Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for reducing DNS hijacking risk

A DNS server and risk technology, applied in the electronic field, can solve problems such as hijacking risks, and achieve the effects of less error, less delay and high security when accessing network resources

Active Publication Date: 2017-05-24
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Then, if the UE connects to the fake DNS server based on the network configuration dynamically allocated by DHCP, there is a risk of hijacking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for reducing DNS hijacking risk
  • Method and apparatus for reducing DNS hijacking risk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0047] Embodiments of the present invention provide a method and device for reducing the risk of DNS hijacking, so as to reduce the risk of DNS hijacking. Please refer to figure 1 , which is a flowchart of a method for reducing the risk of DNS hijacking in an embodiment of the present invention, the method includes:

[0048] S101: Send a dynamic configuration request to a Dynamic Host Configuration Protocol DHCP device in the local ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and apparatus for reducing a DNS hijacking risk. The method comprises the following steps: sending a dynamic configuration request to a dynamic host configuration protocol DHCP device in a local area network; receiving dynamic configuration information returned by the DHCP device, wherein the dynamic configuration information comprises an internet protocol IP address of user equipment UE; sending the IP address of the UE to a security server; receiving a candidate wide area network DNS server address of a candidate wide area network DNS server, which belongs to the same operator as the UE, is determined by the security server on the basis of the IP address of the UE and is sent by the security server; determining the candidate wide area network DNS server address as a target wide area network DNS server address; switching a dynamic configuration networking state to a static networking state, wherein the main DNS server address of the secure configuration information is the target wide area network DNS server address; and accessing the network based on the secure configuration information.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method and device for reducing the risk of DNS hijacking. Background technique [0002] A common LAN DNS (Domain Name System, Domain Name System) hijacking is that the attacker builds a malicious fake DNS server in the LAN, and invades the DHCP (Dynamic Host Configuration Protocol, Dynamic Host Configuration Protocol) of the LAN The device modifies the DNS server address assigned by the DHCP device to the UE (User Equipment, User Equipment) to a pseudo DNS server address. Then, if the UE connects to the fake DNS server based on the network configuration dynamically assigned by DHCP, there is a risk of hijacking. Contents of the invention [0003] In view of the above problems, the present invention is proposed to provide a method and device for reducing the risk of DNS hijacking to overcome the above problems or at least partially solve the above problems. [0004] In t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1466H04L61/4511H04L61/5014
Inventor 张建新刘天高永岗
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products