Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Methods for cleaning equipment, detecting equipment, routing equipment and preventing dns attacks

A technology for cleaning and detecting equipment, which is applied in the field of network security, and can solve problems such as packet leakage, low proportion of attack traffic, and DNSReply messages being killed by mistake

Active Publication Date: 2019-05-24
BEIJING LANYUN TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the cleaning device deployed in the bypass above uses the method of determining whether to send the received DNS Reply message to the intranet user. When the domain name in the normal DNS Reply message belongs to the top N domain names or the normal DNS Reply message If the source IP address in the domain name is not in the whitelist, it will lead to false killing of normal DNS Reply packets, and if the attack contains many domain names, since the proportion of attack traffic for each domain name is not high, a large number of domain names will be generated. The problem of packet leakage, so there are a lot of packet leakage and manslaughter problems in the process of defending against DNS reflection attacks. How to solve this problem has become a problem that needs to be solved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods for cleaning equipment, detecting equipment, routing equipment and preventing dns attacks
  • Methods for cleaning equipment, detecting equipment, routing equipment and preventing dns attacks
  • Methods for cleaning equipment, detecting equipment, routing equipment and preventing dns attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0090] image 3 A schematic diagram of the system composition architecture for preventing DNS attacks in the present invention, such as image 3 As shown, the routing device is connected to the internal network host, the routing device is connected to the external network host, the routing device is directly connected to the cleaning device, and the routing device is directly connected to the detection device, wherein the cleaning device and the detection device can communicate. The following will combine image 3 The cleaning equipment, testing equipment and routing equipm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This paper discloses a method for cleaning equipment, detecting equipment, routing equipment and preventing DNS attacks. message; according to one or more received synchronous messages, create the first session table that contains one or more sessions; Whether the text hits the session in the first session table; when it is judged that the DNS Reply message received hits the session in the first session table, the DNS Reply message is forwarded to the routing device; when it is judged that the DNS Reply message received When the packet does not match the session in the first session table, the DNS Reply packet is discarded. The embodiment of the present invention reduces a large number of missing packets and false killings in the process of defending against DNS response flooding attacks.

Description

technical field [0001] Embodiments of the present invention relate to but are not limited to network security technology, especially a cleaning device, a detection device, a routing device and a method for preventing domain name system (DNS, Domain Name System) attacks. Background technique [0002] DNS response flooding (Reply Flood) attack has become the mainstream distributed denial of service (DDoS, Distributed Denial of service) attack type in the network. The DNS attack directly launched by the botnet is a reflective DNS attack formed by the rebound of many open DNS servers in the Internet (such as figure 1 shown). Among them, due to the characteristics of easy implementation, large traffic, and difficult to track, reflective DNS attacks have become the preferred attack method for launching large-traffic attacks, which has brought great harm to user services and their networks. [0003] Therefore, an effective method is needed to defend and clean DNS Reply Flood atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1458H04L61/4511
Inventor 肖洪亮
Owner BEIJING LANYUN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products