地址,於通過網絡地址轉換(NAT)或IP路由器時轉換為公網IP地址,藉此,無法自外部掌握用戶之實際IP地址,亦無法正確地掌握由幾個私有IP共用特定公網IP。 However, in order to correctly grasp the user of the corresponding number of client terminals (user terminals, user computers) that use more than the public network IP lines using the Internet service by the Internet service, the IP address of the actual user terminal (user computer) needs to be tracked. However, due to network address translation (NAT) or the actual IP (private IP) address of the user inside the IP router, it is converted to a public IP address when passing through a network address translation (NAT) or IP router, thereby being unable to grasp from the outside. The actual IP address of the user cannot correctly grasp that a specific public IP is shared by several private IPs.

為了解決此種存在問題,藉由分析TCP/IP包,於所請求之頁面中針對共享對象重定向連接於具有主域之域之所有會話,於使用特定公網IP(因特網IP)之私有網絡內掌握用戶之私有IP,同時實施資料庫化,以使正確掌握使用因特網之用戶數,若藉由資料庫化之IP池資訊及任務(JOB)而由私有IP用戶同時連接網絡,則如公開有基於TCP/IP之選擇性允許及阻止技術之大韓民國專利註冊第10-0723657號(2007.5.23.公告),為了獲得用戶計算機之私有IP,需要設置用於告知內部網絡內之用戶之私有IP地址之獨立之小程序(應用程序),且需要於試圖藉由網頁瀏覽器而連接因特網之用戶計算機中運行所獨立設置之小程序(應用程序),然而,用戶可藉由識別此種小程序之設置或運 行與否而將其刪除或停止其運行,從而無法提供問題之根本性解決方案。 In order to solve this problem, by analyzing the TCP/IP packet, all the sessions connected to the domain with the primary domain are redirected for the shared object in the requested page, and the private network using the specific public IP (Internet IP) is used. Master the user's private IP and implement databaseization so that the number of users using the Internet can be properly grasped. If the private IP user connects to the network at the same time by means of database-based IP pool information and tasks (JOB), There is a Republic of Korea Patent Registration No. 10-0723657 (2007.5.23. Announcement) based on TCP/IP selective permission and blocking technology. In order to obtain the private IP of the user computer, it is necessary to set a private IP for informing users in the internal network. An independent applet (application) of an address, and needs to run an independently set applet (application) in a user computer attempting to connect to the Internet by a web browser, however, the user can identify such an applet Setting or shipping If you delete it or stop it, you can't provide a fundamental solution to the problem.

另一方面,於為了解決如上所述之用於取得私有IP之獨立之小程序設置於用戶終端之技術所具有之存在問題所提出之應對方案中,根據大韓民國公開專利公報第10-2009-0041752號(2009.4.29.公開)所公開之技術,針對需要檢測之多台終端,利用藉由生成於共享使用之私有網絡內之客戶端側之多終端之Cookie之精密檢測算法而掌握客戶端側之多終端之正確數量之技術,藉由資料庫化之Cookie池資料庫資訊及以預定時間間隔運行之任務(JOB)計劃程序(Scheduler),若特定公網IP之私有網絡用戶超過允許線路數而同時連接因特網,則基於TCP/IP之私有網絡中允許及阻止因特網連接。 On the other hand, in response to the problem of the problem that the technology for setting up a private IP for independent applet is set in the user terminal as described above, according to the Korean Republic Patent Publication No. 10-2009-0041752 The technology disclosed in No. (2009.4.29.) discloses the client side by using a sophisticated detection algorithm of a cookie generated on a client side of a shared-use private network for a plurality of terminals that need to be detected. The correct number of technologies for multiple terminals, through the database of cookie pool database information and the task running at predetermined time intervals (JOB) scheduler (Scheduler), if the private network user of a specific public IP address exceeds the number of allowed lines While connected to the Internet, Internet connections are allowed and blocked in a private network based on TCP/IP.

然而,於此種根據以往技術之路由器檢測及阻止方法或路由器檢測及阻止系統中,由於檢測藉由使用IP路由器而利用過多終端(計算機)數量之用戶之檢測流程及檢測自此種用戶之檢測系統而進行阻止之流程呈一體化,具有IP路由器等與共享裝備之使用完全無關之所有用戶之流量向路由器檢測系統流入之結構,藉此,不僅加重路由器檢測系統之負荷,而且所有用戶之流量處理速度等受到路由器檢測系統之處理性能之影響,從而不僅導致因特網速度減慢,若路由器檢測系統發生錯誤或故障,則所有用戶之流量處於不可處理之狀態,從而導致因特網本身之癱瘓。 However, in such a router detection and prevention method or router detection and prevention system according to the prior art, the detection process of detecting the number of users using too many terminals (computers) by using an IP router and detecting the detection from such users The process of blocking the system is integrated, and there is a structure in which the traffic of all users, such as an IP router, which is completely unrelated to the use of the shared equipment, flows into the router detection system, thereby not only increasing the load of the router detection system but also the traffic of all users. The processing speed and the like are affected by the processing performance of the router detection system, which not only causes the Internet speed to slow down, but if the router detects that the system has an error or a failure, the traffic of all users is in an unprocessable state, which causes the Internet itself to collapse.

同時,於上述以往技術中,為了檢測及阻止路由器過量使用用戶而利用存儲於用戶計算機之特定區域之Cookie,此種Cookie係為了針對用於向客戶端側賦予持續性之標準HTTP協議擴展功能而藉由網頁瀏覽器所操作,其存儲於用戶計算機之硬盤之已知位置,又,大部 分計算機用戶非常瞭解Cookie刪除方法,若Cookie積累,則反而導致發生因特網速度低下之問題,對此,網頁瀏覽器亦提供於預定期間後對其進行刪除及整理之功能,例如,若一個公網IP僅限於由一個計算機使用(不使用IP路由器等),則若於因特網連接途中刪除Cookie後再次運行網頁瀏覽器而發生網頁流量,則於根據以往技術之阻止系統中,將其錯誤地判斷為於具有相同公網IP之其他計算機中發生之流量(即,使用IP路由器等之流量),從而導致對其進行阻止,而此種存在問題將對由因特網服務提供商所提供之服務之可靠性造成巨大之損害。 Meanwhile, in the above prior art, in order to detect and prevent the router from overusing the user, the cookie stored in a specific area of the user's computer is utilized, and the cookie is for the standard HTTP protocol extension function for giving continuity to the client side. Operated by a web browser, which is stored in a known location on the hard disk of the user's computer, and most Computer users know the cookie deletion method very well. If the cookie is accumulated, it will cause the Internet speed to be low. For this reason, the web browser also provides the function of deleting and sorting it after the scheduled period, for example, if a public network IP is limited to use by one computer (not using an IP router, etc.), if the webpage traffic occurs when the web browser is re-run after deleting the cookie on the Internet connection, it is erroneously judged as a blocking system according to the prior art. Traffic that occurs in other computers with the same public IP address (that is, traffic using IP routers, etc.), which causes it to be blocked, and this problem will be related to the reliability of the service provided by the Internet service provider. Cause huge damage.

同時,於上述以往技術中,若於因特網服務用戶中使用IP路由器而以超過針對用戶允許之線路之終端連接因特網之同時,連接因特網之終端之數量於針對用戶允許之線路範圍內使用,則若開始連接於因特網之終端之當前狀態處於連接中斷狀態,則為了能夠允許後續連接於網絡之終端之連接,於作為包括用於區分以相同IP進行連接之終端之分隔符之記錄集合體之Cookie池資料庫(或用戶身分證明池資料庫)中運營按預定時間間隔更新以分隔符列表存在之時間之任務計劃程序,例如,每隔30分鐘運行之任務(JOB)計劃程序,藉由查看於Cookie池資料庫中上傳之記錄中之所上傳之因特網連接時間,刪除於預定時間內(例如,20分鐘內)無連接時間之變化之記錄而更新資訊(參照圖5b)。 Meanwhile, in the above prior art, if an IP router is used in an Internet service user to connect to the Internet at a terminal exceeding a line permitted by the user, and the number of terminals connected to the Internet is used within a range permitted for the user, The current state of the terminal that is connected to the Internet is in the state of disconnection of the connection, in order to be able to allow the connection of the terminal connected to the network later, as a cookie pool including a record set for distinguishing the separators of the terminals connected by the same IP A task scheduler that updates the time at which the separator list exists at predetermined intervals in the database (or user identity pool database), for example, a task (JOB) scheduler that runs every 30 minutes, by viewing the cookie The uploaded Internet connection time in the record uploaded in the pool database is deleted and the information is updated by recording the change of the connectionless time within a predetermined time (for example, within 20 minutes) (refer to FIG. 5b).

然而,於此種情況中,例如,6名工作人員分別使用所分配之4台計算機連接因特網並處理各自之業務,若每2名一組並按照12小時倒班之形式工作,如若僅具有2個因特網連接允許線路,則存在一種輪班之新一組2名工作人員無法於上一組2名工作人員之因特網連接記錄藉由以30分鐘為單位運行之任務(JOB)計劃程序而被刪除期間無法連接因特網之問題,而此種無法連接因特網之時間最長可達到任務 (JOB)計劃程序驅動時間間隔(例如,30分鐘)及驅動任務(JOB)計劃程序後記錄刪除基準時間(例如,20分鐘)加起之50分鐘,藉此,造成用戶使用上之極大之不便性。 However, in this case, for example, six staff members use the four computers assigned to connect to the Internet and handle their respective services. If they work in groups of two and work in the form of 12-hour shifts, if there are only two Internet connection allows lines, there is a new group of shifts. 2 staff members can't be able to delete the Internet connection records of the previous group of 2 staff members by the 30-minute task (JOB) planning program. The problem of connecting to the Internet, and this can't connect to the Internet for the longest time. (JOB) The scheduler drives the time interval (for example, 30 minutes) and the drive task (JOB) scheduler to record the deletion of the base time (for example, 20 minutes) plus 50 minutes, thereby causing great inconvenience to the user. Sex.

另一方面,若為了緩解此種存在問題而最小化任務(JOB)計劃程序驅動時間間隔及驅動任務(JOB)計劃程序後之記錄刪除基準時間間隔,則不僅出現因驅動任務(JOB)計劃程序而導致之資料庫服務器工作負荷之增加之問題,而且對於用戶來說,若短暫處理其他業務或稍事休憩,則將喪失藉由自身終端之因特網連接權限,從而導致使用上之不便性。 On the other hand, if the task (JOB) scheduler drive time interval and the record deletion time interval after the drive task (JOB) scheduler are minimized in order to alleviate such a problem, not only the drive task (JOB) scheduler but also the drive task (JOB) scheduler As a result, the workload of the database server is increased, and for the user, if the other services are temporarily handled or a little rested, the Internet connection authority of the terminal is lost, resulting in inconvenience in use.

本發明係用以解決此種先前技術之問題點之技術手段,其係一種共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其係選擇性地允許及阻止藉由檢測利用相同公網IP之私有網絡上之複數個用戶終端台數並與所分配之允許台數進行比較而進行請求連接的終端之因特網連接請求流量(例如,於基於TCP/IP之HTTP協議之用戶生成之HTTP請求(Request)流量,藉由GET、POST等方法(Method)之HTTP請求(Request)流量)者,其特徵在於包括:(I)加入用戶流量之鏡像階段,其於由客戶終端藉由驅動網頁瀏覽器而請求連接到因特網上之網站之情況下,由設置於因特網服務提供商之骨幹網絡之鏡像裝置鏡像自客戶終端發生之網站連接請求流量,並且將上述經鏡像之網站連接請求流量傳輸到推送服務器,以便確認是否為IP路由器過量使用嫌疑用戶;(II)加入用戶流量之過量使用嫌疑用戶公網IP確認階段,其由上述推送服務器確認上述經鏡像之網站連接請求流量是否為藉由推送服務器所處理之藉由包含於上一個連接流量之公網IP及cookie資訊而選定為路由器過量使用嫌疑用戶之公網IP; (III)路由器過量使用狀態檢測及阻止決定階段,其若為被選定為路由器過量使用嫌疑用戶之公網IP,則為了減少負荷,上述推送服務器執行用於確認上述經鏡像之網站連接請求流量是否為可成為決定阻止與否之對象之流量之階段後,若屬於阻止與否決定對象流量,則向客戶終端傳輸第二假響應流量(為了區別於後述之“第一假響應流量而稱為”第二假響應流量),以使藉由上述第二假響應流量而於用戶客戶終端所生成之100%幀上以參數形式補充用戶原來試圖連接之網站之地址並向檢測及阻止用網絡服務器重定向之檢測及阻止用轉發流量自客戶終端傳輸到檢測及阻止用網絡服務器後,上述檢測及阻止用網絡服務器藉由有別於所接收之自上述檢測及阻止用轉發流量所提取之用戶之公網IP及上述100%幀而獨立生成之0%檢測幀,藉由自用戶客戶終端所接收之以用戶身分證明等設定參數名存儲之閃存共享對象(“Flash Shared Object”:以二進制形態之資料存儲於用戶硬盤之未知區域,用戶不易對其進行刪除,不同於Cookie,不設定所持續之資料之到期日由有效期等)之固有參數值而執行路由器過量使用檢測算法,藉此,對於非路由器過量使用狀態之用戶之流量,允許藉由用戶客戶終端所請求之網站連接,藉由檢測路由器過量使用狀態之用戶流量,藉由補充處理條件而決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接請求。 The present invention is a technical means for solving the problem of the prior art, which is a selective enabling or blocking method for sharing Internet connection request traffic of a public network IP, which selectively allows and prevents the same utilization by detection. Internet connection request traffic of a terminal that requests connection by comparing the number of user terminals on the private network of the public IP to the number of allowed users (for example, user generated by the TCP/IP-based HTTP protocol) HTTP request (Request) traffic, by GET, POST, etc. (Method) HTTP request (Request) traffic, characterized by: (I) joining the mirroring phase of user traffic, which is driven by the client terminal In the case where the web browser requests to connect to a website on the Internet, the mirroring device installed in the backbone network of the Internet service provider mirrors the website connection request traffic generated from the client terminal, and transmits the mirrored website connection request traffic. To the push server to confirm whether the suspected user is over-utilized by the IP router; (II) suspected excessive use of user traffic During the IP confirmation phase of the public network, the above-mentioned push server confirms whether the mirrored website connection request traffic is processed by the push server and is selected as a router excess by the public network IP and cookie information included in the previous connection traffic. Use the public network IP of the suspect user; (III) The router over-use status detection and blocking decision phase, if it is selected as the router over-use the public network IP of the suspect user, in order to reduce the load, the push server performs to confirm whether the mirrored website connection request traffic is After the stage of the traffic that is the target of the decision to prevent or not, if the traffic is determined to be blocked or not, the second false response traffic is transmitted to the client terminal (in order to distinguish it from the "first false response traffic" described later. The second false response traffic) is such that the address of the website that the user originally tried to connect is supplemented by parameters on the 100% frame generated by the user client terminal by the second false response traffic, and is detected and blocked by the network server. After detecting and preventing the forwarding of the forwarding traffic from the client terminal to the detecting and blocking network server, the detecting and blocking network server is different from the user extracted from the above-mentioned detection and blocking forwarding traffic. 0% detection frame independently generated by the network IP and the above 100% frame, received by the user from the user terminal The flash shared object stored in the parameter name is stored in the unknown area of the user's hard disk. It is not easy for the user to delete it. It is different from the cookie and does not set the persistent data. The router over-use detection algorithm is executed by the inherent parameter value of the expiration date, etc., whereby the traffic of the user who is in the non-router over-utilization state is allowed to be over-used by the detection router by the website connection requested by the user client terminal. The user traffic of the state determines whether to allow or block the website connection request of the user client terminal of the router over-utilization state by supplementing the processing conditions.

又,於本發明之加入用戶流量之路由器過量使用嫌疑用戶公網IP確認階段中,包括並未選定為路由器過量使用嫌疑用戶之公網IP之處理階段之更具體之方法如下:(I)加入用戶流量之鏡像階段,其於由客戶終端藉由驅動網頁瀏覽器而請求連接到因特網上之網站之情況下,由設置於因特網服務提供商之骨幹網絡之鏡像裝置鏡像自客戶終端發生之網站連接請求流量,並且將上述經鏡像之網站連接請求流量傳輸到推送服務器,以便 確認是否為IP路由器過量使用嫌疑用戶;(II)加入用戶流量之過量使用嫌疑用戶公網IP確認階段,其由上述推送服務器確認上述經鏡像之網站連接請求流量是否為藉由推送服務器所處理之藉由包含於上一個連接流量之公網IP及cookie資訊而選定為路由器過量使用嫌疑用戶之公網IP;(III-A)路由器過量使用嫌疑用戶選定及上傳階段,其若並非為被選定為路由器過量使用嫌疑用戶之公網IP,則由上述推送服務器藉由包含於上述經鏡像之網站連接請求流量之公網IP及Cookie資訊而驗證是否為應選定為路由器過量使用嫌疑用戶之狀態,若被選定為路由器過量使用嫌疑用戶,則上傳該IP,又,將包括用於向客戶終端存儲藉由定義設定如sign參數之Cookie有效時間之獨特變量並以當前時刻設定之Cookie之命令及用於引導以使重新連接到原來試圖連接之網站之重定向命令之第一假響應流量傳輸到客戶終端;(III-B)路由器過量使用狀態檢測及阻止決定階段,其若為被選定為路由器過量使用嫌疑用戶之公網IP,則為了減少負荷,上述推送服務器執行用於確認上述經鏡像之網站連接請求流量是否為可成為決定阻止與否之對象之流量之階段,若屬於阻止與否決定對象流量,則向客戶終端傳輸第二假響應流量,以使藉由上述第二假響應流量而於用戶客戶終端所生成之100%幀上以參數形式補充用戶原來試圖連接之網站之地址並向檢測及阻止用網絡服務器重定向之檢測及阻止用轉發流量自客戶終端傳輸到檢測及阻止用網絡服務器後,上述檢測及阻止用網絡服務器藉由有別於所接收之自上述檢測及阻止用轉發流量所提取之用戶之公網IP及上述100%幀而獨立生成之0%檢測幀,藉由自用戶客戶終端所接收之閃存共享對象之之固有參數值而執行路由器過量使用檢測算法,若為非路由器過量使用狀態之用戶流量,則允許藉由用戶客戶終端而請求之網站連接,藉由檢測路由器過量使用狀態之 用戶流量而根據補充處理條件而決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接請求,並且,經過上述路由器過量使用嫌疑用戶選定及上傳階段之上述經鏡像之網站連接請求流量,與被選定為路由器過量使用嫌疑用戶與否無關,於上述推送服務器中被廢棄,允許藉由原始網站連接請求流量之因特網連接,若於上述路由器過量使用狀態檢測及阻止決定階段之上述路由器過量使用狀態檢測中未被判別為路由器過量使用狀態,則檢測及阻止用網絡服務器藉由重定向於藉由用戶客戶終端而以參數形式附加到上述檢測及阻止用轉發流量之原始目的網站而允許網站之連接,於上述路由器過量使用狀態檢測及阻止決定階段之上述路由器過量使用狀態檢測中未被判別為路由器過量使用狀態,或者於決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接之過程中藉由補充處理條件而允許網站連接之情況下,檢測及阻止用網絡服務器藉由重定向於藉由用戶客戶終端而以參數形式附加到上述檢測及阻止用轉發流量之原始目的網站而允許網站之連接。 Moreover, in the phase of the IP authentication phase of the suspected user public network in which the router for adding user traffic is excessively used in the present invention, a more specific method including the processing stage of the public network IP that is not selected as the router for excessive use of the suspect user is as follows: (I) Joining In the mirroring phase of user traffic, when a client terminal requests to connect to a website on the Internet by driving a web browser, the mirroring device installed on the backbone network of the Internet service provider mirrors the website connection generated from the client terminal. Request traffic and transfer the mirrored website connection request traffic to the push server so that Confirm whether the suspected user is excessively used by the IP router; (II) the excessive use of the user traffic for the suspected user public network IP confirmation phase, which is confirmed by the above push server whether the mirrored website connection request traffic is processed by the push server The public network IP of the suspected user is selected by the router by using the public IP and cookie information contained in the previous connection traffic; (III-A) router overuses the suspect user selection and upload phase, if it is not selected as If the router overuses the public network IP of the suspect user, the push server verifies whether the suspected user should be selected as the router excessively by using the public network IP and cookie information included in the mirrored website connection request traffic. If the router is selected as a router for excessive use of the suspect user, the IP is uploaded, and, in addition, a command for storing a unique variable for setting a cookie effective time such as a sign parameter to the client terminal and setting the cookie at the current time and for The first false of the redirect command that is redirected to reconnect to the original attempted connection The traffic should be transmitted to the client terminal; (III-B) the router over-use status detection and blocking decision phase, if it is selected as the router over-use the public network IP of the suspect user, in order to reduce the load, the above-mentioned push server performs confirmation Whether the above-mentioned mirrored website connection request flow is a stage that can be the target of determining whether to block or not, and if it is a blockage or not, the second false response flow is transmitted to the client terminal, so that the second In the 100% frame generated by the user client terminal, the address of the website that the user originally tried to connect is supplemented by the parameter in response to the traffic, and the detection and prevention of the redirected network server is detected and blocked. The forwarding traffic is transmitted from the client terminal to the detection. And blocking the network server, the detection and blocking network server independently generates 0% detection by using the public network IP of the user extracted from the detection and blocking forwarding traffic and the 100% frame. The frame is executed by the router through the inherent parameter value of the flash shared object received by the user client terminal. The usage detection algorithm, if it is the user traffic of the non-router over-utilization state, allows the website connection requested by the user client terminal to detect the excessive use state of the router. The user traffic determines whether to allow or block the website connection request of the user client terminal of the router over-utilization status according to the supplementary processing condition, and the above-mentioned mirrored website connection request traffic of the suspect user selection and upload stage is excessively used by the router, and Regardless of whether the router overuses the suspect user or not, it is discarded in the above push server, allowing the Internet connection to request traffic through the original website connection, and the above-mentioned router over-use status in the above-mentioned router over-usage state detection and blocking decision phase. In the detection, it is not determined that the router is over-used, and the detection and prevention of the network server is allowed to be connected to the original destination website for detecting and blocking the forwarding traffic by parameter redirection to the user client terminal. The user who is not determined to be in the excessive state of the router in the above-mentioned router over-use state detection in the above-mentioned router over-utilization state detection and blocking decision stage, or in the user who decides whether to allow or block the router over-utilization state In the case where the website connection is allowed in the process of connecting the website of the terminal, the detection and prevention of the network server is added to the above-mentioned detection and blocking forwarding traffic by parameter redirection by being redirected to the user client terminal. The original destination website allows the connection of the website.

與此,藉由檢測及阻止用網絡服務器而執行之構成上述路由器過量使用狀態檢測及阻止階段之路由器過量使用狀態之用戶流量檢測階段,優選地,其具體包括如下階段:由上述檢測及阻止用網絡服務器藉由0%檢測幀而請求於用戶客戶終端(用戶計算機)之閃存共享對象中以如用戶身分證明等設定參數名存儲之固有參數值之階段;以及於上述請求固有參數值之階段中,自客戶終端接收用戶身分證明之固有參數值,若於資料庫服務器之該用戶IP(ID)之24小時以內之用戶身分證明列表中存在與當前連接之用戶客戶終端(用戶計算機)之用戶身分證明值相同之值而被判定為有效之用戶身分證明之固有參數 值,則向資料庫服務器更新該用戶身分證明之連接時刻,允許連接到由用戶之客戶終端請求連接之網站之階段,並且若於上述請求固有參數值之階段中,無法自客戶終端接收用戶身分證明之固有參數值,或者已接收用戶身分證明之固有參數值,然而於該IP(ID)之24小時以內之用戶身分證明列表中不存在與當前連接之用戶客戶終端(用戶計算機)之用戶身分證明值相同之值而被判定為無效之用戶身分證明之固有參數值,則藉由查找於當前資料庫服務器中所存在之該用戶IP(ID)之24小時以內之有效之用戶身分證明列表之數量及該用戶IP(ID)之路由器計算機允許台數,(a)若有效之用戶身分證明列表之數量不足計算機允許台數,則判定為當前不處於路由器過量使用狀態,針對當前連接之用戶客戶終端(用戶計算機)而生成新的用戶身分證明之固有參數值,將其存儲於用戶客戶終端,亦將其與連接時刻一同上傳於資料庫服務器,允許用戶連接到客戶終端所請求連接之網站,並且(b)若有效之用戶身分證明列表數量超過計算機允許台數,則判定為當前處於路由器過量使用狀態,針對當前連接之用戶客戶終端(用戶計算機),藉由補充處理條件而實施用於決定是否允許或阻止因特網連接之連接請求流量之阻止或允許與否決定階段。 In this way, by detecting and blocking the user traffic detection phase of the router over-utilization state of the router over-utilization state detection and blocking phase, which is executed by the network server, preferably, the method includes the following stages: detecting and blocking by the foregoing The network server requests, in the flash shared object of the user client terminal (user computer) by the 0% detection frame, the stage of storing the parameter value of the parameter name such as the user identity certificate; and in the stage of requesting the inherent parameter value Receiving the inherent parameter value of the user identity certificate from the client terminal, if there is a user identity of the currently connected user client terminal (user computer) in the user identity certificate list within 24 hours of the user IP (ID) of the database server Inherent parameters of the user identity certificate that are judged to be valid by the same value Value, the connection time of the user identity certificate is updated to the database server, allowing connection to the stage of the website requested by the user's client terminal, and if the user requests the inherent parameter value, the user identity cannot be received from the client terminal. The inherent parameter value of the certificate, or the intrinsic parameter value of the user identity certificate received, but the user identity terminal (user computer) of the currently connected user identity list does not exist in the user identity certificate list within 24 hours of the IP (ID) The intrinsic parameter value of the user identity certificate determined to be invalid by the same value, and the valid user identity certificate list within 24 hours of finding the user IP (ID) existing in the current database server The number and the number of router computers permitted by the user's IP (ID), (a) if the number of valid user identity certificates is less than the number of computers allowed, it is determined that the router is not currently in the over-utilized state, for the currently connected user. The terminal (user computer) generates a new parameter value of the user identity certificate and stores it in the user name. The client terminal also uploads it to the database server together with the connection time, allows the user to connect to the website requested by the client terminal, and (b) if the number of valid user identity certificates exceeds the number of computers allowed, the current terminal is determined to be current In the router over-commitment state, for the currently connected user client terminal (user computer), the blocking or permission decision phase for determining whether to allow or block the Internet connection connection request flow is implemented by supplementing the processing conditions.

進而,於如上所述之藉由補充處理條件而實施用於決定是否允許或阻止因特網連接之連接請求流量之阻止或允許與否決定階段中,優選地,其包括:(b1)存在於資料庫服務器之該用戶IP(ID)之第一設定時間(T-1;例如,24小時)以內之有效之用戶身分證明列表中,若存在所上傳之連接時刻以當前時刻為基準而超過第二設定時間(T-2;例如,30分鐘)而經過之用戶身分證明,則刪除於資料庫服務器中之連接時間最久之用戶身分證明列表,針對當前連接之用戶客戶終端(用戶計算機)而生 成新的用戶身分證明之固有參數值,將其存儲於用戶客戶終端,亦將其與連接時刻一同上傳於資料庫服務器,允許用戶連接到客戶終端所請求連接之網站,並且(b2)若存在於資料庫服務器之該用戶IP(ID)之24小時以內之有效之用戶身分證明列表中不存在所上傳之連接時刻以當前時刻為基準而超過30分鐘之用戶身分證明,則針對當前連接之用戶客戶終端(用戶計算機),阻止連接到所請求連接之網站。 Further, in the stage of determining or allowing the connection request flow for deciding whether to allow or block the Internet connection by the supplementary processing condition as described above, preferably, it includes: (b1) existing in the database In the valid user identity certificate list within the first set time (T-1; for example, 24 hours) of the user IP (ID) of the server, if the uploaded connection time exists, the second setting is exceeded based on the current time. Time (T-2; for example, 30 minutes) and the user identity certificate passed, the user identity certificate list with the longest connection time in the database server is deleted, and is generated for the currently connected user client terminal (user computer). The intrinsic parameter value of the new user identity certificate is stored in the user client terminal, and is also uploaded to the database server together with the connection time, allowing the user to connect to the website requested by the client terminal, and (b2) if present If there is no user identity certificate in the valid user ID list within 24 hours of the user IP (ID) of the database server, the user identity certificate for more than 30 minutes based on the current time is for the currently connected user. The client terminal (user computer) blocks the connection to the website of the requested connection.

本發明提供一種公網IP共享狀態檢測及阻止系統,其係執行上述方法發明而藉由檢測利用相同公網IP之私有網絡上之複數個用戶客戶終端之數量並與所分配之允許台數進行比較而根據IP共享狀態選擇性地允許及阻止請求連接之客戶終端之因特網連接請求流量者,其特徵在於包括:鏡像裝置,其於由因特網服務用戶之客戶終端藉由驅動網頁瀏覽器而請求連接到因特網上之網站之情況下,用於鏡像自客戶終端發生之網站連接請求流量,設置於因特網服務提供商之骨幹網絡;推送服務器,其藉由確認上述經鏡像之網站連接請求流量之用戶公網IP是否為藉由推送服務器所處理之藉由包含於上一個連接流量之公網IP及cookie資訊而選定為路由器過量使用嫌疑用戶之公網IP,若為被選定為路由器過量使用嫌疑用戶之公網IP,則為了減少檢測及阻止用網絡服務器之負荷,上述推送服務器執行用於確認上述經鏡像之網站連接請求流量是否為可成為決定阻止與否之對象之流量之階段,若屬於阻止與否決定對象流量,則向客戶終端傳輸第二假響應流量,以使藉由生成於用戶客戶終端之100%幀而以參數形式補充用戶原來試圖連接之網站之地址並向檢測及阻止用網絡服務器重定向之檢測及阻止用轉發流量自客戶終端傳輸到檢測及阻止用網絡服務器;以及 檢測及阻止用網絡服務器,其藉由有別於自上述用戶客戶終端傳輸之自上述檢測及阻止用轉發流量所提取之用戶之公網IP及上述100%幀而獨立生成之0%檢測幀,而將以自用戶客戶終端接收之用戶身分證明等設定參數名存儲之閃存共享對象之固有參數值存儲於資料庫服務器,藉由搜索自連接時刻至第一設定時間期間所存儲之列表,而執行路由器過量使用狀態檢測算法,藉此,對於非路由器過量使用狀態之用戶流量,向藉由用戶客戶終端而以參數形式附於上述檢測及阻止用轉發流量之原始目的網站進行重定向,藉由檢測路由器過量使用狀態之用戶流量,藉由補充處理條件而決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接請求。 The present invention provides a public network IP sharing state detection and prevention system, which performs the above method invention by detecting the number of a plurality of user client terminals on a private network using the same public network IP and performing the number of allowed users. Comparing and selectively enabling and blocking an Internet connection request traffic of a client terminal requesting connection according to an IP sharing state, comprising: a mirroring device requesting connection by driving a web browser by a client terminal of an Internet service user In the case of a website on the Internet, the website connection request traffic for mirroring from the client terminal is set in the backbone network of the Internet service provider; the push server, which authenticates the user by requesting the mirrored website connection request traffic Whether the network IP is selected by the push server by the public network IP and cookie information included in the previous connection traffic, and is selected as the public network IP of the router overusing the suspect user, if it is selected as the router excessive use of the suspect user Public network IP, in order to reduce the load of detecting and blocking the use of network servers The push server performs a phase for confirming whether the mirrored website connection request traffic is a traffic that can be determined to be blocked or not, and if the traffic is determined to be blocked or not, the second fake response traffic is transmitted to the client terminal. So that the address of the website that the user originally tried to connect is supplemented by parameters generated by the 100% frame generated by the user client terminal, and the detection and blocking forwarding traffic for detecting and blocking the network server is transmitted from the client terminal to the detection and Blocking the use of a web server; Detecting and blocking a network server, which is independently generated by the public network IP extracted from the above-mentioned user client terminal and blocked by the forwarded traffic, and the 0% detection frame independently generated by the above 100% frame, And storing the inherent parameter value of the flash shared object stored in the setting parameter name, such as the user identity certificate received from the user client terminal, in the database server, by searching the list stored from the connection time to the first set time period, and executing The router overuses the state detection algorithm, whereby the user traffic of the non-router over-utilization state is redirected to the original destination website that detects and blocks the forwarded traffic by parameterizing the user client terminal, by detecting The user traffic of the router over-utilization state determines whether to allow or block the website connection request of the user client terminal of the router over-utilization state by supplementing the processing conditions.

另一方面,本發明之公網IP共享狀態檢測及阻止系統,其用於更提供並未選定為路由器過量使用嫌疑用戶之公網IP之情況之處理功能,其特徵在於包括:鏡像裝置,其於由因特網服務用戶之客戶終端藉由驅動網頁瀏覽器而請求連接到因特網上之網站之情況下,用於鏡像自客戶終端發生之網站連接請求流量,設置於因特網服務提供商之骨幹網絡;推送服務器,其藉由確認上述經鏡像之網站連接請求流量之用戶公網IP是否為所處理之藉由包含於上一個連接流量之公網IP及cookie資訊而選定為路由器過量使用嫌疑用戶之公網IP,若並非為被選定為路由器過量使用嫌疑用戶之公網IP,則向分析服務器傳輸包含於上述經鏡像之網站連接請求流量之公網IP及連接主機(HOST)資訊,以使確認是否處於應選定為路由器過量使用嫌疑用戶之狀態,又,將包括用於向客戶終端存儲藉由定義設定如sign參數之Cookie有效時間之獨特變量並以當前時刻設定之Cookie之命令及用於引導以使重新連接到用戶原來試圖連接之網站之重定向命令之第一假響應流量傳輸到客戶終端,並且,若為被選定為路由器過量使用嫌疑用戶之公 網IP,則向客戶終端傳輸第二假響應流量,以使藉由上述第二假響應流量而於用戶客戶終端所生成之100%幀上以參數形式補充用戶原來試圖連接之網站之地址並向檢測及阻止用網絡服務器重定向之檢測及阻止用轉發流量自客戶終端傳輸到檢測及阻止用網絡服務器;分析服務器,其將自上述推送服務器接收之用戶之公網IP及連接主機(HOST)資訊與連接時間資料一同存儲於資料庫服務器,藉由掌握於設定時間內以公網IP而針對特定主機發起之連接請求次數,而判別其連接請求次數是否超過按不同用戶政策實施管理之IP共享允許計算機數量之允許值,藉此,決定是否選定為路由器過量使用嫌疑用戶,將其決定結果與該公網IP一同傳輸到上述推送服務器;以及檢測及阻止用網絡服務器,其藉由有別於自上述用戶客戶終端傳輸之自上述檢測及阻止用轉發流量所提取之用戶之公網IP及上述100%幀而獨立生成之0%檢測幀,而將以自用戶客戶終端接收之用戶身分證明等設定參數名存儲之閃存共享對象之固有參數值存儲於資料庫服務器,藉由搜索自連接時刻至第一設定時間期間所存儲之列表,而執行路由器過量使用狀態檢測算法,藉此,對於非路由器過量使用狀態之用戶流量,向藉由用戶客戶終端而以參數形式附於上述檢測及阻止用轉發流量之原始目的網站進行重定向,藉由檢測路由器過量使用狀態之用戶流量,藉由補充處理條件而決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接請求。 In another aspect, the public network IP sharing state detecting and blocking system of the present invention is further configured to provide a processing function that is not selected to be a situation in which the router overuses the public network IP of the suspect user, and is characterized by: a mirroring device, In the case where the client terminal of the Internet service user requests to connect to the website on the Internet by driving the web browser, the website connection request traffic for mirroring from the client terminal is set on the backbone network of the Internet service provider; The server, which determines whether the public network IP of the user of the mirrored website connection request traffic is processed by the public network IP and cookie information included in the previous connection traffic, and is selected as the public network of the router excessively using the suspect user. IP, if not for the public network IP of the suspected user who is selected as the router, the public network IP and the connected host (HOST) information included in the mirrored website connection request traffic are transmitted to the analysis server, so that the confirmation is in the Should be selected as the status of the router overusing the suspect user, and will be included for storage to the client terminal By first defining a unique variable that sets the cookie valid time, such as the sign parameter, and transmitting the cookie with the current time and the first false response traffic for booting the redirect command to reconnect to the website the user originally attempted to connect to. Client terminal, and, if it is selected as a router for excessive use of suspect users The network IP transmits the second false response traffic to the client terminal, so that the address of the website that the user originally tried to connect is supplemented in a parameter form on the 100% frame generated by the user client terminal by using the second false response traffic. Detecting and preventing the detection and prevention of forwarding by the network server from the client terminal to the detection and blocking network server; the analysis server, which will receive the public network IP and the connected host (HOST) information of the user received from the above push server Stored in the database server together with the connection time data, and determine whether the number of connection requests initiated by the specific host is greater than the number of connection requests initiated by the specific host in the set time, and whether the number of connection requests exceeds the IP sharing permission managed by different user policies. The allowable value of the number of computers, thereby determining whether the suspected user is selected for excessive use by the router, transmitting the result of the decision along with the public IP to the push server; and detecting and blocking the use of the network server, which is different from The above-mentioned user client terminal transmits the above-mentioned detection and blocking extracted traffic The user's public network IP and the 0% detection frame independently generated by the above 100% frame, and the inherent parameter value of the flash shared object stored in the parameter name stored by the user identity certificate received from the user client terminal is stored in the database server. The router overuse state detection algorithm is executed by searching the list stored from the connection time to the first set time, whereby the user traffic for the non-router overuse state is attached to the parameter by the user client terminal The above-mentioned detection and prevention of the original destination website for forwarding traffic is performed, and by detecting the user traffic of the router over-utilization state, by determining the processing conditions, whether to allow or block the router connection request of the user client terminal of the router over-use state is determined. .

根據本發明,於預先檢測路由器過量使用嫌疑用戶之後,僅針對使用該公網IP之用戶而檢測實際路由器過量使用狀態,並執行阻止其檢測系統之工作,藉此,與路由器使用無關之用戶,幾乎不受到路由器檢測系統之影響,又,於對路由器過量使用嫌疑用戶進行檢測之過程中,幾乎不存在因特網速度減慢現象,即便檢測系統發生錯誤或 故障,亦不會對用戶之因特網造成任何影響。 According to the present invention, after detecting the excessive use of the suspect user by the router in advance, the actual router over-utilization status is detected only for the user who uses the public network IP, and the work of preventing the detection system from being performed is performed, whereby the user unrelated to the use of the router, Almost without the influence of the router detection system, in the process of detecting the excessive use of suspected users of the router, there is almost no slowdown of the Internet speed, even if the detection system is wrong or Failure will not affect the user's Internet.

又,於檢測正確之路由器過量使用狀態並對其進行阻止之階段中,藉由利用閃存共享對象(“Flash Shared Object”:以二進制形態之資料存儲於用戶硬盤之未知區域,用戶不易對其進行刪除,不同於Cookie,不設定所持續之資料之到期日由有效期等),而非利用藉由用戶而易於被刪除之Cookie,從而可降低誤檢測或誤阻止之概率。 In addition, in the stage of detecting the correct over-utilization state of the router and blocking it, by using the flash shared object ("Flash Shared Object": the data stored in the binary form is stored in an unknown area of the user's hard disk, the user is not easy to perform Deletion, unlike cookies, does not set the expiration date of the ongoing data by the expiration date, etc., instead of using cookies that are easily deleted by the user, thereby reducing the probability of false detection or false blocking.

同時,於實際阻止之階段中,藉由動態區分應允許連接之終端及應阻止之終端而進行處理,從而向整體系統賦予高效率性,尤其,最小化處於應允許因特網連接之狀態之工作負荷,藉此,可大幅提昇因特網連接服務之根本性服務效率。 At the same time, in the actual blocking phase, by dynamically distinguishing between the terminal that should be allowed to be connected and the terminal that should be blocked, the overall system is given high efficiency, and in particular, the workload in the state that the Internet connection should be allowed is minimized. In this way, the fundamental service efficiency of the Internet connection service can be greatly improved.

100‧‧‧IP路由器 100‧‧‧IP router

200‧‧‧公網IP共享狀態檢測及阻止系統 200‧‧‧ public network IP sharing status detection and blocking system

210‧‧‧鏡像裝置 210‧‧‧Mirror device

220‧‧‧推送服務器 220‧‧‧Push server

230‧‧‧分析服務器 230‧‧‧Analysis server

240‧‧‧資料庫服務器 240‧‧‧Database Server

250‧‧‧政策管理網頁服務器 250‧‧‧ Policy Management Web Server

260‧‧‧檢測及阻止用網絡服務器 260‧‧‧Detecting and blocking web servers

300‧‧‧因特網 300‧‧‧Internet

圖1係本發明之檢測及阻止系統之整體構成圖。 BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a view showing the overall configuration of a detecting and preventing system of the present invention.

圖2a及圖2b係表示本發明之檢測及阻止系統中執行藉由推送服務器及分析服務器之路由器過量使用嫌疑用戶選定階段之過程的工作狀態圖。 2a and 2b are diagrams showing the operation state of the process of performing the selection phase of the suspect user over-utilization by the router of the push server and the analysis server in the detection and prevention system of the present invention.

圖3係表示本發明之檢測及阻止系統中執行藉由推送服務器與檢測及阻止用網絡服務器之路由器過量使用狀態檢測及阻止階段之過程的工作狀態圖。 Figure 3 is a diagram showing the operation of the process of detecting and blocking the router over-utilization state detection and blocking phase by the push server and the detecting and blocking network server in the detecting and blocking system of the present invention.

圖4a至圖4d係本發明之方法發明之順序圖。 4a to 4d are sequence diagrams of the inventive method of the present invention.

圖5a及圖5b係比較例,與圖5c所示之本發明之執行路由器過量使用狀態檢測及阻止階段之過程進行比較的時序圖。 5a and 5b are timing charts for comparison with the process of the execution router over-utilization state detection and blocking phase of the present invention shown in FIG. 5c.

圖6a至圖7c係表示根據本發明執行路由器過量使用嫌疑用戶選定階段期間所傳輸之網頁流量之實施例的圖式。 Figures 6a through 7c are diagrams showing an embodiment of performing web traffic flow transmitted during a router's overuse of a suspect user selection phase in accordance with the present invention.

圖8及圖9a至圖10b係表示根據本發明執行路由器過量使用狀態檢測及阻止決定階段階段期間所傳輸之網頁流量之實施例的圖式。 8 and 9a through 10b are diagrams showing an embodiment of performing web server over-the-state detection and blocking of web page traffic transmitted during the decision phase phase in accordance with the present invention.

以下,將參照附圖對為了藉由檢測利用相同公網IP之私有網絡上之複數個用戶終端台數並將其與所分配之允許台數進行比較而選擇性地允許及阻止請求連接之終端之因特網連接請求流量之本發明之優選實施例進行說明。 Hereinafter, a terminal for selectively allowing and blocking a request connection by detecting a plurality of user terminal numbers on a private network using the same public IP and comparing it with the number of allowed allowed numbers will be described with reference to the accompanying drawings. A preferred embodiment of the present invention for Internet connection request traffic is described.

參照附圖之圖1至圖3所示之基本結構圖及工作狀態圖、圖4a至圖10b所示之圖,首先對本發明之公網IP共享狀態檢測及阻止系統之優選之一實施例進行說明。 Referring to the basic structural diagram and the operational state diagram shown in FIG. 1 to FIG. 3 and the diagrams shown in FIG. 4a to FIG. 10b, first, a preferred embodiment of the public network IP sharing state detecting and blocking system of the present invention is performed. Description.

如圖1所示,本發明之公網IP共享狀態檢測及阻止系統200之優選之一實施例,其包括鏡像裝置210、推送服務器220、分析服務器230、資料庫服務器240及檢測及阻止用網絡服務器260,具體而言,上述鏡像裝置210,其於由因特網服務用戶之客戶終端(計算機-1、計算機-2、計算機-3、計算機-4)藉由驅動網頁瀏覽器而請求連接到因特網300上之網站之情況下,用於鏡像自客戶終端發生之網站連接請求流量,其設置於因特網服務提供商(ISP;Internet Service Provider)之骨幹網絡(Back Bone Network);上述推送服務器220,其藉由確認上述經鏡像之網站連接請求流量之用戶公網IP是否為藉由推送服務器所處理之藉由包含於上一個連接流量之公網IP及cookie資訊而選定為路由器過量使用嫌疑用戶之公網IP,若並非為被選定為路由器過量使用嫌疑用戶之公網IP,則向分析服務器230傳輸包含於上述經鏡像之網站連接請求流量之公網IP及連接主機(HOST)資訊,以使確認是否處於應選定為路由器過量使用嫌疑用戶之狀態,又,將包括用於向客戶終端(計算機-1、計算機-2、計算機-3、計算機-4)存儲藉由定義設定如sign參數之Cookie有效時間之獨特變量並以當前時刻設定之Cookie之命令及用於引導以使重新連接到用戶原來試圖連接之網站之重定向命令之第一假響應流量(參照圖6b)傳輸到客戶終端(計算機-1、計算機-2、計算機-3、計算機-4),並且,若為被選定為路由器過量使用嫌疑 用戶之公網IP,則為了減少檢測及阻止用網絡服務器之負荷,執行用於確認上述經鏡像之網站連接請求流量是否為可成為決定阻止與否之對象之流量之階段(圖4a及圖4c之“S250”),若屬於阻止與否決定對象流量,則向客戶終端傳輸第二假響應流量(參照圖9a及圖9b),以使藉由上述第二假響應流量而於用戶客戶終端所生成之100%幀上以參數形式補充用戶原來試圖連接之網站之地址並向檢測及阻止用網絡服務器260重定向之檢測及阻止用轉發流量(參照圖10a及圖10b)自客戶終端傳輸到檢測及阻止用網絡服務器260;上述分析服務器230,其將自上述推送服務器220接收之用戶之公網IP及連接主機(HOST)資訊與連接時間資料一同存儲於資料庫服務器240,藉由掌握於設定時間內以公網IP而針對特定主機發起之連接請求次數,而判別其連接請求次數是否超過按不同用戶政策實施管理之IP共享允許計算機數量之允許值,藉此,決定是否選定為路由器過量使用嫌疑用戶,將其決定結果與該公網IP一同傳輸到上述推送服務器220;上述檢測及阻止用網絡服務器260,其藉由有別於自上述用戶客戶終端傳輸之自上述檢測及阻止用轉發流量(參照圖10a及圖10b)所提取之用戶之公網IP及上述100%幀而獨立生成之0%檢測幀,而將以自用戶客戶終端接收之用戶身分證明等設定參數名存儲之閃存共享對象(“Flash Shared Object”)之固有參數值存儲於資料庫服務器240,藉由搜索自連接時刻至第一設定時間期間所存儲之列表,而執行路由器過量使用狀態檢測算法,藉此,對於非路由器過量使用狀態之用戶流量,向藉由用戶客戶終端而以參數形式附於上述檢測及阻止用轉發流量之原始目的網站進行重定向,藉由檢測路由器過量使用狀態之用戶流量,藉由補充處理條件而決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接請求。 As shown in FIG. 1, a preferred embodiment of the public network IP sharing state detecting and blocking system 200 of the present invention includes a mirroring device 210, a push server 220, an analysis server 230, a database server 240, and a detection and blocking network. The server 260, specifically, the mirroring device 210, requests connection to the Internet 300 by driving a web browser by a client terminal (computer-1, computer-2, computer-3, computer-4) of the Internet service user. In the case of the website, the website connection request traffic for mirroring from the client terminal is set in the Back Bone Network of the Internet Service Provider (ISP); the push server 220 borrows Whether the public network IP of the user confirming the above-mentioned mirrored website connection request traffic is selected by the push server as the public network IP and cookie information included in the previous connection traffic, and is selected as the public network of the router excessively using the suspect user. IP, if not for the public network IP of the suspect user who is selected to be over-utilized by the router, then transmitted to the analysis server 230 for inclusion on The mirrored website connects the public network IP and the connected host (HOST) information of the request traffic, so that the confirmation is in the state that the suspect user should be selected for excessive use of the router, and will be included for the client terminal (computer-1, Computer-2, Computer-3, Computer-4) store commands by setting a unique variable such as the cookie valid time of the sign parameter and setting the cookie at the current time and for guiding to reconnect to the user's original attempt to connect. The first false response traffic of the redirect command of the website (refer to Figure 6b) is transmitted to the client terminal (computer-1, computer-2, computer-3, computer-4), and if it is selected for the router overuse suspect The user's public network IP, in order to reduce the load of detecting and blocking the network server, perform the phase for confirming whether the mirrored website connection request traffic is the traffic that can be the object of determining whether to block or not (Fig. 4a and Fig. 4c) "S250"), if it belongs to the blocking or not determining the target traffic, transmitting the second false response traffic to the client terminal (refer to FIG. 9a and FIG. 9b), so that the second fake response traffic is used by the user client terminal The generated 100% frame is parameterized to supplement the address of the website that the user originally tried to connect to and is detected and blocked by the detection and blocking network server 260. The forwarding traffic (refer to FIG. 10a and FIG. 10b) is transmitted from the client terminal to the detection. And the blocking network server 260; the analyzing server 230 stores the public network IP and the connected host (HOST) information of the user received from the push server 220 together with the connection time data in the database server 240, by grasping the setting The number of connection requests initiated by a specific host for the public network IP, and whether the number of connection requests exceeds the number of different user policies. The IP share allows the allowable value of the number of computers, thereby determining whether the suspect user is selected to be over-utilized by the router, and transmitting the result of the decision along with the public IP to the push server 220; the detecting and blocking network server 260, The 0% detection frame independently generated by the user's public network IP and the above 100% frame extracted from the above-mentioned detection and blocking forwarding traffic (refer to FIG. 10a and FIG. 10b) different from the above-mentioned user client terminal transmission. And storing the inherent parameter value of the flash shared object ("Flash Shared Object") stored in the parameter name stored by the user identity certificate received from the user client terminal in the database server 240, by searching for the self-connection time to the first setting The list stored during the time period, and the router over-use state detection algorithm is executed, whereby the user traffic for the non-router over-utilization state is attached to the original detection and blocking forwarding traffic by parameterizing the user client terminal. The destination website performs redirection, by detecting the user traffic of the router over-used state, by supplement processing Member to decide whether to allow or block the user's client terminal site router excess state of the connection request.

又,優選地,於本發明之系統中,其更包括:政策管理網頁服 務器250,其將按不同用戶政策實施管理之IP共享允許計算機數量列表存儲於上述資料庫服務器240並可變更該等資訊。 Moreover, preferably, in the system of the present invention, it further comprises: policy management web service The server 250 stores the list of allowed IP shares of the IP sharing management managed by the different user policies on the database server 240 and can change the information.

關於本發明之方法發明,根據如將圖2a、圖2b及圖3所示之裝置系統之工作狀態以順序圖(流程圖)形式示出之圖4a所示之具體方法之優選實施例,提供一種共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其藉由檢測利用相同公網IP之私有網絡上之複數個用戶終端台數並將其與所分配之允許台數進行比較而選擇性地允許及阻止請求連接之終端之因特網連接請求流量,其特徵在於包括:(I)加入用戶流量之鏡像階段(“S100”),其於由客戶終端藉由驅動網頁瀏覽器而請求連接到因特網上之網站之情況下,由設置於因特網服務提供商之骨幹網絡之鏡像裝置210鏡像自客戶終端發生之網站連接請求流量,並且將上述經鏡像之網站連接請求流量傳輸到推送服務器220,以便確認是否為IP路由器過量使用嫌疑用戶;(II)加入用戶流量之過量使用嫌疑用戶公網IP確認階段(“S200”),其由上述推送服務器220確認上述經鏡像之網站連接請求流量是否為藉由推送服務器所處理之藉由包含於上一個連接流量之公網IP及cookie資訊而選定為路由器過量使用嫌疑用戶之公網IP;(III-A)路由器過量使用嫌疑用戶選定及上傳階段(“S210”),其若並非為被選定為路由器過量使用嫌疑用戶之公網IP,則由上述推送服務器220藉由包含於上述經鏡像之網站連接請求流量之公網IP及Cookie資訊而驗證是否為應選定為路由器過量使用嫌疑用戶之狀態,若被選定為路由器過量使用嫌疑用戶,則上傳該IP,又,將包括用於向客戶終端存儲藉由定義設定如sign參數之Cookie有效時間之獨特變量並以當前時刻設定之Cookie之命令及用於引導以使重新連接到原來試圖連接之網站之重定向命令之第一假響應流量傳輸到客戶終端;(III-B)路由器過量使用狀態檢測及阻止決定階段(“S400”),其若 為被選定為路由器過量使用嫌疑用戶之公網IP,則為了減少負荷,上述推送服務器220執行用於確認上述經鏡像之網站連接請求流量是否為可成為決定阻止與否之對象之流量之階段(“S250”),若屬於阻止與否決定對象流量,則向客戶終端傳輸第二假響應流量(“S300”),以使藉由上述第二假響應流量而於用戶客戶終端所生成之100%幀上以參數形式補充用戶原來試圖連接之網站之地址並向檢測及阻止用網絡服務器260重定向之檢測及阻止用轉發流量自客戶終端傳輸到檢測及阻止用網絡服務器260後,上述檢測及阻止用網絡服務器260藉由有別於所接收之自上述檢測及阻止用轉發流量所提取之用戶之公網IP及上述100%幀而獨立生成之0%檢測幀,藉由自用戶客戶終端所接收之閃存共享對象之之固有參數值而執行路由器過量使用檢測算法,藉此,實施對路由器過量使用狀態之用戶流量進行檢測之路由器過量使用狀態檢測(“S410”)後,藉由補充處理條件而決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接請求(“S420a”),並且經過上述路由器過量使用嫌疑用戶選定及上傳階段(“S210”)之上述經鏡像之網站連接請求流量,與被選定為路由器過量使用嫌疑用戶與否無關,於上述推送服務器220中被廢棄(“S220”),允許藉由原始網站連接請求流量之因特網連接(“S230”),於上述路由器過量使用狀態檢測及阻止決定階段(“S400”)之上述路由器過量使用狀態檢測(“S410”)中未被判別為路由器過量使用狀態,或者於決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接(“S420a”)之過程中藉由補充處理條件而允許網站連接之情況下,檢測及阻止用網絡服務器260藉由重定向於藉由用戶客戶終端而以參數形式附加到上述檢測及阻止用轉發流量之原始目的網站而允許網站之連接(“S420b”)。 With regard to the method invention of the present invention, a preferred embodiment of the specific method shown in FIG. 4a is shown in the form of a sequence diagram (flow diagram) as shown in FIG. 2a, FIG. 2b and FIG. A selective enabling or blocking method for sharing Internet connection request traffic of a public network IP by detecting the number of plural user terminals on a private network using the same public IP and comparing it with the number of allowed allocations And selectively enabling and blocking the Internet connection request traffic of the terminal requesting the connection, comprising: (I) joining a mirroring phase of user traffic ("S100"), which is requested by the client terminal by driving the web browser In the case of connecting to a website on the Internet, the mirror connection device 210 installed in the backbone network of the Internet service provider mirrors the website connection request traffic generated from the client terminal, and transmits the mirrored website connection request traffic to the push server 220. In order to confirm whether the suspected user is overused for the IP router; (II) excessive use of the user traffic to confirm the public network IP of the suspect user Segment ("S200"), which is confirmed by the above-mentioned push server 220 whether the mirrored website connection request traffic is selected as a router by the push server and processed by the public network IP and cookie information included in the previous connection traffic. Excessive use of the public network IP of the suspect user; (III-A) router overuse of the suspect user selection and upload phase ("S210"), if it is not selected for the router to overuse the public network IP of the suspect user, then the above push The server 220 verifies whether the suspected user should be selected as a router excessively by using the public network IP and cookie information included in the mirrored website connection request traffic. If the router is selected as a router for excessive use of the suspect user, the IP is uploaded. And, in addition, will include a command for storing a unique variable for setting a cookie effective time such as a sign parameter to the client terminal and setting a cookie at the current time and for guiding to reconnect to the original attempted connection. The first false response traffic of the directed command is transmitted to the client terminal; (III-B) the router overuse status detection and blocking Stage ( "S400"), if it In order to reduce the load of the public network IP of the suspect user selected as the router, the push server 220 performs a phase for confirming whether the mirrored website connection request traffic is a traffic that can be the object of determining the prevention or not ( "S250"), if it is a blocking or not determining the target traffic, transmitting a second false response traffic ("S300") to the client terminal, so that 100% of the generated by the user terminal is generated by the second false response traffic The above detection and blocking are performed after the frame is supplemented with a parameter in the form of a parameter and the detection and prevention of the redirected traffic to the detection and blocking network server 260 is transmitted from the client terminal to the detection and blocking network server 260. The network server 260 receives the 0% detection frame independently generated by the user's public network IP and the 100% frame extracted from the above-mentioned detection and blocking forwarding traffic, and is received by the user client terminal. The flash shared object has an inherent parameter value and performs a router overuse detection algorithm, thereby implementing excessive use of the router After the router over-use status detection ("S410") for detecting the user traffic, the website connection request ("S420a") of the user client terminal for allowing or preventing the router over-utilization status is determined by supplementing the processing conditions, and after the above The router over-utilizes the above-mentioned mirrored website connection request traffic of the suspect user selection and upload phase ("S210"), regardless of whether the router is selected as the router excessive use suspect or not, is discarded in the push server 220 ("S220") Allowing an Internet connection ("S230") for requesting traffic through the original website connection, which is not discriminated in the above-mentioned router over-use status detection ("S410") in the router over-utilization state detection and blocking decision phase ("S400") Detecting and blocking the network in case the router is over-used, or in the process of deciding whether to allow or prevent the router from over-using the user's client terminal's website connection ("S420a"), by allowing the website to be connected by supplemental processing conditions The server 260 is in the form of a parameter by being redirected to the user client terminal. Attached to the detection site and stop forwarding traffic using the original purpose of allowing the connection site ( "S420b").

於此,上述路由器過量使用嫌疑用戶選定及上傳階段(“S210”), 如圖4b所示之更具體之進行階段,其中,檢查用戶客戶終端之所鏡像之“網站連接請求流量”(若所鏡像之用戶流量為非“網站連接請求流量”,則推送服務器單純地廢棄所鏡像之用戶流量即可)中表示有試圖連接之網站之“URL(Uniform Resource Locator)”之“Host”,檢查“URI(Uniform Resource Identifier)”、“頭域(Referer:以網頁瀏覽器瀏覽因特網時,藉由超鏈接訪問各網站時留下之痕跡)”、“Cookie”之獨特變量(例如,sign變量)狀態,若上述“Host”屬於預先設定之主要檢測目標主機(例如,主要門戶網站等之連接排行前十左右之網站)(下列設定條件),且其他“URI”、“Referer”、“Cookie”之獨特變量均滿足相關下列設定條件(下列設定條件),則設定以使利用公網IP及Cookie資訊之路由器過量使用嫌疑用戶檢測階段繼續執行,否則,設定以使所鏡像之網站連接請求流量廢棄。 Here, the router excessively uses the suspect user selection and upload phase ("S210"), as shown in FIG. 4b, in a more specific stage, in which the "website connection request traffic" mirrored by the user client terminal is checked (if If the mirrored user traffic is not "website connection request traffic", the push server simply discards the mirrored user traffic.) The "Host" of the "URL (Uniform Resource Locator)" indicating the website that is trying to connect is checked. URI (Uniform Resource Identifier), "Header (Referer: traces when visiting the Internet by hyperlinks in a web browser)", "Cookie" unique variable (for example, sign variable) status If the above "Host" belongs to the pre-set main detection target host (for example, the top ten or so websites of the main portal, etc.) (the following setting conditions) ), and other unique variables of "URI", "Referer", "Cookie" satisfy the following setting conditions (the following setting conditions) , , ), it is set to enable the router to use the public network IP and cookie information to over-use the suspect user detection phase to continue execution; otherwise, the setting is such that the mirrored website connection request traffic is discarded.

- 設定條件:“Host”是否為主要檢測目標主機?:即,若屬於主要檢測目標主機,則滿足該條件,確立此種設定條件之理由為確保推送服務器僅對預先設定之網站,例如僅對網站連接排行前十左右之網站執行路由器過量使用嫌疑用戶檢測工作,藉此,大幅降低與此相關之流量處理負荷。故而,若“HOST”為非主要檢測目標主機,則推送服務器將廢棄用戶之鏡像流量,故而,藉由用戶之原始網站連接請求流量而使得HOST之響應流量正常傳輸(輸出)到用戶客戶終端(用戶計算機)。於此,優選地,推送服務器220檢測之Host意味著包括所有子域名之Host,例如,若推送服務器220檢測之主機(HOST)為“naver.com”,則其表示包括“www.naver.com”、“search.naver.com”、“a.b.c.naver.com”等子域名之*.naver.com。故而,若針對用戶設定Cookie或者向分析服務器230傳輸連接主機資訊,則以由推送服務器220檢測之主機基準進行設定或傳輸,例如,若用戶之連接主機為“www.naver.com”且推送服務器220所檢測之主機為“naver.com”,則 - Set conditions : Is "Host" the primary detection target host? : That is, if it belongs to the main detection target host, the condition is met, and the reason for establishing such a setting condition is to ensure that the push server only performs the router excessive use of the suspected user for the pre-set website, for example, only the website of the top ten of the website connection ranking. The inspection work, thereby greatly reducing the traffic processing load associated with this. Therefore, if "HOST" is a non-primary detection target host, the push server will discard the mirrored traffic of the user, so that the response traffic of the HOST is normally transmitted (output) to the user client terminal by the user's original website connection request traffic ( User computer). Here, preferably, the Host detected by the push server 220 means a Host including all subdomains, for example, if the host detected by the push server 220 (HOST) is "naver.com", the representation thereof includes "www.naver.com *.naver.com for subdomains such as "search.naver.com" and "abcnaver.com". Therefore, if a cookie is set for the user or the connection host information is transmitted to the analysis server 230, it is set or transmitted by the host reference detected by the push server 220, for example, if the connected host of the user is "www.naver.com" and the push server is The host detected by 220 is "naver.com", then

Cookie設定為“naver.com”域名(參照圖6b之第一假響應流量之“domain=.naver.com.;”),亦向分析服務器230以“naver.com”傳輸主機資訊,若如此對Cookie以“naver.com”域名進行設定,則以“*.naver.com”連接時,無條件設定之Cookie隨附請求流量而被傳輸。 The cookie is set to the "naver.com" domain name (refer to "domain=.naver.com.;" of the first false response traffic of FIG. 6b), and the host information is also transmitted to the analysis server 230 as "naver.com". Cookies are set with the "naver.com" domain name. When connected with "*.naver.com", unconditionally set cookies are transmitted with the requested traffic.

- 設定條件:“URI”之結束部是否為“/”或“/?”?:即,若推送服務器滿足該條件,則執行路由器過量使用嫌疑用戶檢測工作,其原因為若“URI”之結束部對非“/”或“/?”之流量進行重定向,則將出錯。 - Set conditions : Is the end of "URI""/" or "/?"? : That is, if the push server satisfies the condition, the router excessively uses the suspect user detection work because the end of the "URI" redirects the traffic other than "/" or "/?", and an error occurs.

- 設定條件:是否存在“頭域(Referer)”?即,推送服務器藉由該條件而確認是否為重定向之流量之條件,其成為防止無限循環之條件。 - Set conditions : Is there a "Referer"? That is, the push server confirms whether or not it is a condition of the redirected traffic by the condition, which is a condition for preventing an infinite loop.

- 設定條件:“Cookie”是否存在“sign”變量?:若於“cookie”中存在“sign”獨特變量值,則此為使用與上一個進行連接之客戶終端相同之客戶終端而於規定時間(例如,1小時;存儲“sign”變量值時預先設定之生存時間)以內藉由網頁瀏覽器而二次連接網站之流量,此為非路由器使用檢測(監測)目標流量,由推送服務器廢棄所鏡像之用戶流量即可。 - Set conditions : Is there a "sign" variable in "Cookie"? : If there is a "sign" unique variable value in the "cookie", this is the default time (for example, 1 hour; when the "sign" variable value is stored, using the same client terminal as the last connected client terminal. The lifetime of the website is connected to the website by the web browser. This is the non-router usage detection (monitoring) target traffic, and the push server discards the mirrored user traffic.

又,構成上述路由器過量使用狀態檢測及阻止階段(“S400”)之上述路由器過量使用狀態之用戶流量檢測(“S410”)階段,如圖4d所示之更具體之進行階段,其實施如下階段,即,由上述檢測及阻止用網絡服務器260藉由0%檢測幀而請求於用戶客戶終端(用戶計算機)之閃存共享對象中以如用戶身分證明等設定參數名存儲之固有參數值之階段(“S411”);以及於上述“S411”階段中自客戶終端接收用戶身分證明之固有參數值,若於資料庫服務器240之該用戶IP(ID)之24小時以內之用戶身分證明列表中存在與當前連接之用戶客戶終端(用戶計算機)之用戶身分證明值相同之值而被判定為有效之用戶身分證明之固有參數值,則向資料庫服務器240更新該用戶身分證明之連接時刻,允許連 接到由用戶之客戶終端請求連接之網站之階段(“S412”),並且,若於上述“S411”中,無法自客戶終端接收用戶身分證明之固有參數值,或者已接收用戶身分證明之固有參數值,然而於該IP(ID)之24小時以內之用戶身分證明列表中不存在與當前連接之用戶客戶終端(用戶計算機)之用戶身分證明值相同之值而被判定為無效之用戶身分證明之固有參數值,則藉由查找於當前資料庫服務器240中所存在之該用戶IP(ID)之24小時以內之有效之用戶身分證明列表之數量及該用戶IP(ID)之路由器計算機允許台數(“S413”),(a)若有效之用戶身分證明列表之數量不足計算機允許台數,則判定為當前不處於路由器過量使用狀態,針對當前連接之用戶客戶終端(用戶計算機)而生成新的用戶身分證明之固有參數值,將其存儲於用戶客戶終端,亦將其與連接時刻一同上傳於資料庫服務器240,允許用戶連接到客戶終端所請求連接之網站(“S414a”),並且,(b)若有效之用戶身分證明列表數量超過計算機允許台數,則判定為當前處於路由器過量使用狀態(“S414b”),針對當前連接之用戶客戶終端(用戶計算機),藉由補充處理條件而實施用於決定是否允許或阻止因特網連接之連接請求流量之阻止或允許與否決定階段(參照圖4a之“S420a”及圖4d)。 Further, the user traffic detection ("S410") phase constituting the above-mentioned router over-utilization state of the router over-utilization state detection and prevention phase ("S400") is in a more specific stage as shown in FIG. 4d, and is implemented in the following stage. That is, the detection and prevention network server 260 requests the user's client terminal (user computer) in the flash sharing object by the 0% detection frame to set the parameter value of the parameter parameter value such as the user identity certificate. "S411"); and the inherent parameter value of the user identity certificate received from the client terminal in the above "S411" phase, if the user identity certificate list exists within 24 hours of the user IP (ID) of the database server 240 When the user identity terminal (user computer) of the currently connected user client terminal has the same value as the user identity certificate and is determined to be a valid parameter value of the user identity certificate, the database server 240 updates the connection time of the user identity certificate, and allows the connection. Receiving the stage of the website requested by the client terminal of the user ("S412"), and if in the above "S411", the inherent parameter value of the user identity certificate cannot be received from the client terminal, or the inherent identity of the user identity certificate has been received. The parameter value, however, the user identity certificate in the user identity certificate list within 24 hours of the IP (ID) does not have the same value as the user identity certificate value of the currently connected user client terminal (user computer) and is determined to be invalid. The inherent parameter value is obtained by searching the number of valid user identity certificates within 24 hours of the user IP (ID) existing in the current database server 240 and the router computer allowing the user IP (ID) Number ("S413"), (a) If the number of valid user identity certificates list is less than the number of computers allowed, it is determined that the current state is not in the router over-commitment state, and a new one is generated for the currently connected user client terminal (user computer). The intrinsic parameter value of the user identity certificate is stored in the user client terminal, and is also uploaded to the database server 2 together with the connection time. 40, allowing the user to connect to the website requested by the client terminal ("S414a"), and (b) if the number of valid user identification certificates exceeds the number of allowed computers, it is determined that the router is currently in the state of excessive use of the router ("S414b" "), for the currently connected user client terminal (user computer), by means of supplementary processing conditions, the decision or the permission decision phase of the connection request flow for deciding whether to allow or block the Internet connection is implemented (refer to "S420a of FIG. 4a"). "And Figure 4d).

(b1)存在於資料庫服務器240之該用戶IP(ID)之第一設定時間(T-1;例如,24小時)以內之有效之用戶身分證明列表中,若存在所上傳之連接時刻以當前時刻為基準而超過第二設定時間(T-2;例如,30分鐘)而經過之用戶身分證明,則刪除於資料庫服務器240中之連接時間最久之用戶身分證明列表,針對當前連接之用戶客戶終端(用戶計算機)而生成新的用戶身分證明之固有參數值,將其存儲於用戶客戶終端,亦將其與連接時刻一同上傳於資料庫服務器240,允許用戶連接到客戶終端所請求連接之網站(“S420b1”),(b2)若存在於資料庫服務器240之該用戶IP(ID)之24小時以內之 有效之用戶身分證明列表中不存在所上傳之連接時刻以當前時刻為基準而超過30分鐘之用戶身分證明,則針對當前連接之用戶客戶終端(用戶計算機),阻止連接到所請求連接之網站(“S420b2”)。 (b1) In the valid user identity certificate list existing within the first set time (T-1; for example, 24 hours) of the user IP (ID) of the database server 240, if there is an uploaded connection time to the current If the user identity certificate passed the second set time (T-2; for example, 30 minutes) is the benchmark, the user identity certificate list with the longest connection time in the database server 240 is deleted, and the currently connected user client is deleted. The terminal (user computer) generates a new parameter value of the user identity certificate, stores it in the user client terminal, and uploads it to the database server 240 together with the connection time, allowing the user to connect to the website requested by the client terminal. ("S420b1"), (b2) if it exists within 24 hours of the user IP (ID) of the database server 240 If there is no user identity certificate in the valid user identity certificate list that has been uploaded for more than 30 minutes based on the current time, the user terminal (user computer) that is currently connected is blocked from connecting to the requested connection site ( "S420b2").

故而,用戶身分證明列表之持續時間,例如24小時之第一設定時間(T-1)為用於確認藉由路由器而連接之終端之數量而設定之時間(即,若24小時以內重新連接,則不生成新的用戶身分證明而僅更新連接時間),如此,會出現不合理之狀況,即,幾乎於20小時以上之時間內再無因特網網站連接之終端於用戶身分證明持續時間之第一設定時間(T-1)以內持續保持連接優先權,後續連接之終端之連接持續被不允許,對此需要一種解決方案,其為了使於當前狀態中不超過針對用戶允許之線路數量之範圍以內靈活地允許網絡連接,而獨立於用戶身分證明列表之持續時間之第一設定時間(T-1)而另行設定第二設定時間(T-2),以當前連接之追加終端之連接時間為基準,刪除於連接因特網後經過第二設定時間(T-2)之以往終端之用戶身分證明,針對最新連接之終端而生成新的用戶身分證明,並將其上傳到資料庫服務器並允許網站連接,藉此,動態地分配連接優先權。 Therefore, the duration of the user identity certificate list, for example, the first set time (T-1) of 24 hours is the time set for confirming the number of terminals connected by the router (ie, if reconnecting within 24 hours, Then, the new user identity certificate is not generated and only the connection time is updated. Therefore, there is an unreasonable situation, that is, the terminal that has no Internet website connection in almost 20 hours or more is the first in the duration of the user identity certification. The connection priority is continuously maintained within the set time (T-1), and the connection of the terminal of the subsequent connection is continuously disabled. This requires a solution in order to prevent the current state from exceeding the range of the number of lines allowed for the user. Flexibly allowing the network connection, and setting the second set time (T-2) independently of the first set time (T-1) of the duration of the user identity certificate list, based on the connection time of the currently connected additional terminal , deleting the user identity certificate of the previous terminal after the second set time (T-2) after connecting to the Internet, and generating a new user for the newly connected terminal Points to prove, and upload it to the repository server and allow websites to connect, thereby dynamically allocating connection priority.

於此,由上述檢測及阻止用網絡服務器260阻止向由用戶之客戶終端請求連接之網站進行連接之階段(“S420b2”),可按如圖4a及圖4d所共同示出之方式進行,其阻止階段可藉由政策而向用戶不提供任何響應,與此相反,如圖4d所示,更可包括向阻止消息頁面或警告消息頁面進行重定向之階段。 Here, the stage of detecting the connection to the website requested by the client terminal of the user by the detection and prevention network server 260 ("S420b2") can be performed as shown in FIG. 4a and FIG. 4d together. The blocking phase may provide no response to the user by policy, and instead, as shown in Figure 4d, may also include a phase of redirecting to the blocking message page or the warning message page.

以下,將參照附圖更具體地說明按照本發明之方法發明及用於執行其方法之裝置系統發明而具體地由複數個客戶終端(用戶計算機)藉由IP路由器100而連接因特網網站之案例之處理過程,藉此,進一步補充對本發明結構之理解,同時補充說明更優選之具體實施例,更加具體說明工作狀態及其作用及效果。 Hereinafter, a case in which an invention according to the present invention and an apparatus system for performing the method thereof are specifically described with reference to the accompanying drawings, and specifically, a case in which a plurality of client terminals (user computers) are connected to an Internet website by the IP router 100 will be described. The processing, thereby further supplementing the understanding of the structure of the present invention, while supplementing the more specific embodiments, further explains the working state and its effects and effects.

如圖2a及圖2b所示,於藉由使用網絡地址轉換裝備等IP路由器100而構成之由複數個客戶終端(用戶計算機)(計算機-1、計算機-2、計算機-3、計算機-4)分別試圖連接因特網之私有網絡中,例如,若由第一計算機(計算機-1)藉由驅動網頁瀏覽器而生成用於請求因特網網站連接之用戶請求流量(參照圖6a之“用戶請求流量”),則此種網站連接請求流量(以下,簡稱為“用戶請求流量”),如圖2a之箭頭“①”所示,於因特網服務提供商(ISP;Internet Service Provider)之骨幹網絡(Back Bone Network)之鏡像裝置210中被鏡像,上述經鏡像之網站連接請求流量傳輸到推送服務器220而以使確認是否為IP路由器過量使用嫌疑用戶(參照圖4a之“S100”階段)。 As shown in FIG. 2a and FIG. 2b, a plurality of client terminals (user computers) (computer-1, computer-2, computer-3, computer-4) are constructed by using an IP router 100 such as a network address translation device. In a private network attempting to connect to the Internet, for example, if the first computer (computer-1) drives a web browser to generate a user request for requesting an Internet website connection (refer to "user request traffic" in FIG. 6a) , such a website connection request traffic (hereinafter referred to as "user request traffic"), as shown by the arrow "1" in FIG. 2a, in the backbone network of the Internet Service Provider (ISP) (Back Bone Network) The mirroring device 210 is mirrored, and the mirrored website connection request traffic is transmitted to the push server 220 to confirm whether the IP router is overusing the suspect user (refer to the "S100" stage of FIG. 4a).

如此,於圖4a所示之加入用戶流量之公網IP確認階段(“S200”)中,上述推送服務器220確認上述經鏡像之網站連接請求流量之用戶(圖2a之用戶ID為“USER-1”)公網IP(圖2a之“IP-Addr1”)是否為被選定為路由器過量使用嫌疑用戶之公網IP,若並非為被選定為路由器過量使用嫌疑用戶之公網IP,則藉由包含於上述經鏡像之網站連接請求流量之公網IP及cookie資訊而進行用於檢驗是否處於應選定為路由器過量使用嫌疑用戶之狀態並進行上傳之路由器過量使用嫌疑用戶選定及上傳階段(“S210”)。 Thus, in the public network IP confirmation phase ("S200") of the user traffic added in FIG. 4a, the push server 220 confirms the user of the mirrored website connection request traffic (the user ID of FIG. 2a is "USER-1"). ") Is the public network IP ("IP-Addr1" in Figure 2a) the public network IP of the suspected user who is selected to be over-utilized by the router, if not for the public network IP of the suspected user who is selected to be over-utilized by the router, by including The above-mentioned mirrored website is connected to the public network IP and cookie information of the request traffic, and is used to check whether the router is in a state of being selected as a router for excessive use of the suspected user and uploading the router for excessive use of the suspect user selection and uploading phase ("S210") ).

於此,關於上述路由器過量使用嫌疑用戶選定及上傳階段(“S210”)之進行過程,更具體而言,優選地,推送服務器220首先確認所鏡像之流量是否為“網站連接請求流量”(圖4b之“S211”階段),若所鏡像之用戶流量並非為“網站連接請求流量”,則推送服務器單純地廢棄所鏡像之用戶流量,藉此,允許藉由原始流量之網站連接。 Here, regarding the process of the above-mentioned router overusing the suspect user selection and uploading phase ("S210"), more specifically, preferably, the push server 220 first confirms whether the mirrored traffic is "website connection request traffic" (figure) In the "S211" phase of 4b, if the mirrored user traffic is not "website connection request traffic", the push server simply discards the mirrored user traffic, thereby allowing the website to be connected by the original traffic.

進而,若為“網站連接請求流量”,則實施設定條件之“Host”是否為主要監測目標主機(HOST)之階段(“S212”);設定條件之“URI”之結束部是否為“/”或“/?”以及是否存在設定條件之“Referer”之階段 (“S213”);以及設定條件之包含於網站連接請求流量之“Cookie”是否存在稱為“sign”之參數值之階段(“S214”)。 Furthermore, if it is "website connection request traffic", the setting conditions are enforced. Whether "Host" is the stage of the main monitoring target host (HOST) ("S212"); setting conditions Whether the end of the "URI" is "/" or "/?" and whether there is a setting condition "Referer" stage ("S213"); and setting conditions The "Cookie" included in the website connection request traffic has a phase ("S214") of the parameter value called "sign".

於如圖6a所示之用戶請求流量中,其既為“網站連接請求流量”,又,全部滿足(YES)如上所述之設定條件(“Host”為主要檢測目標主機)、(“URI”之結束部為“/”或“/?”)、(無“Referer”)、(“Cookie”中無sign變量;表示於規定時間內首次請求連接之計算機),藉此,推送服務器220將用戶IP及連接主機(HOST)資訊傳輸到分析服務器230(圖4b之階段“S215a”),分析服務器230基於此檢測是否屬於路由器過量使用嫌疑用戶(圖4b之階段“S216a”)。 In the user request traffic shown in FIG. 6a, it is both "website connection request traffic", and all satisfy (YES) the setting conditions as described above. ("Host" is the main detection target host), (The end of the "URI" is "/" or "/?"), (no "Referer"), (There is no sign variable in "Cookie"; it indicates the computer that requested the connection for the first time within the specified time), whereby the push server 220 transmits the user IP and the connected host (HOST) information to the analysis server 230 (stage "S215a" of Fig. 4b) Based on this, the analysis server 230 detects whether or not the suspect user is excessively used by the router (stage "S216a" of Fig. 4b).

此時,分析服務器230將自推送服務器220接收之用戶IP、連接主機資訊存儲於資料庫服務器240,同時記錄其存儲時間,若於規定時間(例如,1小時)內以相同之公網IP與相同之主機發起多次連接請求且其連接次數未超過藉由政策管理網頁服務器250之按不同用戶政策實施管理之IP共享允許計算機數量之允許值,則確保不被選定為路由器過量使用嫌疑用戶(參照圖2a)。 At this time, the analysis server 230 stores the user IP and the connection host information received from the push server 220 in the database server 240, and records the storage time thereof, if the same public network IP and the specified time (for example, 1 hour) The same host initiates multiple connection requests and the number of connections does not exceed the allowable value of the number of IP sharing allowed computers managed by the policy management web server 250 according to different user policies, ensuring that the suspect is not selected for the router to overuse the suspect ( Refer to Figure 2a).

另一方面,推送服務器220於向分析服務器230傳輸用戶IP及連接主機資訊(參照圖2a之箭頭③)時,同時或者相隔規定時間(與順序無關),向用戶客戶終端(用戶計算機;計算機-1)傳輸確保於用戶計算機中執行下一個工作之第一假響應流量(參照圖2a之箭頭②),上述第一假響應流量如圖6b所示。 On the other hand, when the push server 220 transmits the user IP and the connection host information (refer to arrow 3 in FIG. 2a) to the analysis server 230, simultaneously or at a predetermined time (independent of the order), the user client terminal (user computer; computer- 1) The transmission ensures the first false response flow for the next job in the user's computer (see arrow 2 of Figure 2a), and the first false response flow is as shown in Figure 6b.

(i)定義稱為sign之變量,將當前時間設定為值之Cookie存儲於用戶計算機(計算機-1),(ii)將sign變量之有效時間設定為1小時(3,600秒鐘),(iii)為使向用戶原來試圖連接之網站進行重新連接而引導之重定向命令 (i) define a variable called sign, store the cookie whose current time is set as a value in the user's computer (computer-1), (ii) set the effective time of the sign variable to 1 hour (3,600 seconds), (iii) A redirect command to redirect to a website that the user originally tried to connect to

藉此,自用戶計算機(計算機-1)所生成之重新連接流量如圖6c所示。另一方面,此種重新連接流量中具有“Referer”,存在具有sign變 量值之Cookie(sign=1265344202:參照圖6c),故而,即便於鏡像裝置210中再次被鏡像而傳輸到推送服務器220,亦將於推送服務器220中廢棄。 Thereby, the reconnection traffic generated from the user computer (computer-1) is as shown in Fig. 6c. On the other hand, there is a "Referer" in this reconnected traffic, and there is a sign change. The value of the cookie (sign=1265344202: see Fig. 6c) is discarded in the push server 220 even if it is mirrored again in the mirror device 210 and transmitted to the push server 220.

另一方面,若第一計算機(計算機-1)之網頁瀏覽器於1小時以內再次被驅動而發生用戶請求流量(追加連接流量),則此種藉由相同IP之相同用戶計算機(計算機-1)之追加連接流量如圖7a所示,此種追加連接流量中不存在“Referer”,而存在具有sign變量值之Cookie(sign=1265344202:參照圖7a),故而,即便於鏡像裝置210中被鏡像而傳輸到推送服務器220,亦將於推送服務器220中廢棄。 On the other hand, if the web browser of the first computer (computer-1) is driven again within one hour and user request traffic (additional connection traffic) occurs, the same user computer (computer-1) of the same IP is used. As shown in FIG. 7a, there is no "Referer" in the additional connection flow rate, and there is a cookie having a value of the sign variable (sign=1265344202: see FIG. 7a), so that even in the mirror device 210 The image is transferred to the push server 220 and will also be discarded in the push server 220.

接著,若第二計算機(計算機-2)之網頁瀏覽器被驅動而使得按相同之方式處理用戶請求流量(省略過程相關說明),進而第三計算機(計算機-3)驅動網頁瀏覽器而生成用於請求因特網網站連接之用戶請求流量(此時,參照圖7b之“用戶請求流量”),此種用戶請求流量同樣如圖2b之箭頭“①”所示,於因特網服務提供商(ISP;Internet Service Provider)之骨幹網絡(Back Bone Network)之鏡像裝置210中被鏡像,上述經鏡像之網站連接請求流量傳輸到推送服務器220而以使確認是否為IP路由器過量使用嫌疑用戶(參照圖4a之“S100”階段)。 Then, if the web browser of the second computer (computer-2) is driven to process the user request traffic in the same manner (the process related description is omitted), the third computer (computer-3) drives the web browser to generate The user requesting traffic for the Internet site connection request (refer to "user request traffic" in FIG. 7b), such user request traffic is also shown by the arrow "1" in FIG. 2b, at the Internet service provider (ISP; Internet). The mirror device 210 of the Back Bone Network of the Service Provider is mirrored, and the mirrored website connection request traffic is transmitted to the push server 220 to confirm whether the IP router excessively uses the suspect user (refer to FIG. 4a). S100" stage).

如此,於圖4a所示之加入用戶流量之公網IP確認階段(“S200”)中,上述推送服務器220確認上述經鏡像之網站連接請求流量之用戶(圖2b之用戶ID為“USER-1”)公網IP(圖2b之“IP-Addr1”)是否為被選定為路由器過量使用嫌疑用戶之公網IP,若並非為被選定為路由器過量使用嫌疑用戶之公網IP,則藉由包含於上述經鏡像之網站連接請求流量之公網IP及cookie資訊而進行用於檢驗是否處於應選定為路由器過量使用嫌疑用戶之狀態並進行上傳之路由器過量使用嫌疑用戶選定及上傳階段(“S210”)。 Thus, in the public network IP confirmation phase ("S200") of the user traffic added in FIG. 4a, the push server 220 confirms the user of the mirrored website connection request traffic (the user ID of FIG. 2b is "USER-1"). ") Is the public IP ("IP-Addr1" in Figure 2b) the public IP of the suspected user who is selected to be over-utilized by the router, if not for the public network IP of the suspected user who is selected for excessive use by the router? The above-mentioned mirrored website is connected to the public network IP and cookie information of the request traffic, and is used to check whether the router is in a state of being selected as a router for excessive use of the suspected user and uploading the router for excessive use of the suspect user selection and uploading phase ("S210") ).

於此,關於上述路由器過量使用嫌疑用戶選定及上傳階段 (“S210”)之進行過程,截止於分析服務器230中檢測是否為路由器過量使用嫌疑用戶(圖4b之階段“S216a”)之階段之進行情況與上述之第一計算機(計算機-1)之情況相同。 Here, regarding the above-mentioned router overuse suspect user selection and upload stage ("S210") is performed as of the case where the analysis server 230 detects whether the router is overusing the suspect user (stage "S216a" of FIG. 4b) and the first computer (computer-1) described above. the same.

然而,此時不同於圖2a所示,而如圖2b所示,由於使用“IP-Addr1”之公網IP之用戶(圖2b之用戶ID為“USER-1”)針對相同網站之連接次數超出藉由政策管理網頁服務器250之按不同用戶政策實施管理之IP共享允許計算機數量之允許值,故而,分析服務器230將其選定為路由器過量使用嫌疑用戶,將其公網IP(IP-Addr1)以路由器過量使用嫌疑用戶IP列表之形態進行存儲後,以規定時間間隔向推送服務器220傳輸(參照圖2b之箭頭“④”)。 However, this time is different from that shown in FIG. 2a, and as shown in FIG. 2b, the number of connections for the same website due to the user of the public IP using "IP-Addr1" (the user ID of FIG. 2b is "USER-1"). Exceeding the allowable value of the number of allowed IP shares of the IP management by the policy management web server 250 according to different user policies, the analysis server 230 selects it as a router for excessive use of the suspect user, and sets its public network IP (IP-Addr1). After the router stores the suspect user IP list in excess, it is transmitted to the push server 220 at predetermined time intervals (see arrow "4" in Fig. 2b).

另一方面,推送服務器220為了選定路由器過量使用嫌疑用戶而向分析服務器230傳輸用戶IP及連接主機資訊(參照圖2b之箭頭③)時,同時或者相隔規定時間(與順序無關),向用戶客戶終端(用戶計算機;計算機-3)傳輸如上所述之第一假響應流量(參照圖2b之箭頭②),上述第一假響應流量同樣如圖6b所示(不包括Cookie之sign值本身)。 On the other hand, the push server 220 transmits the user IP and the connection host information (refer to the arrow 3 in FIG. 2b) to the analysis server 230 in order to select the router to overuse the suspect user, simultaneously or at a predetermined time (independent of the order), to the user client. The terminal (user computer; computer-3) transmits the first false response traffic as described above (see arrow 2 of FIG. 2b), and the first false response traffic is also as shown in FIG. 6b (excluding the sign value itself of the cookie).

藉此,藉由第一假響應流量(參照圖2b之之箭頭“②”)而自用戶計算機(計算機-3)所生成之重新連接流量,亦如同圖6c所示(不包括Cookie之sign值本身),此種重新連接流量中具有“Referer”且存在具有sign變量值之Cookie之sign值(參照圖6c),故而,即便於鏡像裝置210中再次被鏡像而傳輸到推送服務器220,將於推送服務器220中廢棄(參照圖4b之“S213”,“S214”→“NO”→“S220”),允許用戶正常連接到所請求之網站,即,Cookie之獨特之sign變量值之有無,影響路由器過量使用嫌疑用戶選定及上傳過程,而不影響其網頁流量之阻止或允許與否(不阻止),藉此,例如若發生於用戶計算機中任意之Cookie刪除等情況(根據以往技術之誤判斷為路由器過量使用用戶之情況),亦不會阻止網頁流量,從而保持因特網服務提供商之可靠性。 Thereby, the reconnection traffic generated from the user computer (computer-3) by the first false response traffic (refer to the arrow "2" of FIG. 2b) is also as shown in FIG. 6c (excluding the sign value of the cookie) In itself, there is a "Referer" in the reconnected traffic and there is a sign value of the cookie having the value of the sign variable (refer to FIG. 6c), and therefore, even if it is mirrored again in the mirror device 210 and transmitted to the push server 220, The push server 220 discards (refer to "S213", "S214" -> "NO" -> "S220" in Fig. 4b), allowing the user to normally connect to the requested website, that is, the value of the unique sign variable of the cookie, affecting The router overuses the suspect user selection and upload process without affecting the blocking or permission (not blocking) of the webpage traffic, for example, if any cookie deletion occurs in the user's computer, etc. (according to prior art misjudgment) In the case of excessive use of users for routers, it does not block web traffic, thereby maintaining the reliability of Internet service providers.

另一方面,例如,第一計算機(計算機-1)之網頁瀏覽器被驅動而設定Cookie之Sign變量後,經過1小時之設定時間後(sign變量值消失後),第一計算機(計算機-1)之網頁瀏覽器再次被驅動而所生成之用戶請求流量,其成為如圖7c所示之流量。 On the other hand, for example, after the web browser of the first computer (computer-1) is driven to set the Sign variable of the cookie, after the set time of one hour (after the value of the sign variable disappears), the first computer (computer-1) The web browser is driven again and the generated user requests traffic, which becomes the traffic as shown in Figure 7c.

進而,經過此種過程,被選定為路由器過量使用嫌疑用戶後被上傳之之用戶藉由複數個客戶終端利用因特網,如圖3所示,若第三計算機(計算機-3)再次生成網站連接請求流量(參照圖3之箭頭“⑤”),則此種因特網網站連接請求流量(參照圖8)亦使用位於因特網服務提供商(ISP;Internet Service Provider)之骨幹網絡(Back Bone Network)之鏡像裝置210而被鏡像,上述經鏡像之網站連接請求流量傳輸到推送服務器220(參照圖3之箭頭“⑥”、圖4a之“S100”),上述推送服務器220經過用於確認上述經鏡像之網站連接請求流量之用戶公網IP是否為被選定為路由器過量使用嫌疑用戶之公網IP之加入用戶流量之公網IP確認階段(參照圖3之箭頭“⑦”、圖4a之“S200”),此時,如上所述,由於其為已選定為路由器過量使用嫌疑用戶之公網IP(IP-Addr1),故而,如圖4a及圖4c所示,上述推送服務器220首先執行用於確認是否為屬於阻止目標之流量之階段(圖4a及圖4c之“S250”),若屬於阻止與否決定對象流量,則向圖3之客戶終端,例如向用戶計算機(計算機-3)傳輸第二假響應流量(參照圖9a及圖9b)(參照圖3之箭頭“⑧”、圖4a之“S300”)。 Further, after such a process, the user selected to be the router after the excessive use of the suspect user is used by the plurality of client terminals to utilize the Internet, as shown in FIG. 3, if the third computer (computer-3) generates the website connection request again. The traffic (refer to the arrow "5" in FIG. 3), the Internet site connection request traffic (refer to FIG. 8) also uses the mirror device of the Back Bone Network of the Internet Service Provider (ISP). 210 is mirrored, and the mirrored website connection request traffic is transmitted to the push server 220 (refer to arrow "6" in FIG. 3, "S100" in FIG. 4a), and the push server 220 is used to confirm the above-mentioned mirrored website connection. Whether the public IP address of the user requesting the traffic is the public network IP confirmation phase of the user traffic selected as the public network IP of the suspected over-utilized user of the router (refer to arrow "7" in FIG. 3, "S200" in FIG. 4a). As described above, since it is a public network IP (IP-Addr1) that has been selected as a router for excessive use of the suspect user, as shown in FIG. 4a and FIG. 4c, the above push server 220 first performs a phase for confirming whether it is a traffic belonging to the blocking target ("S250" of FIG. 4a and FIG. 4c), and if it is a blocking or not determining the target traffic, to the client terminal of FIG. 3, for example, to a user computer (computer -3) Transmission of the second false response flow rate (refer to Figs. 9a and 9b) (refer to arrow "8" in Fig. 3, "S300" in Fig. 4a).

於此,如圖4a所示之確認是否為阻止與否決定對象之流量之階段(“S250”)中,為了減少檢測及阻止用網絡服務器260之負荷,具體如圖4c所示,推送服務器220經過確認所鏡像之流量是否為“網站連接請求流量”之階段(圖4c之“S251”階段)、確認所鏡像之上述流量之連接主機(HOST)是否為“擴大監測目標網站”之階段(“S252”)、確認所鏡像之上述流量之URI之結束部是否為“/”或“/?”(若重定向URI之結束 部為非“/”或“/?”之流量,則於由檢測及阻止用網絡服務器260向用戶試圖連接之網站重定向時發生錯誤)以及是否存在Referer(若重定向具有Referer之流量,則藉由推送服務器而導致無限循環)之階段(“S253”),若於上述確認階段(“S251”、“S252”、“S253”)中無法滿足各項條件中之一種以上條件(順序圖中標記為“No”),如圖4c所示,則所鏡像之上述流量被廢棄(“S220”),允許正常連接到由用戶請求連接之網站(“S230”)。 Here, as shown in FIG. 4a, in the stage of confirming whether or not the traffic of the object is determined ("S250"), in order to reduce the load of the detection and blocking network server 260, as shown in FIG. 4c, the push server 220 is specifically shown. After confirming whether the mirrored traffic is the "site connection request traffic" phase ("S251" phase of Figure 4c), confirm whether the connected host (HOST) of the mirrored traffic is the stage of "expanding the monitoring target site" (" S252"), confirm whether the end of the URI of the mirrored traffic is "/" or "/?" (if the end of the redirect URI) If the traffic is not "/" or "/?", an error occurs when the network server 260 is detected and blocked from redirecting to the website the user is trying to connect to) and if there is a Referer (if the traffic with the Referer is redirected, In the stage of the infinite loop ("S253") by pushing the server, if one or more of the conditions cannot be satisfied in the above-mentioned confirmation phase ("S251", "S252", "S253") (in the sequence diagram) Marked as "No"), as shown in Figure 4c, the mirrored traffic is discarded ("S220"), allowing normal connection to the website requested by the user ("S230").

進而,於確認是否為阻止與否決定對象之流量之階段(“S250”)中,若滿足阻止與否決定對象流量之條件(於圖4c中之判斷結果均為“Yes”)(網站連接請求流量之約10%),則實施由上述推送服務器220向用戶計算機(計算機-3)傳輸第二假響應流量(參照圖9a及圖9b)之階段(“S300”)。 Further, in the stage ("S250") for confirming whether or not the traffic is determined to be blocked or not, if the condition for suppressing the flow of the target traffic is satisfied (the judgment result in Fig. 4c is "Yes") (website connection request) At about 10% of the traffic, a phase ("S300") in which the second fake response traffic (see FIG. 9a and FIG. 9b) is transmitted by the push server 220 to the user computer (computer-3) is performed.

於此,關於“擴大監測目標網站”,優選地,例如選自於網站連接排行前1,000個左右之網站中不發生重定向錯誤(HTTP協議為通用協議,除網頁瀏覽器外,亦於例如NateOn等其他應用程序中使用,若由推送服務器重定向此種其他應用程序之流量,則應用程序之運行出錯之可能性非常高)之網站。 Here, regarding the "expanding monitoring target website", preferably, for example, a redirect error is not generated in a website selected from about 1,000 pages before the website connection ranking (the HTTP protocol is a general protocol, in addition to a web browser, for example, NateOn) For other applications, if the push server redirects traffic from such other applications, the application is running at a very high probability of error.

圖9a及圖9b表示第二假響應流量之兩種實施例(根據因特網服務提供商之要求條件合理選擇),根據圖9a所示之第一實施例,其為於推送服務器220中生成由下列兩種幀,即由100%幀(用戶原來試圖連接之網站之URL)及0%檢測幀(檢測及阻止用網絡服務器之URL;用於指定收錄有自客戶終端取回用戶身分證明並與資料庫服務器進行比較檢查之命令之“search.jsp”;將用戶原來試圖連接之網站之地址以參數形式附上)所構成之假響應流量之實施例;根據圖9b所示之第二實施例,其由推送服務器220生成僅由100%幀(檢測及阻止用網絡服務器之URL;指定“check.jsp”;將用戶原來試圖連接之網站之URL地址以 參數形式附上)所構成之第二假響應流量,如圖9c所示,於檢測及阻止用網絡服務器260中,於上述check.jsp內分割為iframe而生成獨立之0%檢測幀(檢測及阻止用網絡服務器之URL;用於指定收錄有自客戶終端取回用戶身分證明並與資料庫服務器進行比較檢查之命令之“search.jsp”;將用戶原來試圖連接之網站之地址以參數形式附上)。 於上述第一實施例之0%檢測幀與第二實施例之100%幀上以參數形式附上用戶原來試圖連接之網站之地址,生成向藉由檢測共享狀態而進行阻止之檢測及阻止用網絡服務器260連接(重定向)之流量(例如,圖10a及圖10b之“檢測及阻止用轉發流量”),如此分割幀之理由為以不變更(避免用戶知曉)網頁瀏覽器之地址欄之方式訪問藉由檢測共享狀態而進行阻止之檢測及阻止用網絡服務器260,藉此,用戶可以網頁瀏覽器畫面無變化之方式生成(參照圖3之箭頭“⑨”)連接到藉由檢測共享狀態而進行阻止之檢測及阻止用網絡服務器260之流量(圖10a或圖10b之“檢測及阻止用轉發流量”)。 Figures 9a and 9b show two embodiments of the second false response traffic (reasonably selected according to the requirements of the Internet service provider), according to the first embodiment shown in Figure 9a, which is generated in the push server 220 by Two kinds of frames, that is, 100% frame (the URL of the website the user originally tried to connect) and 0% detection frame (the URL of the detection and blocking network server; used to specify the inclusion of the user identity certificate and the data from the client terminal) An embodiment in which the library server performs a comparison check command "search.jsp"; the address of the website that the user originally tried to connect is attached as a parameter); according to the second embodiment shown in FIG. 9b, It is generated by the push server 220 only by 100% frame (detecting and blocking the URL of the web server; specifying "check.jsp"; the URL address of the website that the user originally tried to connect to The second false response flow formed by the parameter form is as shown in FIG. 9c, and is divided into iframes in the check.jsp to generate an independent 0% detection frame in the detection and blocking network server 260 (detection and detection) Blocking the URL of the web server; "search.jsp" for specifying the command to retrieve the user ID certificate from the client terminal and compare it with the database server; attach the address of the website that the user originally tried to connect with as a parameter on). In the 0% detection frame of the first embodiment and the 100% frame of the second embodiment, the address of the website that the user originally tried to connect is attached in the form of a parameter, and detection and prevention for blocking by detecting the shared state are generated. The network server 260 connects (redirects) the traffic (for example, "detecting and blocking forwarding traffic" in FIG. 10a and FIG. 10b), so the reason for dividing the frame is to not change (avoid the user knows) the address bar of the web browser. The mode access detects and blocks the network server 260 by detecting the shared state, whereby the user can generate the web browser screen without changing (see the arrow "9" in FIG. 3) to detect the shared state. The detection of the blocking and the blocking of the traffic of the network server 260 (""detecting and blocking forwarding traffic" in Fig. 10a or Fig. 10b).

當然,此種用戶之檢測及阻止用轉發流量亦經過因特網服務提供商之骨幹網絡傳輸且於鏡像裝置210中被鏡像而傳輸到推送服務器220,而如圖10a及圖10b所示,此種鏡像流量附有“Referer”,必然將被推送服務器220廢棄。 Of course, the detection and blocking forwarding traffic of such a user is also transmitted through the backbone network of the Internet service provider and is mirrored in the mirroring device 210 and transmitted to the push server 220, as shown in FIG. 10a and FIG. 10b. The traffic is accompanied by a "Referer", which is inevitably discarded by the push server 220.

比較上述兩種類型之第二假響應流量實施例之特徵,於上述第一實施例中,其特徵在於,警告及阻止頁面僅可藉由彈出/一般頁面形態而運營,於上述第二實施例中,其優點在於,警告及阻止頁面除可採用彈出/一般頁面形態之外,還可採用即便彈出框被阻止亦可始終顯示之HTML層形態,藉此,警告及阻止頁面之形態變更具有靈活性。 Comparing the features of the two types of second false response flow embodiments, in the above first embodiment, the warning and blocking pages can only be operated by pop-up/general page form, in the second embodiment The advantage of the warning and blocking pages is that in addition to the pop-up/general page form, the HTML layer form can be always displayed even if the pop-up frame is blocked, thereby making the warning and blocking the form change of the page flexible. Sex.

如此,藉由第二假響應流量傳輸階段(“S300”),圖10a(或圖10b)所示之檢測及阻止用轉發流量傳輸到檢測及阻止用網絡服務器(260; 圖10a及圖10b中以“ipsd.com”之URL形式示出),接著,檢測及阻止用網絡服務器260藉由有別於自上述檢測及阻止用轉發流量所提取之用戶之公網IP及上述100%幀而獨立生成之0%檢測幀,將自用戶客戶終端接收之“閃存共享對象(Flash Shared Object)”之固有參數值存儲於資料庫服務器240,藉由搜索自連接時刻至第一設定時間期間所存儲之列表,而執行路由器過量使用狀態檢測算法,藉此,對於非路由器過量使用狀態之用戶流量,向藉由用戶客戶終端而以參數形式附於上述檢測及阻止用轉發流量之原始目的網站進行重定向(參考“S412”、“S414a”:藉由最小化不應阻止而應允許因特網連接之狀態下之工作負荷,而可大幅提昇因特網連接服務之根本性服務效率),藉由檢測路由器過量使用狀態之用戶流量(參考“S414b”),藉由補充處理條件(“S420a”)而決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接請求。 As such, the second false response traffic transmission phase ("S300"), the detection and blocking of the forwarding traffic shown in Figure 10a (or Figure 10b) is transmitted to the detection and blocking network server (260; 10a and 10b are shown in the form of "ipsd.com", and then the detection and blocking of the public network IP of the user extracted by the network server 260 from the above-mentioned detection and blocking forwarding traffic is The 0% detection frame independently generated by the above 100% frame stores the inherent parameter value of the "Flash Shared Object" received from the user client terminal in the database server 240, by searching for the self-connection time to the first Setting a list stored during the time period, and executing a router over-use state detection algorithm, whereby the user traffic for the non-router over-utilization state is attached to the above-mentioned detection and blocking forwarding traffic by parameter to the user client terminal. The original destination website is redirected (refer to "S412", "S414a": by minimizing the workload in the state where the Internet connection should be allowed to be prevented, and the basic service efficiency of the Internet connection service can be greatly improved) By detecting the user traffic of the router over-utilization status (refer to "S414b"), it is determined whether to allow or block by supplementing the processing condition ("S420a"). Router Status excess of user client terminal site of the connection request.

並且,參照表示有上述路由器過量使用狀態之用戶流量檢測階段(“S411”)進行狀態之圖3及表示有以順序圖形式示出其進行過程之圖4d,具體地,檢測及阻止用網絡服務器260藉由上述說明之0%檢測幀而請求於用戶計算機(圖3之“計算機-3”)之“閃存共享對象(Flash Shared Object)”中以用戶身分證明之參數名存儲之固有參數值(圖3之箭頭“⑩”,圖4d之附圖標記“S411”),於上述“S411”階段中,自客戶終端接收用戶身分證明之固有參數值,若於資料庫服務器240之該用戶IP(ID)之24小時以內之用戶身分證明列表中存在與當前連接之用戶客戶終端(用戶計算機)之用戶身分證明值相同之值而被判定為有效之用戶身分證明之固有參數值,則向資料庫服務器240更新該用戶身分證明之連接時刻,允許連接到由用戶之客戶終端請求連接之網站之階段(“S412”),並且,若於上述“S411”中,無法自客戶終端接收用戶身分證明之固有參數值,或者已接收用戶身分證明之固有參數值,然而於 該IP(ID)之24小時以內之用戶身分證明列表中不存在與當前連接之用戶客戶終端(用戶計算機)之用戶身分證明值相同之值而被判定為無效之用戶身分證明之固有參數值,則藉由查找於當前資料庫服務器240中所存在之該用戶IP(ID)之24小時以內之有效之用戶身分證明列表之數量及該用戶IP(ID)之路由器計算機允許台數(“S413”), (a)若有效之用戶身分證明列表之數量不足計算機允許台數,則判定為當前不處於路由器過量使用狀態,針對當前連接之用戶客戶終端(用戶計算機)而生成新的用戶身分證明之固有參數值,將其存儲於用戶客戶終端,亦將其與連接時刻一同上傳於資料庫服務器240,如圖3之箭頭“⑫”所示,重定向於用戶試圖連接之URL(http://www.naver.com),允許用戶連接到客戶終端所請求連接之網站(“S414a”)。此時,重定向由推送服務器220所生成之主幀,實施取消分割之幀之工作(top refresh)。 Further, FIG. 3 showing the state in which the user traffic detection phase ("S411") in the above-mentioned router over-utilization state is performed, and FIG. 4d showing the progress of the process in the form of a sequence diagram, specifically, the network server for detecting and blocking 260 requests the intrinsic parameter value stored in the parameter name of the user identity in the "Flash Shared Object" of the user computer ("Computer-3" of FIG. 3) by the 0% detection frame described above ( The arrow "10" in FIG. 3, the reference numeral "S411" in FIG. 4d, receives the inherent parameter value of the user identity certificate from the client terminal in the above "S411" phase, and the user IP in the database server 240 ( ID) within 24 hours of the user identity certificate list, the intrinsic parameter value of the user identity certificate determined to be valid is the same value as the user identity certificate value of the currently connected user client terminal (user computer), and then the database is The server 240 updates the connection moment of the user identity certificate, allows connection to the stage of the website requested by the client terminal of the user ("S412"), and, if in the above "S In 411", the inherent parameter value of the user identity certificate cannot be received from the client terminal, or the inherent parameter value of the user identity certificate has been received, however, The user's identity certificate list within 24 hours of the IP (ID) does not have an intrinsic parameter value of the user identity certificate determined to be invalid, which is the same value as the user identity certificate value of the currently connected user client terminal (user computer). Then, the number of valid user identity certificates listed within 24 hours of the user IP (ID) existing in the current database server 240 and the number of router computers permitted by the user IP (ID) ("S413") ), (a) If the number of valid user identity certificates list is less than the number of computers allowed, it is determined that the router is not in the over-utilization state, and the inherent parameters of the new user identity certificate are generated for the currently connected user client terminal (user computer). The value is stored in the user client terminal, and is also uploaded to the database server 240 along with the connection time, as indicated by the arrow "12" in FIG. 3, and redirected to the URL that the user attempts to connect to (http://www. Naver.com) allows the user to connect to the website ("S414a") that the client terminal is requesting to connect to. At this time, the main frame generated by the push server 220 is redirected, and the top refresh is performed.

(b)若有效之用戶身分證明列表數量超過計算機允許台數,則判定為當前處於路由器過量使用狀態(“S414b”),針對當前連接之用戶客戶終端(用戶計算機),藉由補充處理條件而實施用於決定是否允許或阻止因特網連接之連接請求流量之阻止或允許與否決定階段(參照圖4a之“S420a”及圖4d)。 (b) If the number of valid user identity certificates exceeds the number of allowed computers, it is determined that the router is currently in the overuse state ("S414b"), and the user terminal (user computer) currently connected is supplemented by the processing conditions. A blocking or permission decision phase for determining whether to allow or block the connection request of the Internet connection is implemented (refer to "S420a" and FIG. 4d of FIG. 4a).

(b1)存在於資料庫服務器240之該用戶IP(ID)之第一設定時間(T-1;例如,24小時)以內之有效之用戶身分證明列表中,若存在所上傳之連接時刻以當前時刻為基準而超過第二設定時間(T-2;例如,30分鐘)而經過之用戶身分證明(比較參照圖5a、圖5b及圖5c),則刪除於資料庫服務器240中之連接時間最久之用戶身分證明列表,針對當前連接之用戶客戶終端(用戶計算機)而生成新的用戶身分證明之固有參數值,將其存儲於用戶客戶終端(用戶計算機;圖3之“計算機-3”)(圖3之箭頭“⑩”,圖4d之附圖標記“S414a”,圖5c之“用戶身分證明-Field- Update”),亦將其與連接時刻一同上傳於資料庫服務器240,允許用戶連接到客戶終端所請求連接之網站(“S420b1”)(圖5c之情況)。 (b1) In the valid user identity certificate list existing within the first set time (T-1; for example, 24 hours) of the user IP (ID) of the database server 240, if there is an uploaded connection time to the current If the user's identity certificate (compared with reference to FIG. 5a, FIG. 5b, and FIG. 5c) that passes the second set time (T-2; for example, 30 minutes) is the reference, the connection time in the database server 240 is deleted. The long-standing user identity certificate list generates a new parameter value of the user identity certificate for the currently connected user client terminal (user computer), and stores it in the user client terminal (user computer; "computer-3" of FIG. 3) ( The arrow "10" of Figure 3, the reference numeral "S414a" of Figure 4d, and the "User Identity Certificate - Field- of Figure 5c" Update") is also uploaded to the database server 240 along with the connection time, allowing the user to connect to the website ("S420b1") to which the client terminal is requested to connect (in the case of Fig. 5c).

與此相反,如圖5a所示之比較例,不管是否存在超過第二設定時間(T-2;例如,30分鐘)而經過之用戶身分證明(圖5c之用戶身分證明-2),於其一直以有效之方式持續之第一設定時間(24小時)期間內,持續阻止追加連接之終端(圖5c之用戶身分證明-3)之網站連接,針對由此導致之問題,其主要解決方案藉由韓國公開專利公報第10-2009-0041752號而提出,如圖5b所示之再一比較例,按以非個別用戶為中心之預定時間間隔(圖中顯示30分鐘)使用任務計劃程序而更新所有資料庫(任務①、任務②、任務③),刪除自更新時點至20分鐘以內之無記錄之列表,藉由比較示出此種比較例之圖5b與示出本發明之處理方法之處理結果之圖5c,可知效果方面圖5c之方案更為優秀,而且,根據圖5c之方案,僅於必要之情況執行資料庫更新,從而可減少因反覆執行藉由任務計劃程序而隨時更新整個資料庫之工作所致之資料庫服務器之負擔。 In contrast, in the comparative example shown in FIG. 5a, regardless of whether there is a user identity certificate (the user identity certificate-2 of FIG. 5c) passed over the second set time (T-2; for example, 30 minutes), The website connection of the terminal (the user identity certificate-3 of Figure 5c) of the terminal that has been connected is continuously blocked for the first set time (24 hours) that has been continued in an effective manner, and the main solution is to solve the problem caused by the problem. It is proposed by the Korean Laid-Open Patent Publication No. 10-2009-0041752, and a further comparative example as shown in FIG. 5b is updated by using a task scheduler at a predetermined time interval (30 minutes in the figure) centered on non-individual users. All databases (Task 1, Task 2, Task 3), delete the unrecorded list from the time of update to within 20 minutes, by comparing Figure 5b showing such a comparative example with the processing of the processing method of the present invention. As shown in Fig. 5c, it can be seen that the scheme of Fig. 5c is more excellent in terms of effect, and according to the scheme of Fig. 5c, the database update is performed only when necessary, thereby reducing the need to update the entire schedule by the task scheduler. The burden of the database server caused by the work of the database.

(b2)另一方面,若存在於資料庫服務器240之該用戶IP(ID)之24小時以內之有效之用戶身分證明列表中不存在所上傳之連接時刻以當前時刻為基準而超過30分鐘之用戶身分證明,則針對當前連接之用戶客戶終端(用戶計算機;計算機-3),阻止連接到所請求連接之網站(“S420b2”)。 (b2) On the other hand, if the valid user identity certificate list exists within 24 hours of the user IP (ID) of the database server 240, the uploaded connection time does not exist for more than 30 minutes based on the current time. The user identity certificate blocks the connection to the requested connection website ("S420b2") for the currently connected user client terminal (user computer; computer-3).

於此,關於查詢存在於當前資料庫服務器240之該用戶IP(ID)之24小時以內之有效之用戶身分證明列表之數量及該用戶IP(ID)之路由器計算機允許台數之階段(“S413”),更具體而言,如圖3之箭頭“⑪”所示,利用用戶IP而於資料庫服務器240中查找該用戶IP(或用戶ID)之共享計算機允許台數(參照圖3之下表),算出於資料庫服務器240之該用戶之IP(ID)及24小時以內之用戶身分證明列表(參照圖3之上表;廢棄 經過24小時之用戶身分證明列表)中當前(圖3上部表之“T5”)有效存續之用戶身分證明存儲數量(於圖3上部表中為“2個”),若算出之用戶身分證明存儲數量超過該用戶之共享計算機允許台數(於圖3下部表中為“2個”),則判定為路由器過量使用狀態(故而,圖3所示之狀態為過量使用狀態),如上述之圖4d之“S420a”階段及其下一個階段(“S420b1”或“S420b2”)所示,根據補充處理條件而進行後續處理。 Here, the number of valid user identity certificate lists that are within 24 hours of querying the user IP (ID) of the current database server 240 and the number of router computers allowed for the user IP (ID) ("S413 "), more specifically, as shown by the arrow "11" in FIG. 3, the number of shared computers allowed to search for the user IP (or user ID) in the database server 240 by using the user IP (refer to FIG. 3 below) Table), the IP (ID) of the user calculated in the database server 240 and the user identity certificate list within 24 hours (refer to the table above in Figure 3; discarded After the current 24-hour user identification list (the "T5" in the upper table of Figure 3), the number of user identity certificates stored in the valid list ("2" in the upper table of Figure 3), if the calculated user identity certificate is stored If the number exceeds the number of shared computers allowed by the user ("2" in the lower table of FIG. 3), it is determined that the router is in an overused state (so, the state shown in FIG. 3 is an overused state), as shown in the above figure. The "S420a" phase of 4d and its next phase ("S420b1" or "S420b2") are shown, and subsequent processing is performed according to the supplementary processing conditions.

另一方面,若阻止用戶連接到所請求連接之網站(“S420b2”),則此種阻止根據政策可不向用戶提供任何響應,或者可重定向於警告消息頁面或阻止消息頁面。 On the other hand, if the user is prevented from connecting to the website of the requested connection ("S420b2"), such blocking may not provide any response to the user according to the policy, or may be redirected to the warning message page or the blocking message page.

於上述警告消息頁面或阻止消息頁面中,除顯示警告或阻止狀態外,考慮到因用戶客戶終端(用戶計算機)之格式或刪除“閃存共享對象(Flash Shared Object)”等最新生成用戶身分證明而達到阻止狀態等,於阻止畫面中提供獨立之“連接允許請求按鈕”,以使解除當前客戶終端之阻止狀態,並初始化(刪除)於資料庫服務器240中以往被允許之客戶終端中之於24小時內最初連接(由於連接資訊持續被更新,故而,僅限於24小時內之初始連接)之客戶終端之用戶身分證明,除可採取上述追加階段之方案外,或者,還可採取以下方法,即,若此種請求藉由電話等方式而由因特網服務提供商接收,因特網服務提供商管理員藉由政策管理網頁服務器250初始化(刪除)存儲於資料庫服務器240之以往客戶端資訊(用戶身分證明),從而解除阻止狀態。 In the above warning message page or blocking message page, in addition to displaying the warning or blocking status, considering the format of the user client terminal (user computer) or deleting the latest generated user identity certificate such as "Flash Shared Object" A blocking state or the like is reached, and a separate "connection permission request button" is provided in the blocking screen to release the blocking state of the current client terminal, and initialized (deleted) in the previously permitted client terminal in the database server 240. The user identity certificate of the client terminal that is initially connected within the hour (because the connection information is continuously updated, and therefore is limited to the initial connection within 24 hours), in addition to the above-mentioned additional phase, or the following method may be adopted, ie, If the request is received by the Internet service provider by means of telephone or the like, the Internet service provider administrator initializes (deletes) the past client information stored in the database server 240 by the policy management web server 250 (the user identity certificate) ), thereby unblocking the state.

另一方面,不同於以上圖示之本發明之優選實施例,可知於本發明之再一形態之實施例中,可藉由將上述分析服務器230之功能整合到推送服務器220而構成,以此替代上述分析服務器230與上述推送服務器220相獨立之構成,其工作實質上相同,為了避免對其進行重複之詳細說明,故而省略。 On the other hand, different from the preferred embodiment of the present invention shown in the above, it can be seen that in the embodiment of still another aspect of the present invention, the function of the analysis server 230 can be integrated into the push server 220. Instead of the above-described analysis server 230 being independent of the above-described push server 220, the operation is substantially the same, and is omitted in order to avoid a detailed description thereof.

本發明為了藉由具體實施例而進行說明,於圖6a至圖10b中例示 之網頁流量中所使用之代碼基於jsp/java編製而成,然而,該等只不過為一個例示,本領域技術人員理解其可由其他方法所替代,本發明之複數個實施例僅僅為了幫助理解本發明而提出,本發明並不受限於此,本領域技術人員可於所附本發明所要保護之技術思想之範圍內實施各種變更。 The present invention is illustrated by way of specific embodiments, illustrated in Figures 6a through 10b. The code used in the webpage traffic is compiled based on jsp/java. However, these are merely exemplary, and those skilled in the art understand that they can be replaced by other methods, and the multiple embodiments of the present invention are only for helping to understand this. The invention is not limited thereto, and various modifications can be made by those skilled in the art within the scope of the technical idea to which the invention is to be protected.

100‧‧‧IP路由器 100‧‧‧IP router

210‧‧‧因特網服務提供商骨幹網絡 210‧‧‧Internet Service Provider Backbone Network

220‧‧‧推送服務器 220‧‧‧Push server

230‧‧‧分析服務器 230‧‧‧Analysis server

240‧‧‧資料庫服務器 240‧‧‧Database Server

250‧‧‧政策管理網頁服務器 250‧‧‧ Policy Management Web Server

260‧‧‧檢測/阻止網頁服務器 260‧‧‧Detect/block web server

300‧‧‧因特網 300‧‧‧Internet

Claims (18)

一種共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其係選擇性地允許及阻止藉由檢測利用相同公網IP之私有網絡上之複數個用戶終端台數並與所分配之允許台數進行比較而進行請求連接的終端之因特網連接請求流量者,其特徵在於包括:(I)加入用戶流量之鏡像階段(“S100”),其在客戶終端驅動網頁瀏覽器而請求連接到網絡上之網站之情況下,由設置於因特網服務提供商(ISP;Internet Service Provider)之骨幹網絡(Back Bone Network)之鏡像裝置(210)鏡像自客戶終端發生之網站連接請求流量,並且將上述經鏡像之網站連接請求流量傳輸到推送服務器(220),以便確認是否為IP路由器過量使用嫌疑用戶;(II)加入用戶流量之過量使用嫌疑用戶公網IP確認階段(“S200”),其由上述推送服務器(220)確認上述經鏡像之網站連接請求流量之加入用戶公網IP是否為藉由推送服務器所處理之包含於上一個連接流量之公網IP及藉由cookie資訊而選定為路由器過量使用嫌疑用戶之公網IP;(III)路由器過量使用狀態檢測及阻止決定階段(“S400”),其若為被選定為路由器過量使用嫌疑用戶之公網IP,則為了減少負荷,上述推送服務器(220)執行用於確認上述經鏡像之網站連接請求流量是否為可成為決定阻止與否之對象之流量之階段(“S250”),若屬於阻止與否決定對象流量,則向客戶終端傳輸第二假響應流量(“S300”),以使藉由上述第二假響應流量而於用戶客戶終端所生成之100%幀上以參數形式補充用戶原來試圖連接之網站之地址並向檢測及阻止用網絡服務器(260)重定向之檢測 及阻止用轉發流量自客戶終端傳輸到檢測及阻止用網絡服務器(260)後,上述檢測及阻止用網絡服務器(260)藉由有別於所接收之自上述檢測及阻止用轉發流量所提取之用戶之公網IP及上述100%幀而獨立生成之0%檢測幀,藉由自用戶客戶終端所接收之閃存共享對象之固有參數值而執行路由器過量使用檢測算法,藉此,對於非路由器過量使用狀態之用戶之流量,允許藉由用戶客戶終端所請求之網站連接,藉由檢測路由器過量使用狀態之用戶流量,藉由補充處理條件而決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接請求。 A selective enabling or blocking method for sharing Internet connection request traffic of a public network IP, which selectively allows and blocks the number of user terminals on a private network utilizing the same public IP address and is allocated The Internet connection request traffic of the terminal that allows the number of comparisons to be made to perform the connection is characterized by: (I) a mirroring phase of joining user traffic ("S100"), which drives the web browser at the client terminal and requests connection to In the case of a website on the network, the mirroring device (210) of the Back Bone Network installed in an Internet Service Provider (ISP) mirrors the website connection request traffic generated from the client terminal, and the above The mirrored website connection request traffic is transmitted to the push server (220) to confirm whether the suspected user is overused by the IP router; (II) the excessive use of the user traffic is confirmed by the suspect user public network IP confirmation phase ("S200"), which is The push server (220) confirms whether the added public network IP of the mirrored website connection request traffic is pushed by The public network IP that is processed by the server and included in the previous connection traffic and the public network IP selected by the router to overuse the suspect user by the cookie information; (III) the router over-use status detection and blocking decision phase ("S400"), If the public network IP of the suspect user is selected to be excessively used by the router, in order to reduce the load, the push server (220) performs a check for confirming whether the mirrored website connection request traffic is the object of determining whether to block or not. The phase of the traffic ("S250"), if it is determined to block or not, the second fake response traffic ("S300") is transmitted to the client terminal, so that the second fake response traffic is used by the user client terminal. The generated 100% frame is supplemented with parameters to supplement the address of the website that the user originally tried to connect to and detects and blocks the detection by the web server (260). And preventing the use of the forwarding traffic from the client terminal to the detecting and blocking network server (260), wherein the detecting and blocking network server (260) is extracted by the forwarding and receiving traffic from the detecting and blocking The user's public network IP and the 0% detection frame independently generated by the above 100% frame, the router overuse detection algorithm is executed by the inherent parameter value of the flash shared object received from the user client terminal, thereby The user's traffic of the state of use allows the user's client terminal to determine whether to allow or block the excessive use of the router by supplementing the processing conditions by detecting the user's traffic requested by the user's client terminal. Website connection request. 一種共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其係選擇性地允許及阻止藉由檢測利用相同公網IP之私有網絡上之複數個用戶終端台數並與所分配之允許台數進行比較而進行請求連接的終端之因特網連接請求流量者,其特徵在於包括:(I)加入用戶流量之鏡像階段(“S100”),其於由客戶終端藉由驅動網頁瀏覽器而請求連接到因特網上之網站之情況下,由設置於因特網服務提供商之骨幹網絡之鏡像裝置(210)鏡像自客戶終端發生之網站連接請求流量,並且將上述經鏡像之網站連接請求流量傳輸到推送服務器(220),以便確認是否為IP路由器過量使用嫌疑用戶;(II)加入用戶流量之過量使用嫌疑用戶公網IP確認階段(“S200”),其由上述推送服務器(220)確認上述經鏡像之網站連接請求流量是否為藉由推送服務器所處理之藉由包含於上一個連接流量之公網IP及cookie資訊而選定為路由器過量使用嫌疑用戶之公網IP;(III-A)路由器過量使用嫌疑用戶選定及上傳階段(“S210”),其 若並非為被選定為路由器過量使用嫌疑用戶之公網IP,則由上述推送服務器(220)藉由包含於上述經鏡像之網站連接請求流量之公網IP及Cookie資訊而驗證是否為應選定為路由器過量使用嫌疑用戶之狀態,若被選定為路由器過量使用嫌疑用戶,則上傳該IP,又,將包括用於向客戶終端存儲藉由定義設定如sign參數之Cookie有效時間之獨特變量並以當前時刻設定之Cookie之命令及用於引導以使重新連接到原來試圖連接之網站之重定向命令之第一假響應流量傳輸到客戶終端;(III-B)路由器過量使用狀態檢測及阻止決定階段(“S400”),其若為被選定為路由器過量使用嫌疑用戶之公網IP,則為了減少負荷,上述推送服務器(220)執行用於確認上述經鏡像之網站連接請求流量是否為可成為決定阻止與否之對象之流量之階段(“S250”),若屬於阻止與否決定對象流量,則向客戶終端傳輸第二假響應流量(“S300”),以使藉由上述第二假響應流量而於用戶客戶終端所生成之100%幀上以參數形式補充用戶原來試圖連接之網站之地址並向檢測及阻止用網絡服務器(260)重定向之檢測及阻止用轉發流量自客戶終端傳輸到檢測及阻止用網絡服務器(260)後,上述檢測及阻止用網絡服務器(260)藉由有別於所接收之自上述檢測及阻止用轉發流量所提取之用戶之公網IP及上述100%幀而獨立生成之0%檢測幀,藉由自用戶客戶終端所接收之閃存共享對象之之固有參數值而執行路由器過量使用檢測算法,藉此,實施對路由器過量使用狀態之用戶流量進行檢測之路由器過量使用狀態檢測(“S410”)後,藉由補充處理條件而決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接請求(“S420a”),並且經過上述路由器過量使用嫌疑用戶選定及上傳階段(“S210”)之 上述經鏡像之網站連接請求流量,與被選定為路由器過量使用嫌疑用戶與否無關,於上述推送服務器(220)中被廢棄(“S220”),允許藉由原始網站連接請求流量之因特網連接(“S230”),於上述路由器過量使用狀態檢測及阻止決定階段(“S400”)之上述路由器過量使用狀態檢測(“S410”)中未被判別為路由器過量使用狀態,或者於決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接(“S420a”)之過程中藉由補充處理條件而允許網站連接之情況下,檢測及阻止用網絡服務器(260)藉由重定向於藉由用戶客戶終端而以參數形式附加到上述檢測及阻止用轉發流量之原始目的網站而允許網站之連接(“S420b”)。 A selective enabling or blocking method for sharing Internet connection request traffic of a public network IP, which selectively allows and blocks the number of user terminals on a private network utilizing the same public IP address and is allocated The Internet connection request traffic of the terminal that allows the number of comparisons to be made to be connected is characterized by: (1) a mirroring phase ("S100") of joining user traffic, which is driven by the client terminal by driving the web browser. In the case of requesting connection to a website on the Internet, the mirroring device (210) installed in the backbone network of the Internet service provider mirrors the website connection request traffic generated from the client terminal, and transmits the mirrored website connection request traffic to the Pushing the server (220) to confirm whether the suspect router is overused by the IP router; (II) adding the user traffic excess usage suspect network public network IP confirmation phase ("S200"), which is confirmed by the above push server (220) Whether the mirrored website connection request traffic is processed by the push server by being included in the previous connection traffic Network IP and cookie information and selected as the router user suspects excessive use of public network IP; (III-A) router suspected excessive use of user-selected and uploaded stage ( "S210"), which If it is not for the public network IP of the suspect user that is selected to be over-utilized by the router, the push server (220) verifies whether it should be selected by the public network IP and cookie information included in the mirrored website connection request traffic. The router overuses the status of the suspect user. If it is selected as the router overusing the suspect user, uploading the IP, in turn, will include a unique variable for storing the cookie effective time by defining a setting such as the sign parameter to the client terminal and The command of the cookie set at the moment and the first false response traffic for guiding to re-connect to the redirect command of the original attempted connection to the client terminal; (III-B) the router over-use state detection and blocking decision phase ( "S400"), if it is selected as the router over-use the public network IP of the suspect user, in order to reduce the load, the push server (220) performs a confirmation for confirming whether the mirrored website connection request traffic is a decision to prevent Whether or not the flow of the object ("S250"), if it is blocked or not, determines the target traffic, then ends with the customer. Transmitting a second false response traffic ("S300"), so that the address of the website that the user originally tried to connect is supplemented by parameters on the 100% frame generated by the user client terminal by using the second false response traffic, and is detected and Preventing the detection by the network server (260) and preventing the use of the forwarding traffic from the client terminal to the detection and blocking network server (260), the detection and blocking network server (260) is different from the received network The router executes the router by detecting and blocking the 0% detection frame independently generated by the user's public network IP extracted by the forwarding traffic and the 100% frame, and the inherent parameter value of the flash shared object received from the user client terminal. Excessive use of the detection algorithm, whereby the user over-the-state detection ("S410"), which detects the user traffic of the router in the overused state, is determined by supplementing the processing conditions to determine whether to allow or prevent the router from overusing the user. The website connection request of the terminal ("S420a"), and the suspected user selection and uploading stage is over-utilized by the above router ("S210 ") The above mirrored website connection request traffic is not related to the suspected user who is selected as the router overuse, and is discarded in the push server (220) ("S220"), allowing the Internet connection to request traffic through the original website connection ( "S230"), in the above-mentioned router over-utilization state detection and blocking decision phase ("S400"), the above-mentioned router over-use state detection ("S410") is not determined as the router over-utilization state, or is determined whether to allow or block In the case where the website connection ("S420a") of the user terminal of the router is over-utilized, the website is allowed to connect by supplementing the processing conditions, and the network server (260) is detected and blocked by being redirected to the user by the user. The terminal is attached to the above-mentioned website for detecting and blocking the original destination website for forwarding traffic by means of parameters ("S420b"). 如請求項2之共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其中上述路由器過量使用嫌疑用戶選定及上傳階段(“S210”)包括:由上述推送服務器(220)首先確認所鏡像之上述流量是否為“網站連接請求流量”之階段(“S211”);由上述推送服務器(220)確認所鏡像之上述流量之設定條件之“Host”是否為主要監測目標主機(HOST)之階段(“S212”);由上述推送服務器(220)確認所鏡像之上述流量之設定條件之“URI”之結束部是否為“/”或“/?”以及是否存在設定條件之“Referer”之階段(“S213”);以及由上述推送服務器(220)確認所鏡像之上述流量之設定條件之“Cookie”是否存在稱為“sign”之參數值之階段(“S214”)。 The selective permission or blocking method for the Internet connection request traffic of the shared public network IP of claim 2, wherein the router excessively using the suspect user selection and uploading phase ("S210") comprises: first confirming by the push server (220) Whether the above-mentioned traffic of the mirror is the stage of "website connection request traffic"("S211"); the setting condition of the above-mentioned traffic mirrored by the above-mentioned push server (220) is confirmed Whether the "Host" is the stage of the main monitoring target host (HOST) ("S212"); the setting condition of the above-mentioned traffic mirrored by the above-mentioned push server (220) is confirmed Whether the end of the "URI" is "/" or "/?" and whether there is a setting condition a "Referer" stage ("S213"); and a setting condition for confirming the mirrored traffic by the push server (220) Whether "Cookie" has a phase of a parameter value called "sign"("S214"). 如請求項3之共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其中上述主要監測目標主機(HOST)為網站連接排行前十以內之網站。 The selective permission or blocking method for the Internet connection request traffic of the shared public network IP of claim 3, wherein the main monitoring target host (HOST) is a website within the top ten of the website connection ranking. 如請求項1至4中任一項之共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其中確認所鏡像之上述流量是否為阻止與否決定對象流量之階段(“S250”),其經過由上述推送服務器(220)確認所鏡像之上述流量是否為“網站連接請求流量”之階段(“S251”)、由上述推送服務器(220)確認所鏡像之上述流量之連接主機(HOST)是否為“擴大監測目標網站”之階段(“S252”)、由上述推送服務器(220)確認所鏡像之上述流量之URI之結束部是否為“/”或“/?”以及是否存在Referer之階段(“S253”)之過程,若上述推送服務器(220)於上述“S251”、“S252”、“S253”之確認階段中無法滿足各項條件中之一種以上條件,則所鏡像之上述流量被廢棄(“S220”),允許正常連接到由用戶請求連接之網站(“S230”),並且若上述推送服務器(220)於上述“S251”、“S252”、“S253”之確認階段中全部滿足各項條件,則實施向上述客戶終端傳輸上述第二假響應流量之上述“S300”階段。 A method for selectively enabling or blocking an Internet connection request traffic of a shared public network IP according to any one of claims 1 to 4, wherein the method of confirming whether the mirrored traffic is a stop or not determines the target traffic ("S250") And the connected host (HOST) confirming whether the mirrored traffic is the "website connection request traffic" ("S251"), and the above-mentioned push server (220) confirms the mirrored traffic by the push server (220) Whether it is the stage of "expanding the monitoring target website" ("S252"), and confirming by the above-mentioned push server (220) whether the end portion of the URI of the mirrored traffic is "/" or "/?" and whether or not there is a Referer In the process of the stage ("S253"), if the push server (220) fails to satisfy one or more of the conditions in the confirmation phase of the above "S251", "S252", and "S253", the traffic is mirrored. Deprecated ("S220"), allowing normal connection to the website requested by the user ("S230"), and if the above-mentioned push server (220) is confirmed by the above "S251", "S252", "S253" All satisfied the conditions of the paragraph, the above-described embodiment the transmission "S300" of the second stage of the prosthesis in response to the flow rate of the client terminal. 如請求項1至4中任一項之共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其中構成上述路由器過量使用狀態檢測及阻止階段(“S400”)之上述路由器過量使用狀態之用戶流量檢測(“S410”)階段,其實施如下階段,由上述檢測及阻止用網絡服務器(260)藉由0%檢測幀而請求於用戶客戶終端(用戶計算機)之閃存共享對象中以如用戶身分證明等設定參數名存儲之固有參數值之階段(“S411”);以及於上述“S411”階段中自客戶終端接收用戶身分證明之固有參數值,若於資料庫服務器(240)之該用戶IP(ID)之24小時以內之用戶 身分證明列表中存在與當前連接之用戶客戶終端(用戶計算機)之用戶身分證明值相同之值而被判定為有效之用戶身分證明之固有參數值,則向資料庫服務器(240)更新該用戶身分證明之連接時刻,允許連接到由用戶之客戶終端請求連接之網站之階段(“S412”),並且若於上述“S411”中,無法自客戶終端接收用戶身分證明之固有參數值,或者已接收用戶身分證明之固有參數值,然而於該IP(ID)之24小時以內之用戶身分證明列表中不存在與當前連接之用戶客戶終端(用戶計算機)之用戶身分證明值相同之值而被判定為無效之用戶身分證明之固有參數值,則藉由查找於當前資料庫服務器(240)中所存在之該用戶IP(ID)之24小時以內之有效之用戶身分證明列表之數量及該用戶IP(ID)之路由器計算機允許台數(“S413”),(a)若有效之用戶身分證明列表之數量不足計算機允許台數,則判定為當前不處於路由器過量使用狀態,針對當前連接之用戶客戶終端(用戶計算機)而生成新的用戶身分證明之固有參數值,將其存儲於用戶客戶終端,亦將其與連接時刻一同上傳於資料庫服務器(240),允許用戶連接到客戶終端所請求連接之網站(“S414a”),並且(b)若有效之用戶身分證明列表數量超過計算機允許台數,則判定為當前處於路由器過量使用狀態(“S414b”),針對當前連接之用戶客戶終端(用戶計算機),藉由補充處理條件而實施用於決定是否允許或阻止因特網連接之連接請求流量之阻止或允許與否決定階段(參照圖4a之“S420a”及圖4d)。 The selective enabling or blocking method for the Internet connection request traffic of the shared public network IP according to any one of claims 1 to 4, wherein the router excessive use state constituting the router over-utilization state detection and blocking phase ("S400") a user traffic detection ("S410") phase, which is implemented in the following stage, by the above-mentioned detection and blocking network server (260) requesting a flash shared object of a user client terminal (user computer) by a 0% detection frame, such as a phase of the intrinsic parameter value stored in the parameter name name, such as the user identity certificate ("S411"); and the intrinsic parameter value of the user identity certificate received from the client terminal in the above "S411" phase, if the database server (240) User within 24 hours of user IP (ID) If there is an inherent parameter value of the user identity certificate determined to be valid by the same value as the user identity certificate value of the currently connected user client terminal (user computer) in the identity certificate list, the user identity is updated to the database server (240). The connection moment of the proof is allowed to connect to the stage of the website requested by the user terminal of the user ("S412"), and if in the above "S411", the inherent parameter value of the user identity certificate cannot be received from the client terminal, or has been received The value of the intrinsic parameter of the user identity certificate, but the user identity certificate list within 24 hours of the IP (ID) is not determined to be the same value as the user identity certificate value of the currently connected user client terminal (user computer). The intrinsic parameter value of the invalid user identity certificate is obtained by finding the number of valid user identity certification lists within 24 hours of the user IP (ID) existing in the current database server (240) and the user IP ( ID) The number of router computers allowed ("S413"), (a) If the number of valid user identity certificates is less than the number of computers allowed, Then, it is determined that the router is not in the over-utilization state, and the unique parameter value of the new user identity certificate is generated for the currently connected user client terminal (user computer), stored in the user client terminal, and uploaded together with the connection time. The database server (240) allows the user to connect to the website requested by the client terminal ("S414a"), and (b) if the number of valid user identity certificates exceeds the number of computers allowed, it is determined that the router is currently in excess The use status ("S414b"), for the currently connected user client terminal (user computer), by means of supplemental processing conditions, the decision or the permission decision phase of the connection request flow for deciding whether to allow or block the Internet connection is implemented (refer to "S420a" of Figure 4a and Figure 4d). 如請求項4之共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其中 於藉由補充處理條件而實施用於決定是否允許或阻止因特網連接之上述連接請求流量之阻止或允許與否決定階段中,(b1)存在於資料庫服務器(240)之該用戶IP(ID)之第一設定時間(T-1;例如,24小時)以內之有效之用戶身分證明列表中,若存在所上傳之連接時刻以當前時刻為基準而超過第二設定時間(T-2;例如,30分鐘)而經過之用戶身分證明,則刪除於資料庫服務器(240)中之連接時間最久之用戶身分證明列表,針對當前連接之用戶客戶終端(用戶計算機)而生成新的用戶身分證明之固有參數值,將其存儲於用戶客戶終端,亦將其與連接時刻一同上傳於資料庫服務器(240),允許用戶連接到客戶終端所請求連接之網站(“S420b1”)。 The method for selectively enabling or blocking the Internet connection request traffic of the shared public network IP of claim 4, wherein (b1) the user IP (ID) existing in the database server (240) in the stage of determining or allowing the connection request traffic for determining whether to allow or block the Internet connection by the supplementary processing condition In the valid user identity certificate list within the first set time (T-1; for example, 24 hours), if the uploaded connection time exists, the second set time is exceeded based on the current time (T-2; for example, 30 minutes) and the user identity certificate passed, the user identity certificate list with the longest connection time in the database server (240) is deleted, and the new user identity certificate is generated for the currently connected user client terminal (user computer). The parameter value is stored in the user client terminal, and is also uploaded to the database server (240) along with the connection time, allowing the user to connect to the website ("S420b1") requested by the client terminal. 如請求項7之共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其中於藉由補充處理條件而實施用於決定是否允許或阻止因特網連接之上述連接請求流量之阻止或允許與否決定階段中,(b2)若存在於資料庫服務器(240)之該用戶IP(ID)之24小時以內之有效之用戶身分證明列表中不存在所上傳之連接時刻以當前時刻為基準而超過30分鐘之用戶身分證明,則針對當前連接之用戶客戶終端(用戶計算機),阻止連接到所請求連接之網站(“S420b2”)。 The selective enabling or blocking method for the Internet connection request traffic of the shared public network IP of claim 7, wherein the blocking or allowing of the connection request traffic for deciding whether to allow or block the Internet connection is implemented by supplementing the processing conditions In the decision phase, (b2) if the valid user identity certificate list that exists within 24 hours of the user IP (ID) of the database server (240) does not exist, the uploaded connection time exceeds the current time as a reference. A 30-minute proof of user identity prevents the connection to the requested connection ("S420b2") for the currently connected user client terminal (user computer). 如請求項8之共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其中於針對當前連接之用戶客戶終端(用戶計算機)而阻止連接到所請求連接之網站(“S420b2”)之階段中,藉由政策而向用戶不提供任何響應。 The selective permission or blocking method of the Internet connection request traffic of the shared public network IP of claim 8, wherein the connection to the website of the requested connection ("S420b2") is blocked for the currently connected user client terminal (user computer) In the stage, no response is provided to the user by policy. 如請求項8之共享公網IP之因特網連接請求流量之選擇性允許或 阻止方法,其中於針對當前連接之用戶客戶終端(用戶計算機)而阻止連接到所請求連接之網站(“S420b2”)之階段中,更包括向阻止消息頁面或警告消息頁面進行重定向之階段。 Selective permission of the Internet connection request traffic of the shared public network IP of claim 8 or A blocking method in which a phase of blocking a connection to a website of a requested connection ("S420b2") for a currently connected user client terminal (user computer) includes a phase of redirecting to a blocking message page or a warning message page. 如請求項10之共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其中於上述阻止消息頁面或警告消息頁面中,除了顯示警告或阻止狀態之外,藉由提供另行之“連接允許請求按鈕”,以使解除當前客戶終端之阻止狀態,並初始化(刪除)於資料庫服務器(240)中以往被允許之客戶終端中之於設定時間內最初連接之客戶終端之用戶身分證明。 The selective permission or blocking method for the Internet connection request traffic of the shared public network IP of claim 10, wherein in the above blocking message page or warning message page, in addition to displaying the warning or blocking status, by providing a separate "connection" The request button is allowed to cancel the blocking state of the current client terminal, and initialize (delete) the user identity certificate of the client terminal that was originally connected in the previously permitted client terminal in the database server (240) within the set time. 如請求項1至4中任一項之共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其中自上述推送服務器(220)傳輸到用戶客戶終端之上述第二假響應流量將用戶客戶終端之幀分割成100%幀(用戶原來試圖連接之網站之URL)及0%檢測幀(檢測及阻止用網絡服務器之URL;用於指定收錄有自客戶終端取回用戶身分證明並與資料庫服務器進行比較檢查之命令之“search.jsp”;將用戶原來試圖連接之網站之地址以參數形式附上)之兩種幀。 The selective permission or blocking method for the Internet connection request traffic of the shared public network IP according to any one of claims 1 to 4, wherein the second false response traffic transmitted from the push server (220) to the user client terminal is the user The frame of the client terminal is divided into 100% frame (the URL of the website the user originally tried to connect) and 0% detection frame (the URL of the detection and blocking network server; used to specify the inclusion of the user identity certificate and the data from the client terminal) The library server performs a comparison check command "search.jsp"; the address of the website that the user originally tried to connect is attached as a parameter). 如請求項1至4中任一項之共享公網IP之因特網連接請求流量之選擇性允許或阻止方法,其中自上述推送服務器(220)傳輸到用戶客戶終端之上述第二假響應流量,以使用戶客戶終端之幀僅由100%幀(檢測及阻止用網絡服務器之URL;指定“check.jsp”;將用戶原來試圖連接之網站之URL地址以參數形式附上)構成,並且上述檢測及阻止用網絡服務器(260)藉由分割幀而生成獨立之 0%檢測幀(檢測及阻止用網絡服務器之URL;用於指定收錄有自客戶終端取回用戶身分證明並與資料庫服務器進行比較檢查之命令之“search.jsp”;將用戶原來試圖連接之網站之地址以參數形式附上)。 The selective permission or blocking method for the Internet connection request traffic of the shared public network IP according to any one of claims 1 to 4, wherein the second false response traffic transmitted from the push server (220) to the user client terminal is Making the frame of the user client terminal consist of only 100% frames (detecting and blocking the URL of the web server; specifying "check.jsp"; attaching the URL address of the website that the user originally tried to connect) to the parameter, and the above detection and Preventing the use of the web server (260) to generate independent by splitting frames 0% detection frame (detects and blocks the URL of the web server; it is used to specify the "search.jsp" that contains the command to retrieve the user ID certificate from the client terminal and compare it with the database server; the user originally tried to connect The address of the website is attached as a parameter). 一種公網IP共享狀態檢測及阻止系統,其藉由檢測利用相同公網IP之私有網絡上之複數個用戶客戶終端之數量並將其與所分配之允許台數進行比較而藉由IP共享狀態而選擇性地允許及阻止請求連接之客戶終端之因特網連接請求流量,其特徵在於包括:鏡像裝置(210),其於由因特網服務用戶之客戶終端藉由驅動網頁瀏覽器而請求連接到因特網上之網站之情況下,用於鏡像自客戶終端發生之網站連接請求流量,設置於因特網服務提供商之骨幹網絡;推送服務器(220),其藉由確認上述經鏡像之網站連接請求流量之用戶公網IP是否為藉由推送服務器所處理之藉由包含於上一個連接流量之公網IP及cookie資訊而選定為路由器過量使用嫌疑用戶之公網IP,若為被選定為路由器過量使用嫌疑用戶之公網IP,則為了減少檢測及阻止用網絡服務器之負荷,上述推送服務器(220)執行用於確認上述經鏡像之網站連接請求流量是否為可成為決定阻止與否之對象之流量之階段,若屬於阻止與否決定對象流量,則向客戶終端傳輸第二假響應流量,以使藉由生成於用戶客戶終端之100%幀而以參數形式補充用戶原來試圖連接之網站之地址並向檢測及阻止用網絡服務器(260)重定向之檢測及阻止用轉發流量自客戶終端傳輸到檢測及阻止用網絡服務器(260);以及檢測及阻止用網絡服務器(260),其藉由有別於自上述用戶客戶終端傳輸之自上述檢測及阻止用轉發流量所提取之用戶之公 網IP及上述100%幀而獨立生成之0%檢測幀,而將以自用戶客戶終端接收之用戶身分證明等設定參數名存儲之閃存共享對象之固有參數值存儲於資料庫服務器(240),藉由搜索自連接時刻至第一設定時間期間所存儲之列表,而執行路由器過量使用狀態檢測算法,藉此,對於非路由器過量使用狀態之用戶流量,向藉由用戶客戶終端而以參數形式附於上述檢測及阻止用轉發流量之原始目的網站進行重定向,藉由檢測路由器過量使用狀態之用戶流量,藉由補充處理條件而決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接請求。 A public network IP sharing state detecting and blocking system for detecting an IP sharing state by detecting the number of a plurality of user client terminals on a private network using the same public IP address and comparing it with the allowed number of allowed users And selectively enabling and blocking Internet connection request traffic of the client terminal requesting the connection, characterized by comprising: a mirroring device (210) requesting connection to the Internet by a client terminal of the Internet service user by driving the web browser In the case of the website, the website connection request traffic for mirroring from the client terminal is set in the backbone network of the Internet service provider; the push server (220) confirms the traffic of the request through the mirrored website connection request. Whether the network IP is selected by the push server by the public network IP and cookie information included in the previous connection traffic, and is selected as the public network IP of the router overusing the suspect user, if it is selected as the router excessive use of the suspect user Public network IP, in order to reduce the load of detecting and blocking the use of the network server, the above push server (220) The line is used to confirm whether the above-mentioned mirrored website connection request flow is a stage that can be the target of determining whether to block or not, and if it is a blockage or not, the second false response flow is transmitted to the client terminal, so as to borrow The address of the website that the user originally tried to connect is supplemented by a parameter generated by the 100% frame generated by the user client terminal, and the detection and prevention of the redirected traffic to the detection and blocking network server (260) is transmitted from the client terminal to the detection and Blocking the network server (260); and detecting and blocking the network server (260), which is different from the user extracted from the above-mentioned user terminal by detecting and blocking the forwarding traffic The network IP and the 0% detection frame independently generated by the 100% frame, and the inherent parameter value of the flash shared object stored in the parameter name stored by the user identity certificate received from the user client terminal is stored in the database server (240). The router overuse state detection algorithm is executed by searching the list stored from the connection time to the first set time, whereby the user traffic for the non-router overuse state is attached to the parameter by the user client terminal The above-mentioned detection and prevention of the original destination website for forwarding traffic is performed, and by detecting the user traffic of the router over-utilization state, by determining the processing conditions, whether to allow or block the router connection request of the user client terminal of the router over-use state is determined. . 一種公網IP共享狀態檢測及阻止系統,其藉由檢測利用相同公網IP之私有網絡上之複數個用戶客戶終端之數量並將其與所分配之允許台數進行比較而藉由IP共享狀態而選擇性地允許及阻止請求連接之客戶終端之因特網連接請求流量,其特徵在於包括:鏡像裝置(210),其於由因特網服務用戶之客戶終端藉由驅動網頁瀏覽器而請求連接到因特網上之網站之情況下,用於鏡像自客戶終端發生之網站連接請求流量,設置於因特網服務提供商之骨幹網絡;推送服務器(220),其藉由確認上述經鏡像之網站連接請求流量之用戶公網IP是否為藉由推送服務器所處理之藉由包含於上一個連接流量之公網IP及cookie資訊而選定為路由器過量使用嫌疑用戶之公網IP,若並非為被選定為路由器過量使用嫌疑用戶之公網IP,則向分析服務器傳輸包含於上述經鏡像之網站連接請求流量之公網IP及連接主機(HOST)資訊,以使確認是否處於應選定為路由器過量使用嫌疑用戶之狀態,又,由上述推送服務器(220)藉由包含於上述經鏡像之網站連接請求流量之公網IP及Cookie資訊而驗證是否為應選定為路由器過量 使用嫌疑用戶之狀態,若被選定為路由器過量使用嫌疑用戶,則上傳該IP,又,將包括用於向客戶終端存儲藉由定義設定如sign參數之Cookie有效時間之獨特變量並以當前時刻設定之Cookie之命令及用於引導以使重新連接到用戶原來試圖連接之網站之重定向命令之第一假響應流量傳輸到客戶終端,並且,若為被選定為路由器過量使用嫌疑用戶之公網IP,則為了減少檢測及阻止用網絡服務器之負荷,執行用於確認上述經鏡像之網站連接請求流量是否為可成為決定阻止與否之對象之流量之階段,若屬於阻止與否決定對象流量,則向客戶終端傳輸第二假響應流量,以使藉由上述第二假響應流量而於用戶客戶終端所生成之100%幀上以參數形式補充用戶原來試圖連接之網站之地址並向檢測及阻止用網絡服務器(260)重定向之檢測及阻止用轉發流量自客戶終端傳輸到檢測及阻止用網絡服務器(260);分析服務器(230),其將自上述推送服務器接收之用戶之公網IP及連接主機(HOST)資訊與連接時間資料一同存儲於資料庫服務器(240),藉由掌握於設定時間內以公網IP而針對特定主機發起之連接請求次數,而判別其連接請求次數是否超過按不同用戶政策實施管理之IP共享允許計算機數量之允許值,藉此,決定是否選定為路由器過量使用嫌疑用戶,將其決定結果與該公網IP一同傳輸到上述推送服務器(220);以及檢測及阻止用網絡服務器(260),其藉由有別於自上述用戶客戶終端傳輸之自上述檢測及阻止用轉發流量所提取之用戶之公網IP及上述100%幀而獨立生成之0%檢測幀,而將以自用戶客戶終端接收之用戶身分證明等設定參數名存儲之閃存共享對象之固有參數值存儲於資料庫服務器(240),藉由搜索自連接時刻至第一設定時間期間所存儲之列表,而執行路由器過量使用狀態 檢測算法,藉此,對於非路由器過量使用狀態之用戶流量,向藉由用戶客戶終端而以參數形式附於上述檢測及阻止用轉發流量之原始目的網站進行重定向,藉由檢測路由器過量使用狀態之用戶流量,藉由補充處理條件而決定是否允許或阻止路由器過量使用狀態之用戶客戶終端之網站連接請求。 A public network IP sharing state detecting and blocking system for detecting an IP sharing state by detecting the number of a plurality of user client terminals on a private network using the same public IP address and comparing it with the allowed number of allowed users And selectively enabling and blocking Internet connection request traffic of the client terminal requesting the connection, characterized by comprising: a mirroring device (210) requesting connection to the Internet by a client terminal of the Internet service user by driving the web browser In the case of the website, the website connection request traffic for mirroring from the client terminal is set in the backbone network of the Internet service provider; the push server (220) confirms the traffic of the request through the mirrored website connection request. Whether the network IP is selected by the push server to be the public network IP of the suspect over-utilized user by the public network IP and cookie information contained in the previous connection traffic, if not for the suspected user who is selected as the router over-use The public network IP transmits the connection request traffic included in the mirrored website to the analysis server. Network IP and connection host (HOST) information, so as to confirm whether it is in the state that the router should be selected as a suspected over-utilization user, and the push server (220) connects to the public network that requests the traffic by including the mirrored website. IP and cookie information to verify whether it should be selected as a router overdose Using the status of the suspected user, if the selected user is selected to use the suspected user excessively, uploading the IP, in addition, will include a unique variable for storing the cookie effective time by setting a setting such as the sign parameter to the client terminal and setting the current time The cookie command and the first false response traffic used to boot the redirection command to reconnect to the website the user originally attempted to connect to, and if, the public network IP of the suspect user is selected for excessive use by the router In order to reduce the load of detecting and blocking the use of the network server, the execution of the traffic for confirming whether the mirrored website connection request flow is the target of determining whether to block or not is performed, and if it is blocked or not, the target traffic is determined. Transmitting, by the client terminal, the second false response traffic, so as to supplement the address of the website that the user originally tried to connect to the 100% frame generated by the user client terminal by using the second false response traffic, and detecting and blocking the address of the website that the user originally tried to connect to Network server (260) redirection detection and blocking forwarding traffic from client terminal to detection Blocking the network server (260); the analysis server (230), which stores the public network IP and the connected host (HOST) information of the user received from the push server together with the connection time data in the database server (240), Master the number of connection requests initiated by a specific host for the public network IP in the set time, and determine whether the number of connection requests exceeds the allowable value of the number of IP sharing allowed computers managed according to different user policies, thereby determining whether to select The router overuses the suspect user, transmits the determined result to the push server (220) together with the public network IP, and detects and blocks the network server (260), which is different from the user terminal terminal. The above-mentioned detection and blocking of the public network IP extracted by the forwarded traffic and the 0% detection frame independently generated by the above 100% frame, and the flash shared object stored in the parameter name such as the user identity certificate received from the user client terminal The inherent parameter values are stored in the database server (240) by searching for the columns stored from the connection time to the first set time period. , The router performs overcommitted The detection algorithm, whereby the user traffic of the non-router over-utilization state is redirected to the original destination website that detects and blocks the forwarded traffic by parameterizing the user client terminal, thereby detecting the excessive use state of the router. The user traffic, by supplementing the processing conditions, determines whether to allow or block the website connection request of the user client terminal of the router over-committed state. 如請求項15之公網IP共享狀態檢測及阻止系統,其更包括:政策管理網頁服務器(250),其將按不同用戶政策實施管理之IP共享允許計算機數量列表存儲於上述資料庫服務器(240)並可變更該等資訊。 The public network IP sharing status detecting and blocking system of claim 15, further comprising: a policy management web server (250), wherein the IP sharing permitted computer number list managed by different user policies is stored in the database server (240) ) and can change this information. 如請求項14至16中任一項之公網IP共享狀態檢測及阻止系統,其中,上述推送服務器(220)以使自上述推送服務器(220)傳輸到用戶客戶終端之上述第二假響應流量將用戶客戶終端之幀分割成100%幀(用戶原來試圖連接之網站之URL)及0%檢測幀(檢測及阻止用網絡服務器之URL;用於指定收錄有自客戶終端取回用戶身分證明並與資料庫服務器進行比較檢查之命令之“search.jsp”;將用戶原來試圖連接之網站之地址以參數形式附上)之兩種幀。 The public network IP sharing state detecting and blocking system according to any one of claims 14 to 16, wherein the push server (220) transmits the second false response traffic from the push server (220) to the user client terminal. Divide the frame of the user client terminal into 100% frames (the URL of the website the user originally tried to connect) and 0% detection frame (the URL of the detection and blocking network server; used to specify the inclusion of the user identity certificate from the client terminal and The "search.jsp" of the command for comparison check with the database server; the two frames of the address of the website that the user originally tried to connect are attached as parameters. 如請求項14至16中任一項之公網IP共享狀態檢測及阻止系統,其中,上述推送服務器(220)以使自上述推送服務器(220)傳輸到用戶客戶終端之上述第二假響應流量,以使用戶客戶終端之幀僅由100%幀(檢測及阻止用網絡服務器之URL;指定“check.jsp”;將用戶原來試圖連接之網站之URL地址以參數形式附上)構成,並且上述檢測及阻止用網絡服務器(260)藉由分割幀而生成獨立之0%檢測幀(檢測及阻止用網絡服務器之URL;用於指定收錄有自 客戶終端取回用戶身分證明並與資料庫服務器進行比較檢查之命令之“search.jsp”;將用戶原來試圖連接之網站之地址以參數形式附上)。 The public network IP sharing state detecting and blocking system according to any one of claims 14 to 16, wherein the push server (220) transmits the second false response traffic from the push server (220) to the user client terminal. So that the frame of the user client terminal is composed of only 100% frames (detecting and blocking the URL of the web server; specifying "check.jsp"; attaching the URL address of the website that the user originally tried to connect is parameterized), and the above Detecting and blocking the web server (260) to generate an independent 0% detection frame by dividing the frame (detecting and blocking the URL of the web server; The client terminal retrieves the user identity certificate and compares it with the database server to search for "search.jsp"; the address of the website that the user originally tried to connect is attached as a parameter).
TW103102803A 2013-12-30 2014-01-24 Based on the current time to share the public network IP Internet connection request flow of the selective allow or prevent the method and the implementation of the method of public network IP sharing of the current state detection and prevention system TWI577163B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020130166977A KR101518474B1 (en) 2013-12-30 2013-12-30 Method for selectively permitting/blocking a plurality of internet request traffics sharing the public IP address on the basis of current time and system for detecting and blocking internet request traffics sharing the public IP address on the current time

Publications (2)

Publication Number Publication Date
TW201526589A true TW201526589A (en) 2015-07-01
TWI577163B TWI577163B (en) 2017-04-01

Family

ID=53394136

Family Applications (1)

Application Number Title Priority Date Filing Date
TW103102803A TWI577163B (en) 2013-12-30 2014-01-24 Based on the current time to share the public network IP Internet connection request flow of the selective allow or prevent the method and the implementation of the method of public network IP sharing of the current state detection and prevention system

Country Status (3)

Country Link
KR (1) KR101518474B1 (en)
TW (1) TWI577163B (en)
WO (1) WO2015102356A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101783014B1 (en) * 2015-09-10 2017-09-28 주식회사 수산아이앤티 Method and apparatus for detecting terminals sharing a public IP address
WO2017078196A1 (en) * 2015-11-05 2017-05-11 주식회사 수산아이앤티 Method for managing shared terminal and device therefor
CN107025107A (en) * 2016-10-24 2017-08-08 阿里巴巴集团控股有限公司 The detection method and device of a kind of page reorientation circulation
KR102123549B1 (en) * 2017-03-08 2020-06-16 주식회사 케이티 Server and method for controlling of internet page access

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100723657B1 (en) * 2005-07-08 2007-05-30 플러스기술주식회사 Method for admitting or intercepting selectively an access to internet by users using private IP
KR100960152B1 (en) * 2007-10-24 2010-05-28 플러스기술주식회사 Method for permitting and blocking use of internet by detecting plural terminals on network
KR101013996B1 (en) * 2008-10-10 2011-02-14 플러스기술주식회사 A method for detecting a judgement whether or not a client use NATNetwork Address Translation, and the number of terminals sharing
KR101002421B1 (en) * 2010-04-09 2010-12-21 주식회사 플랜티넷 Method for selectively permitting/blocking a plurality of internet request traffics sharing the public ip address and system for detecting and blocking internet request traffics sharing the public ip address

Also Published As

Publication number Publication date
WO2015102356A1 (en) 2015-07-09
TWI577163B (en) 2017-04-01
KR101518474B1 (en) 2015-05-07

Similar Documents

Publication Publication Date Title
US11399010B1 (en) Private network request forwarding
US20210194981A1 (en) Proxy server failover and load clustering
US10904277B1 (en) Threat intelligence system measuring network threat levels
US8539080B1 (en) Application intelligent request management based on server health and client information
JP6553524B2 (en) System and method for utilizing a dedicated computer security service
US11831609B2 (en) Network security system with enhanced traffic analysis based on feedback loop
US20140207798A1 (en) Client application fingerprinting based on analysis of client requests
KR101002421B1 (en) Method for selectively permitting/blocking a plurality of internet request traffics sharing the public ip address and system for detecting and blocking internet request traffics sharing the public ip address
JP6075897B2 (en) Method and system for implementing an integrated voice over internet protocol in a cloud-based network
JP2018515984A (en) Methods and devices for defending against network attacks
JP2019134484A (en) System and method for regulating access request
JP6539341B2 (en) Providing router information according to the programmatic interface
US11570203B2 (en) Edge network-based account protection service
TWI577163B (en) Based on the current time to share the public network IP Internet connection request flow of the selective allow or prevent the method and the implementation of the method of public network IP sharing of the current state detection and prevention system
US10567492B1 (en) Methods for load balancing in a federated identity environment and devices thereof
JP2010026547A (en) Firewall load balancing method and firewall load balancing system
US10397225B2 (en) System and method for network access control
US20160299971A1 (en) Identifying Search Engine Crawlers
CN110311927B (en) Data processing method and device, electronic device and medium
EP3160086B1 (en) Method and system for detecting failure-inducing client by using client route control system
KR101127246B1 (en) Method of identifying terminals which share an ip address and apparatus thereof
RU2738337C1 (en) Intelligent bots detection and protection system and method
JP4855420B2 (en) Unauthorized communication program regulation system and program
JP2005295457A (en) P2p traffic dealing router and p2p traffic information sharing system using same
US20090150564A1 (en) Per-user bandwidth availability

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees