Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

DNS hijack monitoring method and device

A technology for monitoring information and sending methods, applied in the network field, can solve problems such as low efficiency, inability to detect and reproduce hijacking in time, and high labor costs, and achieve the effects of improving efficiency, reducing the difficulty of obtaining evidence, and reducing labor costs

Active Publication Date: 2014-07-02
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problems existing in related technologies are: firstly, hijacking cannot be detected and reproduced in a timely and active manner, especially for hijacking with small traffic; secondly, the labor cost is high and the efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DNS hijack monitoring method and device
  • DNS hijack monitoring method and device
  • DNS hijack monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0031] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance. In the description of the present invention, it should be noted that unless otherwise specified and limited, the terms "connected" and "connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a DNS hijack monitoring method and device. The method comprises the steps that a monitoring task is sent to a client side, so that after determining the monitoring task, the client side starts a browser to open a predetermined webpage which is indicated by URL information and obtains monitoring information in the webpage opening process; the monitoring information sent by the client side is received; if the client side has DNS hijack is determined according to the monitoring information. The method can actively find out the DNS hijack problem in time, effectively enable corresponding DNS hijack to reoccur in time, lower labor cost, and improve efficiency.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method and device for monitoring DNS hijacking. Background technique [0002] At present, it is becoming more and more common for users to access the Internet, for example, visit websites, forums, post bars, search engines, and the like. However, when users visit websites, forums, post bars, search engines, etc., they are likely to be hijacked by operators, rogue software, etc., resulting in problems such as inaccessibility of corresponding web pages and tampering of page elements. [0003] In order to solve the above problems, in related technologies, operators of websites, forums, post bars, search engines, etc. usually rely on user feedback information from forums, communities, and other public platforms to contact users to reproduce the hijacking phenomenon, so as to take screenshots to collect evidence. The problems existing in related technologies are: firstly, hijackin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 何海洋
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products