Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Suspicious domain name detection method and system

A domain name detection and domain name technology, applied in the transmission system, electrical components, etc., can solve the problems of high computer resource consumption, difficulty in automatically updating suspicious domain names, intercepting suspicious domain names, inability to audit and monitor DNS messages, etc., and achieve the effect of double verification

Active Publication Date: 2020-04-10
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, in the sniffing technology, sniffing tools such as network packet analysis software (Wireshark), Winpcap, and SRSniffer all have powerful protocol analysis functions, but these sniffing tools are only used as network packet analysis software, and cannot analyze DNS packets. Audit monitoring
Moreover, these sniffing tools usually analyze each protocol field in the DNS message one by one, which is easy to cause a large consumption of computer resources, and in a large network environment, packet loss or crashes may also occur
The analysis and restoration technology only audits the DNS data, and cannot control the illegal activities on the network in a timely and effective manner.
[0005] The suspicious domain name interception system existing in the prior art, for example, the suspicious domain name interception system based on domain name redirection, processes the DNS domain name request packets flowing through the network, forges the response packet, and redirects the DNS domain name to the destination IP addresses, so as to block certain domain names, but the system cannot automatically update suspicious domain names in real time.
[0006] Therefore, the existing monitoring and blocking technologies for suspicious domain names are relatively simple in the analysis method of DNS domain names, and it is difficult to automatically update suspicious domain names in real time and block suspicious domain names in a timely manner.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Suspicious domain name detection method and system
  • Suspicious domain name detection method and system
  • Suspicious domain name detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to enable those skilled in the art to better understand the technical solution of the present invention, the suspicious domain name detection method and system provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0048] figure 1 It is a flowchart of a suspicious domain name detection method provided by Embodiment 1 of the present invention. As shown in the figure, the suspicious domain name detection method includes:

[0049] Step 101. Obtain a first DNS data packet, where the first DNS data packet includes user identification information, a domain name, and a first resolution result corresponding to the domain name.

[0050] Step 102, generating the support degree of the domain name according to the domain name and user identification information.

[0051] Step 103 , judging whether the support degree is less than the first set value, if yes, execute step 104 , if not, end the process.

[0052] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a suspicious domain name detection method and system. The suspicious domain name detection method includes: obtaining a first DNS data message, the first DNS data message includes user identification information, a domain name and a first analysis result corresponding to the domain name; generating the support degree of the domain name according to the domain name and the user identification information; judging the support degree is less than the first set value; if it is judged that the support degree is less than the first set value, determine the domain name as the first suspicious domain name; if it is determined that the domain name is the first suspicious domain name, according to the first suspicious domain name corresponding to An analysis result generates the instability of the first analysis result; judge whether the instability is greater than the second set value; if it is determined that the instability is greater than the second set value, determine the first suspicious domain name as the second suspicious domain name . The invention realizes double verification of the domain name, real-time automatic updating of suspicious domain names and timely interception of suspicious domain names.

Description

technical field [0001] The invention relates to the technical field of domain name analysis, in particular to a suspicious domain name detection method and system. Background technique [0002] At present, most of the viruses on the enterprise network enter the enterprise internal network through email or web browsing. Spam and various malicious links often easily cause congestion and paralysis of the enterprise network, and even cause system crashes, resulting in Huge and irreparable loss. Therefore, the security of the enterprise Internet is extremely important to the enterprise. [0003] The Domain Name System (DNS for short) is a set of mapping mechanisms that provide the correspondence between network domain names and IP addresses in the network. The client usually realizes the query from the domain name to the IP address by exchanging DNS query messages and response messages with the server, and most web services also obtain IP addresses through domain name resolutio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1466H04L61/4511
Inventor 任思颖
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products