Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Detection method and system for target domain name hijacking

A target and domain name technology, which is applied in the field of network information security, can solve the problems of being unable to detect whether there is DNS hijacking behavior in the domain name, unable to perceive the service quality of the domain name website, etc., and achieve the effect of accurate judgment results

Inactive Publication Date: 2017-09-05
ALIBABA (CHINA) CO LTD
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After this kind of enterprise downloads and hosts its software products to a third-party service provider, the domain name of the enterprise is often connected to the domain name of the third-party service provider in the form of CNAME. The enterprise cannot perceive the service quality provided by its domain name website. When the client reports that there is an abnormality in accessing the website that provides APP product downloads, the company cannot detect whether the domain name accessed by the client has DNS hijacking behavior using the existing domain name hijacking method.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method and system for target domain name hijacking
  • Detection method and system for target domain name hijacking
  • Detection method and system for target domain name hijacking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in combination with the embodiments of the present invention and the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0043] The technical solutions of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a detection method and system for target domain name hijacking. The method comprises the steps that a server side adopts a mode of sending a domain name analysis request to an authority DNS server of the target domain name and receiving at least one analysis result of the target domain name returned by the authority DNS server to establish a standard analysis result list; the server side allocates the domain name to multiple specific client sides to execute a target domain name analysis probing task, and each client side sends the received target domain name to an LDNS server configured for the client side to request domain name analysis and reports the received analysis result to the server side; the server compares each received analysis result which is adopted as a probing task with a standard analysis result recorded by the standard analysis result list, and therefore whether a hijacking behavior exists in the LDNS server configured for the server side or not is determined.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a detection method and system for target domain name hijacking. Background technique [0002] With the development of the Internet industry, the Internet has become a part of people's lives, such as shopping, watching movies, reading news, publishing literary works, etc. through the Internet. When people use the Internet, they first need to log in to a certain website domain name to enter the place they want to go, such as logging in to Taobao to go shopping, logging to Sina.com to watch news, and so on. The Internet has brought great convenience to people's lives, but at the same time, network information security has increasingly become a serious problem that affects users' online experience. [0003] Domain name hijacking is one of many problems of network information security. Domain name hijacking is a way of Internet attack. By attacking the domain name system ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12
CPCH04L61/10H04L63/1416H04L63/1466H04L61/4511
Inventor 何琦李剑
Owner ALIBABA (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products