Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for detecting dns spoofing attacks in a wireless local area network

A technology of DNS spoofing and wireless local area network, applied in the field of communication, can solve the problems of DNS security hidden danger, vulnerability to attack, unsound security protection and authentication mechanism, etc., and achieve the effect of wide application

Active Publication Date: 2020-10-16
SHANGHAI LIANSHANG NETWORK TECHNOLOGY CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the flaws in the design of the DNS protocol itself, the security protection and authentication mechanisms are not perfect, resulting in many security risks in the DNS itself, making it vulnerable to attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for detecting dns spoofing attacks in a wireless local area network
  • A method and device for detecting dns spoofing attacks in a wireless local area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The application will be described in further detail below in conjunction with the accompanying drawings.

[0027] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0028] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0029] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The purpose of this application is to provide a method for detecting DNS spoofing attacks in a wireless local area network through a user equipment, the method comprising: obtaining a DNS request data packet about a target website; determining a target IP address for receiving the DNS request data packet, Wherein, the target IP address is different from the IP address of the user equipment and the IP address of the DNS server in the wireless local area network where the user equipment is located; the DNS request packet is sent to the target IP address; according to the The response data packet received by the user equipment determines whether there is a DNS spoofing attack on the wireless local area network. This application can be applied to mobile devices that have not obtained the highest authority, has a wide range of applications, and greatly improves user experience.

Description

technical field [0001] The present application relates to the communication field, in particular to a technique for detecting DNS spoofing attacks in a wireless local area network. Background technique [0002] With the development of wireless communication technology and the popularity of smart phones, people rely more and more on wireless networks in their daily lives. Compared with the connection scenarios of traditional PCs, the mobile environment of wireless networks has changed greatly. Considering that there are many open wireless networks and more devices connected to them, the current security risks of wireless networks are relatively large, and the prevention is relatively difficult. Disaster. DNS (Domain Name System, Domain Name System) is the infrastructure of network applications, and its security has a decisive impact on the security of the Internet. However, due to the flaws in the design of the DNS protocol, the security protection and authentication mechan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04L29/06H04L29/12H04W12/122
CPCH04L63/1483H04W12/12H04L61/4511
Inventor 高迪王震
Owner SHANGHAI LIANSHANG NETWORK TECHNOLOGY CO LTD