Gateway and method for phishing defense

A technology for phishing and phishing websites, which is applied in the field of gateways to defend against phishing, and can solve problems such as inability to defend against phishing

Inactive Publication Date: 2012-10-31
AMBIT MICROSYSTEMS (SHANGHAI) LTD
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, even if the domain name request entered by the user is correct, in the case that the computer is hacked, the existing methods for preventing phishing cannot prevent phishing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Gateway and method for phishing defense
  • Gateway and method for phishing defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Please refer to figure 1 The anti-phishing system 100 of the present invention includes a gateway 10 and a client 20 connected to the gateway 10, a domain name system (Domain Name System, DNS) server 30 and a centralized anti-phishing server (Centralized Anti-phishing Server, CAS) 40. The DNS server 30 is used to convert the domain name request sent by the client 20 into an IP address, and then feeds back the IP address to the gateway 10, and according to the request of the gateway 10, sends the fully qualified domain name (Fully Qualified Domain Name, FQDN) to the gateway 10. The CAS40 can judge whether the website that the user terminal 20 will visit is a phishing website according to the FQDN input by the user terminal 20 .

[0013] The gateway 10 stores a DNS table and a phishing website IP address table. The DNS table records the IP address obtained by DNS server 30 performing domain name resolution according to the domain name request sent by client 20 . The IP...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a gateway and method for phishing defense. The method is applied to the gateway, and the gateway implements the following steps: when an IP (internet protocol) address obtained by the gateway after a domain name request is transmitted by a client does not exist in a DNS (domain name service) list and a phishing website IP address list, the IP address is transmitted to a DNS server for requesting the DNS server to transmit an FQDN (fully qualified domain name) corresponding to the IP address to the gateway, the IP address obtained by the DNS server through domain name resolution according to the domain name request transmitted by the client is recorded in the DNS list, and the IP address of at least one phishing website is recorded in the phishing website IP address list; and the gateway requests to centralize anti-phishing websites and judges whether the FQDN corresponding to the IP address is the phishing website or not, and when the FQDN corresponding to the IP address is not the phishing website, the gateway is used for controlling the client to perform network access through the IP address. The gateway can realize phishing defense by judging whether the IP address is the correct IP address, and further solve the problem that the phishing defense can not be realized through an existing centralized anti-phishing system when the client is attacked by a hacker in the prior art.

Description

technical field [0001] The invention relates to a gateway and method for defending against phishing. Background technique [0002] Phishing (Phishing) is a common method used by criminals to defraud users of secret information (such as bank card numbers and passwords, e-mail passwords, etc.) through the Internet. An existing method for defending against phishing is to inquire whether the website that the user wants to visit is a phishing website in a CAS (Centralized Anti-phishing Server, CAS). CAS judges whether the visited website is a phishing website based on the official domain name (Fully Qualified Domain Name, FQDN). When the user's computer is attacked by hackers, although the domain name request entered by the user is legal, the user's computer will not send a DNS request to the DNS server to request the DNS server to resolve the input domain name request into the correct IP address. The DNS server resolves the domain name request entered by the user into a wrong ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/66H04L29/06
Inventor 江佳炼郑祺文
Owner AMBIT MICROSYSTEMS (SHANGHAI) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products