DNS attack defense method, device and system
A technology of feature value and identification information, applied in the field of DNS attack defense, which can solve the problems of attack, reduction of discrimination efficiency, and discarding.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0193] This embodiment provides a method for defending against DNS attacks. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and although the steps shown in the flow chart A logical order is shown, but in some cases the steps shown or described may be performed in an order different from that presented here.
[0194] figure 1 It is a flowchart of the method for defending against DNS attacks disclosed in Embodiment 1 of the present invention; as shown in the figure, the method for defending against DNS attacks includes the following steps:
[0195] Step S101: Receive the DNS request sent by the request source, and obtain the request source IP address of the DNS request;
[0196] Step S102: Determine the characteristic value of the IP address;
[0197] Step S103: Find the identification information corresponding to the characteristic value in the memory...
Embodiment 2
[0231] This embodiment provides a method for defending against DNS attacks. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and although the steps shown in the flow chart A logical order is shown, but in some cases the steps shown or described may be performed in an order different from that presented here.
[0232] Figure 4 It is a flowchart of a method for defending against DNS attacks disclosed in an embodiment of the present invention; as shown in the figure, the method for defending against DNS attacks includes the following steps:
[0233] Step S401: receiving the DNS request, and obtaining the domain name to be resolved included in the DNS request;
[0234] Step S402: Determine the characteristic value of the domain name;
[0235] Step S403: judging whether the feature value is contained in the memory;
[0236] Step S404: If yes, acquire the...
Embodiment 3
[0276] Figure 10 It is a schematic block diagram of the device for defending against DNS attacks disclosed in Embodiment 3 of the present invention. Figure 10 The shown device for defending against DNS attacks can be used to implement the method for defending against DNS attacks described in Embodiment 1. see Figure 10 The device 100 for defending against DNS attacks may generally include: a request acquisition unit 102, a characteristic value determination unit 104, a first query unit 106, a second query unit 108, a request times judgment unit 120, an attack judgment unit 122 and a defense unit 124. In some optional embodiments of the present invention, according to the functional requirements and further optimization of the DNS attack defense device 100, it may be selectively configured with: a first processing unit 126, a second processing unit 128, an information acquisition unit 130, an identification An information judging unit 132 , an identification information a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com