Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

DNS query method based on anonymous network

A DNS query and anonymous network technology, applied in the field of computer software security testing, can solve problems such as large-scale network paralysis and inability to provide normal services, so as to improve security, resist DNS domain name hijacking attacks, and ensure user experience.

Inactive Publication Date: 2014-05-28
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF7 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] This invention patent is used to solve the problem in the prior art that when the DNS server is attacked, it is easy to cause it to fail to provide normal services, thus causing a large-scale network paralysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DNS query method based on anonymous network
  • DNS query method based on anonymous network
  • DNS query method based on anonymous network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0087] Proxy-based anonymous network DNS query, the network architecture diagram is as follows figure 2 shown.

[0088] At the beginning, the user initiates a normal DNS query request, through the firewall rules: all data packets with the destination port 53 and the protocol as UDP are redirected to the DNS anonymous query client port.

[0089] Step 1: After the anonymous query client receives the user query request, it first checks whether the result already exists in the DNS cache, and if it exists, go to step 8. If not, go to step 2.

[0090] Step 2: To query the client anonymously through DNS, first change the initial destination IP address of the data packet to the IP address of the third-party trusted agent. Then, the public key of the third-party trusted agent is used to encrypt the DNS query message and send it to the third-party trusted agent.

[0091] Step 3: The third-party trusted agent uses the private key to decrypt and restore the received query.

[0092] S...

Embodiment 2

[0098] Anonymous network DNS query based on anonymous chain, the network architecture diagram is as follows Figure 4 shown.

[0099]At the beginning, the user initiates a normal DNS query request, through the firewall rules: all data packets with the destination port 53 and the protocol as UDP are redirected to the DNS anonymous query client port. Then, set the maximum number of forwarding times N.

[0100] Step 1: After the anonymous query client receives the user query request, it first checks whether the result already exists in the DNS cache, and if it exists, go to step 9. If not present, initialize the structure as Figure 5 shown in the anonymous DNS query packet, and then go to step 2.

[0101] Step 2: The node performs next-hop relay route selection according to the node information received from the relay directory node in advance (the route selection algorithm can be performed according to the delay to the next-hop relay), and then changes the destination IP add...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a DNS query method based on an anonymous network, is mainly to solve the problem of privacy disclosure in the conventional DNS query, and belongs to the field of computer software safety testing. The DNS query method based on the anonymous network is characterized in that the DNS query method comprises the following steps: the step 1: a DNS anonymous client simply expresses a DNS query message formed by a query Q1 and a user IP address IP1 to be <Q1, IP1>; the step 2: encryption data processing is carried out on the DNS query message, the processing process comprising substituting a target IP address and a target port number and data encryption; the step 3: after the original DNS query message of the user is subjected to the anonymous network, the DNS query message is turned into <Q1, IP2> finally, wherein the IP2 is an IP address of a non-original user in an anonymous set, that is, the IP address of an exit node; and the step 4: a DNS response message returns to the DNS anonymous client after being subjected to the anonymous network. Through the above steps, the user can finish DNS anonymous query once.

Description

technical field [0001] The DNS query method based on the anonymous network proposed by the invention solves the existing DNS query privacy leakage problem and belongs to the field of computer software safety testing. Background technique [0002] As we all know, the network has become an indispensable part of people's daily life. Information security and personal privacy protection on the network have received more and more attention. Anonymous network has become an important and effective means to protect user privacy on the Internet. It prevents information leakage, traffic analysis and user identity feature analysis from the network communication level to protect the communication relationship between the two parties. So far, the industry has successfully designed a variety of anonymous networks such as Crowds, Tor, Anonymizer and so on. [0003] Some basic methods to realize the anonymous network are: (1) agency method. The proxy mechanism is an important means to rea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/12H04L29/06
Inventor 卓中流张小松牛伟纳陈瑞东王东柯明敏杨高明张艺峰
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products