Domain name hijacking defense method and device, computer device and storage medium

A domain name hijacking and domain name technology, applied in the field of computer networks, can solve problems such as network security threats, achieve the effect of defending against domain name hijacking and improving security

Active Publication Date: 2019-08-09
SHENZHEN ONETHING TECH CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The defense method of the existing DNS hijacking is a passive defense method. With this method, when it is detected that a domain name resolution request is hijacked, th...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Domain name hijacking defense method and device, computer device and storage medium
  • Domain name hijacking defense method and device, computer device and storage medium
  • Domain name hijacking defense method and device, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] figure 1 It is a flow chart of the domain name hijacking defense method provided by the embodiment of the present invention. The domain name hijacking defense method is applied to computer devices to defend against domain name hijacking and improve network security.

[0070] Referring to 1, the domain name hijacking defense method specifically includes the following steps:

[0071] S101. Send a DNS detection request to a standard DNS (Domain Name System, Domain Name System) server.

[0072] A DNS detection request may be sent to a standard DNS server through a standard DNS client in the computer device. The standard DNS client is built into the operating system of the computer device. The standard DNS client provides standard DNS services for the computer device based on the standard DNS protocol (RFC1035).

[0073] A DNS server list may be stored in the computer device, and the DNS server list may include one or more DNS servers. The DNS server list may be read, a...

Embodiment 2

[0118] figure 2 The structural diagram of a preferred embodiment of the domain name hijacking defense device provided by the embodiment of the present invention. The domain name hijacking defense device 10 is applied to computer devices to defend against domain name hijacking and improve network security.

[0119] Such as figure 2 As shown, the domain name hijacking defense device 10 may include: a first sending unit 201 , a judging unit 202 , a second sending unit 203 , and a converting unit 204 .

[0120] The first sending unit 201 is configured to send a DNS detection request to a standard DNS server.

[0121] A DNS detection request may be sent to a standard DNS server through a standard DNS client in the computer device. The standard DNS client is built into the operating system of the computer device. The standard DNS client provides standard DNS services for the computer device based on the standard DNS protocol (RFC1035).

[0122] A DNS server list may be stored i...

Embodiment 3

[0167] This embodiment provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium. When the computer program is executed by a processor, the steps in the above-mentioned domain name hijacking defense method embodiments are implemented, for example figure 1 S101-S104 shown:

[0168] S101, sending a DNS detection request to a standard DNS server;

[0169] S102. Determine whether DNS hijacking occurs according to the DNS detection response returned by the standard DNS server in response to the DNS detection request;

[0170] S103. If DNS hijacking occurs, encrypt the standard DNS query request to obtain an encrypted DNS query request, and send the encrypted DNS query request to an encrypted DNS server;

[0171] S104. Convert the encrypted DNS query response returned by the encrypted DNS server in response to the encrypted DNS query request into a standard DNS query response.

[0172] Alternatively, when the computer pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a domain name hijacking defense method. The domain name hijacking defense method comprises the following steps of sending a DNS detection request to a standard DNS server; judging whether the DNS hijacking occurs or not according to a DNS detection response returned by the standard DNS server in response to the DNS detection request; if the DNS hijacking occurs, encrypting the standard DNS query request to obtain an encrypted DNS query request, and sending the encrypted DNS query request to an encrypted DNS server; and converting the encrypted DNS query response returnedby the encrypted DNS server in response to the encrypted DNS query request into a standard DNS query response. The invention further provides a domain name hijacking defense device, a computer deviceand a computer readable storage medium. According to the present invention, the domain name hijacking can be defended, and the network security is improved.

Description

technical field [0001] The present invention relates to the technical field of computer networks, in particular to a domain name hijacking defense method and device, a computer device and a computer-readable storage medium. Background technique [0002] The Domain Name System (Domain Name System, DNS) is used to map domain names to IP (Internet Protocol, Internet Protocol) addresses, so that users can access the network conveniently. The security of DNS plays a pivotal role in network security, so it has become a hot target of network attacks, and one of the common ways of network attacks is DNS hijacking. DNS hijacking, also known as domain name hijacking, refers to intercepting domain name resolution requests within the scope of the hijacked network, analyzing the requested domain names, and releasing requests outside the preset domain name list; if the domain name of the analysis request is in the preset domain name list, then according to The domain name returns a fake ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1466H04L63/045H04L61/4511
Inventor 熊第彬
Owner SHENZHEN ONETHING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products