Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

DNS (Domain Name System) hijacking defending method and device

A technology of DNS server and defense system, applied in the field of network security

Active Publication Date: 2019-03-01
武汉思普崚技术有限公司
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a DNS hijacking defense method and device to solve the problem that the existing DNS hijacking defense methods cannot avoid receiving IP addresses of phishing websites

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DNS (Domain Name System) hijacking defending method and device
  • DNS (Domain Name System) hijacking defending method and device
  • DNS (Domain Name System) hijacking defending method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0048] refer to figure 1 , which shows a schematic workflow diagram of a DNS hijacking defense method provided in the embodiment of the present application, which may specifically include the following steps:

[0049] Step 101 , the defense system acquires each historical response message generated by the DNS server according to a preset number of historical domain name resolution requests at a preset time interval.

[0050] In the defense method against DNS hijacking provided by the embodiment of the present application, the defense system is set between the client and the DNS server. The domain name resolution request of the target host domain name, after the DNS server receives the domain name resolu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a DNS (Domain Name System) hijacking defending method and device. The method comprises the following steps: acquiring history response messages generated by aDNS server according to a preset number of history domain name resolution requests based on a preset time interval through a defending system; after a current response message generated according toa current domain name resolution request is received, comparing a current return path included in the current response message with history return paths included in the history response messages; if the current return path is different from the history return paths, comparing whether an IP address of a target host in the current response message is the same as an IP address of a target host in a credible response message or not; and if not, feeding back the credible response message to a client. Through adoption of the method and the device, the problem of incapability of avoiding receiving phishing site IP addresses in an existing DNS hijacking defending method can be solved, thereby improving the network security.

Description

technical field [0001] The present application relates to the field of network security, in particular to a defense method and device for DNS hijacking. Background technique [0002] The Domain Name System (DNS) is used to provide basic services for network services by mapping network domain names to network IP addresses. The security of DNS plays a pivotal role in network security, so it has become a hot target of network attacks, and one of the common ways of network attacks is DNS hijacking. DNS hijacking is domain name hijacking. In DNS hijacking, fake DNS server is a main attack method. For example, after an attacker builds a fake DNS server, the fake DNS server hijacks the domain name resolution request sent by the client to the DNS server, and sends the phishing website The IP address is returned to the client for spoofing. [0003] To improve DNS security, defense against DNS hijacking is required. In the existing defense method for DNS hijacking, after the client...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12
CPCH04L61/103H04L63/1466H04L61/4511
Inventor 曾祥禄
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products