Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A defense method and device for dns hijacking

A technology of DNS server and defense system, applied in the field of network security

Active Publication Date: 2021-06-08
武汉思普崚技术有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a DNS hijacking defense method and device to solve the problem that the existing DNS hijacking defense methods cannot avoid receiving IP addresses of phishing websites

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A defense method and device for dns hijacking
  • A defense method and device for dns hijacking
  • A defense method and device for dns hijacking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the above objects, features and advantages of the present application more obvious and understandable, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0048] refer to figure 1 , which shows a schematic workflow diagram of a DNS hijacking defense method provided in the embodiment of the present application, which may specifically include the following steps:

[0049] Step 101 , the defense system acquires each historical response message generated by the DNS server according to a preset number of historical domain name resolution requests at a preset time interval.

[0050] In the defense method against DNS hijacking provided by the embodiment of the present application, the defense system is set between the client and the DNS server. The domain name resolution request of the target host domain name, after the DNS server receives the domain name resolu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application discloses a DNS hijacking defense method and device, wherein the method includes: the defense system obtains each historical response message generated by the DNS server according to a preset number of historical domain name resolution requests according to a preset time interval ; After receiving the current response message generated according to the current domain name resolution request, compare the current return path contained in the current response message with the historical return paths contained in each historical response message; if the current return path Different from each historical return path, compare whether the IP address of the target host in the current response message is the same as the IP address of the target host in the trusted response message; if they are different, feed the trusted response message back to the client. The aforementioned method or device can solve the problem that the existing DNS hijacking defense method cannot avoid receiving the IP address of the phishing website, thereby improving the security of the network.

Description

technical field [0001] The present application relates to the field of network security, in particular to a defense method and device for DNS hijacking. Background technique [0002] The Domain Name System (DNS) is used to provide basic services for network services by mapping network domain names to network IP addresses. The security of DNS plays a pivotal role in network security, so it has become a hot target of network attacks, and one of the common ways of network attacks is DNS hijacking. DNS hijacking is domain name hijacking. In DNS hijacking, fake DNS server is a main attack method. For example, after an attacker builds a fake DNS server, the fake DNS server hijacks the domain name resolution request sent by the client to the DNS server, and sends the phishing website The IP address is returned to the client for spoofing. [0003] To improve DNS security, defense against DNS hijacking is required. In the existing defense method for DNS hijacking, after the client...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L61/103H04L63/1466H04L61/4511
Inventor 曾祥禄
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products