Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Detection method and device for DNS hijacking as well as mobile terminal

A detection method and mobile terminal technology, applied in the detection of DNS hijacking, in the field of mobile terminals, can solve the lack of DNS anti-hijacking technology and other problems, and achieve the effect of ensuring security

Active Publication Date: 2017-05-31
深圳掌阅动漫科技有限公司
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a DNS hijacking detection method, device, and mobile terminal to solve the problem of lack of effective DNS hijacking technology based on mobile terminals, especially applications installed in mobile terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method and device for DNS hijacking as well as mobile terminal
  • Detection method and device for DNS hijacking as well as mobile terminal
  • Detection method and device for DNS hijacking as well as mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] refer to figure 1 , shows a flowchart of steps of a method for detecting DNS hijacking according to Embodiment 1 of the present invention.

[0020] The method for detecting DNS hijacking in this embodiment can be executed and implemented by any device capable of transmitting, receiving and processing data, including but not limited to mobile terminals. In this embodiment, a mobile terminal is used as an example for description.

[0021] The detection method of the DNS hijacking of the present embodiment comprises the following steps:

[0022] Step S102: Obtain the IP address corresponding to the domain name to be detected from the DNS server.

[0023] Wherein, the domain name to be detected is a domain name associated with an application of the mobile terminal.

[0024] For applications on mobile terminals, it is usually only necessary to visit the domain name associated with it. For example, an e-book application only needs to visit websites that provide e-books, we...

Embodiment 2

[0039] refer to figure 2 , shows a flowchart of steps of a method for detecting DNS hijacking according to Embodiment 2 of the present invention.

[0040] The detection method of the DNS hijacking of the present embodiment comprises the steps:

[0041] Step S202: When the application of the mobile terminal is started, a DNS resolution request carrying the domain name to be detected is sent to the DNS server, and an IP address corresponding to the domain name to be detected is obtained from the DNS server.

[0042] In this embodiment, when the application of the mobile terminal is started, the application of the mobile terminal sends a DNS resolution request (domain name resolution request) to the DNS server to obtain the IP address corresponding to the domain name to be detected. That is to say, the detection of DNS hijacking is performed immediately after the application of the mobile terminal is started, so that the application of the mobile terminal can normally access th...

Embodiment 3

[0072] refer to image 3 , shows a structural block diagram of an apparatus for detecting DNS hijacking according to Embodiment 3 of the present invention.

[0073] The device for detecting DNS hijacking in this embodiment includes an acquisition module 302 , a sending module 304 , a receiving module 306 and a processing module 308 . Wherein, the obtaining module 302 is used to obtain the IP address corresponding to the domain name to be detected from the DNS server, wherein the domain name to be detected is a domain name associated with the application of the mobile terminal; the sending module 304 is used to send DNS detection information to the IP address, Wherein, the DNS detection information carries the first verification data; the receiving module 306 is used to receive the response information in response to the DNS detection information, and obtain the second verification data from the response information; the processing module 308 according to the first verification...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention provide a detection method and device for DNS hijacking as well as a mobile terminal. The detection method for DNS hijacking comprises the following steps of obtaining an IP address corresponding to a to-be-detected domain name from a DNS server, wherein the to-be-detected domain name is a domain name associated with an application of the mobile terminal; sending DNS detection information to the IP address, wherein the DNS detection information carries first inspection data; receiving a response message which responds to the DNS detection information and obtaining second inspection data from the response message; and detecting whether the to-be-detected domain name is hijacked according to the first inspection data and the second inspection data. Through adoption of the technical scheme in the embodiments of the invention, the DNS hijacking can be detected accurately to be convenient for subsequently carrying out DNS hijacking prevention processing, so that the security of the application of the mobile terminal for accessing the network is guaranteed, and the DNS hijacking prevention is realized based on the mobile terminal.

Description

technical field [0001] The invention relates to the technical field of communications, in particular to a DNS hijacking detection method, device and mobile terminal. Background technique [0002] DNS (Domain Name System, domain name system) hijacking, also known as domain name hijacking, refers to intercepting domain name resolution requests within the hijacked network range, analyzing the requested domain name, returning a fake IP address or making the request unresponsive, the effect is to Specific networks do not respond or visit fake URLs. DNS is a key basic service of the Internet. Once DNS hijacking occurs, it will affect the normal operation of most Internet services. Therefore, DNS hijacking has become one of the main problems affecting network security, and the analysis and research on DNS hijacking prevention technology seems to be widely concerned. [0003] At present, the research on DNS anti-hijacking technology in the prior art is mainly based on the DNS serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1466
Inventor 程卫黄剑刘伟平杨明
Owner 深圳掌阅动漫科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products