DNS tunnel detection method and device

A technology of DNS tunneling and DNS data packets, applied in the Internet field, can solve problems such as uncontrollability, low false positives and high false negatives, and difficulty in distinguishing DNS tunnel data, so as to enhance the protection ability and solve the problem of false positives

Active Publication Date: 2013-09-25
SANGFOR TECH INC
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. Anti-dumping based on port blocking: This is the most commonly used method for traditional firewalls to defend against attacks. Firewalls block DNS tunnel data by blocking port 53 to achieve the purpose of preventing DNS tunnel penetration. However, in this way, when blocking DNS tunnel data At the same time, the normal DNS data is also blocked, which affects the normal business;
[0004] 2. Statistical analysis method based on request domain name length and request frequency: With this method, the DNS domain name requested by the client whose length is greater than the length threshold is recorded in the form of , and then the statistics of frequency. When the frequency is greater than the frequency alarm threshold, it is determined that the client uses DNS tunneling technology. However, it is difficult to accurately distinguish DNS tunneling data from normal DNS request data, because in normal DNS requests It is also possible to store a domain name with a very long length. It is difficult to grasp the value of the domain name length threshold and the frequency alarm threshold. Misjudgment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DNS tunnel detection method and device
  • DNS tunnel detection method and device
  • DNS tunnel detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0042] The invention provides a method for DNS tunnel detection.

[0043] Reference figure 1 , figure 1 It is a schematic flowchart of the first embodiment of the DNS tunnel detection method of the present invention.

[0044] The DNS tunnel detection method provided in this embodiment includes:

[0045] Step S10, detecting whether the client data packet sent to the port of the DNS server is a DNS data packet, if yes, proceed to step S20;

[0046] Step S20, detecting whether the format of the client data packet meets the preset format constraint conditions, and if so, execute step S21;

[0047] Step S21, detecting whether the query domain name of the client data packet meets the preset domain name constraint condition; when the format of the client data packet does not meet the format constraint condition, and / or when the q...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a DNS tunnel detection method. The DNS tunnel detection method includes the steps that whether a client side data package sent to a port of a DNS server is a DNS data package is detected; when the client side data package is the DNS data package, whether the format of the client side data package accords with preset format constraint conditions is detected, and if the detected result is yes, whether the query domain name of the client side data package accords with preset domain name constraint conditions is detected; when the format of the client side data package does not accord with the format constraint conditions, and / or the query domain name of the client side data package does not accord with the domain name constraint conditions, the client side data package is correspondingly processed according to preset DNS tunnel processing rules. The invention further discloses a corresponding DNS tunnel detection device. By means of the scheme of the DNS tunnel detection method and device, the normal DNS data package and a DNS tunnel data package can be distinguished, the problem of erroneous judgment of a normal DNS is effectively solved, a DNS tunnel is detected comprehensively, and therefore a firewall is effectively protected.

Description

Technical field [0001] The present invention relates to the field of Internet technology, in particular to a method and device for DNS tunnel detection. Background technique [0002] With the rapid development of the Internet, firewalls, as a barrier to protect information, have become an important field of communication technology research. Nowadays, there are some firewall penetration technologies on the Internet, which can allow data packets to pass through the network layer safely. DNS tunnel technology is one of the firewall penetration technologies. At present, there are two main methods of defending DNS tunnel technology: [0003] 1. Anti-unloading based on port blocking: This is the most commonly used method for traditional firewalls to defend against attacks. The firewall blocks DNS tunnel data by blocking port 53 to achieve the purpose of preventing DNS tunnel penetration. However, in this way, it is blocking DNS tunnel data At the same time, normal DNS data was also bl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06H04L29/12
Inventor 侯青青
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products