Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

DNS hijacking defense method and apparatus

A target and domain name technology, applied in the Internet field, can solve problems such as affecting the normal operation of Internet business, achieve the effect of safe use and avoid being hijacked

Active Publication Date: 2018-07-13
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] DNS server is a key basic service of the Internet. Once DNS hijacking occurs, it will affect the normal operation of most Internet services.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DNS hijacking defense method and apparatus
  • DNS hijacking defense method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] figure 1 It is a flowchart of steps of a DNS hijacking defense method provided by an embodiment of the present invention.

[0038] refer to figure 1 As shown, the DNS hijacking defense method provided in this embodiment is applied to the DNS system to prevent DNS hijacking. The defense method includes the following steps:

[0039] S101: Collect DNS information of the set target domain name in the whole region.

[0040] This embodiment is aimed at the hijacking defense of the domain name within the predetermined range, and the domain name within the predetermined range is the target domain name here. Since the method in this embodiment is applied to the DNS system, the whole area here refers to the network area served by the corresponding DNS system. The DNS information refers to the IP address corresponding to the corresponding domain name.

[0041] S102: Determine whether the target domain name has been hijacked according to the DNS information.

[0042] After col...

Embodiment 2

[0052] figure 2 It is a structural block diagram of a DNS hijacking defense device provided by an embodiment of the present invention.

[0053] refer to figure 2 As shown, the DNS hijacking defense device provided in this embodiment is applied to the DNS system to prevent DNS hijacking, and the defense device includes a defense client 10 and a defense server.

[0054] The defense client is used to collect the DNS information of the set target domain name in the whole area, and send the collected DNS information to the defense server.

[0055] This embodiment is aimed at the hijacking defense of the domain name within the predetermined range, and the domain name within the predetermined range is the target domain name here. Since the method in this embodiment is applied to the DNS system, the whole area here refers to the network area served by the corresponding DNS system. The DNS information refers to the IP address corresponding to the corresponding domain name.

[0056]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a DNS hijacking defense method and apparatus. The method and apparatus are applied to a DNS system, and the method specifically comprises the following steps:collecting DNS information of a set target domain name in the whole area; judging whether the target domain name is hijacked according to the DNS information; and returning correct DNS resolution information according to whether the target domain name is hijacked. Through the above operations, a DNS request of a user can be prevented from being hijacked, so that the user can securely use the Internet.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a DNS hijacking defense method and device. Background technique [0002] DNS hijacking, also known as domain name hijacking, refers to intercepting domain name resolution requests within the scope of the hijacked network, analyzing the requested domain name, and releasing the request outside the scope of review, otherwise returning a fake IP address, or doing nothing so that the request is lost Responses, the effect of which is to make a particular network unresponsive or to make users visit fake URLs. [0003] As a key basic service of the Internet, the DNS server will affect the normal operation of most Internet services once DNS hijacking occurs. Therefore, DNS hijacking has become one of the main problems affecting network security, and the analysis and research on DNS hijacking defense technology seems to be widely concerned. Contents of the invention [0004] In vi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1466H04L61/4511
Inventor 陈归
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products