Monitoring method and device for dns hijacking

A technology for monitoring information and sending methods, applied in the network field, can solve the problems of inability to detect and reproduce hijacking in time, low efficiency, and high labor costs, and achieve the effect of reducing the difficulty of obtaining evidence, improving efficiency, and reducing labor costs.

Active Publication Date: 2017-06-20
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problems existing in related technologies are: firstly, hijacking cannot be detected and reproduced in a timely and active manner, especially for hijacking with small traffic; secondly, the labor cost is high and the efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring method and device for dns hijacking
  • Monitoring method and device for dns hijacking
  • Monitoring method and device for dns hijacking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0031] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance. In the description of the present invention, it should be noted that unless otherwise specified and limited, the terms "connected" and "connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a monitoring method and device for DNS hijacking. Wherein the method includes: sending a monitoring task to the client, so that the client starts the browser to open the webpage indicated by the predetermined URL information after determining to execute the monitoring task, and obtains the monitoring information during the process of opening the webpage; Monitoring information; determine whether DNS hijacking occurs on the client according to the monitoring information. The method of the embodiment of the present invention can promptly and proactively discover the DNS hijacking problem, and can reproduce the corresponding DNS hijacking in a timely and effective manner, reducing labor costs and improving efficiency.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method and device for monitoring DNS hijacking. Background technique [0002] At present, it is becoming more and more common for users to access the Internet, for example, visit websites, forums, post bars, search engines, and the like. However, when users visit websites, forums, post bars, search engines, etc., they are likely to be hijacked by operators, rogue software, etc., resulting in problems such as inaccessibility of corresponding web pages and tampering of page elements. [0003] In order to solve the above problems, in related technologies, operators of websites, forums, post bars, search engines, etc. usually rely on user feedback information from forums, communities, and other public platforms to contact users to reproduce the hijacking phenomenon, so as to take screenshots to collect evidence. The problems existing in related technologies are: firstly, hijackin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 何海洋
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products