Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for processing DNS (domain name system) water torture attack based on Spark Streaming

A processing method, water torture technology, applied in the DNS field, can solve problems such as unsatisfactory detection effect and inability to suppress real-time attack requests, and achieve the effect of ensuring security and stability

Inactive Publication Date: 2018-05-15
CHINA INTERNET NETWORK INFORMATION CENTER
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the detection effect of these detection methods is not ideal, and they cannot suppress real-time attack requests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for processing DNS (domain name system) water torture attack based on Spark Streaming
  • Method and system for processing DNS (domain name system) water torture attack based on Spark Streaming
  • Method and system for processing DNS (domain name system) water torture attack based on Spark Streaming

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0047] Such as figure 1 As shown, it is a flow chart of Embodiment 1 of a DNS waterboarding attack processing method based on Spark Streaming disclosed by the present invention, and the method includes:

[0048] S101. Collect a real-time analysis request on the recursive server to be protected, and convert the collected real-time analysis request into a first message;

[0049] When it is necessary to detect whether the DNS is under waterboarding attack, and w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for processing DNS (domain name system) water torture attack based on Spark Streaming. The method comprises the following steps of collecting a real-time analysis request on a to-be-protected recursion server, converting the collected real-time analysis request into first information, extracting features of the first information at preset time intervalbased on Spark Streaming, inputting the extracted features of the first information into a pre-established random forest model, identifying the features of the first information based on the random forest model, identifying the water torture attack request in the real-time analysis request, and adding an address of a client network corresponding to the water torture attack request into a blacklistof a fire wall of the system. The method has the advantages that the water torture attack request can be filtered by layers in the recursion server, and can be prevented from entering the recursion analysis phase, so as to play an important role in ensuring the security and stability of an authority server.

Description

technical field [0001] The invention belongs to the technical field of DNS (Domain Name System, domain name system), and in particular relates to a DNS water torture attack processing method and system based on Spark Streaming. Background technique [0002] The domain name system is the cornerstone of the Internet and is responsible for maintaining the information of hosts in the computer network. The security and availability of the domain name system are of great significance. [0003] Waterboarding attack is a kind of DDoS (Distributed Denial of Service, Distributed Denial of Service) attack against domain name system. In a waterboarding attack, the attacker controls the hosts in the botnet to send a large number of domain name query requests to the target authoritative domain name server. The service is terminated due to a large number of query requests, and the waterboarding attack is successful. [0004] Previous detection methods for waterboarding attacks mainly inc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/101H04L63/1416H04L63/1425H04L63/1458H04L61/4511
Inventor 张跃冬陈立国耿光刚延志伟
Owner CHINA INTERNET NETWORK INFORMATION CENTER
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More