A defense method and device for dns hijacking
A technology of DNS server and defense system, applied in the field of network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] In order to make the above objects, features and advantages of the present application more obvious and understandable, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.
[0048] refer to figure 1 , which shows a schematic workflow diagram of a DNS hijacking defense method provided in the embodiment of the present application, which may specifically include the following steps:
[0049] Step 101 , the defense system acquires each historical response message generated by the DNS server according to a preset number of historical domain name resolution requests at a preset time interval.
[0050] In the defense method against DNS hijacking provided by the embodiment of the present application, the defense system is set between the client and the DNS server. The domain name resolution request of the target host domain name, after the DNS server receives the domain name resolu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com