Quick positioning processing method and system for malicious domain name request terminal

A technology of request terminal and disposal method, applied in transmission systems, electrical components, etc., can solve the problem of inability to accurately find the infected specific IP, find malicious domain names, etc.

Inactive Publication Date: 2020-10-23
STATE GRID FUJIAN ELECTRIC POWER CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing technology is difficult to quickly find malicious dom

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quick positioning processing method and system for malicious domain name request terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0020] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0021] It should be pointed out that the following detailed description is exemplary and is intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0022] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a quick positioning processing method and system for a malicious domain name request terminal. The method comprises the following steps: S1, establishing a database on a DNS server; S2, acquiring a DNS server log, and extracting a domain name of the DNS server log; S3, if the current domain name is in the white list database, entering the step S6, otherwise, entering the step S4; s4, if the current domain name is in the blacklist database, locating an infected terminal IP corresponding to the domain name, and giving an alarm, otherwise, entering the step S5; s5, if itis judged that the current domain name is a benign domain name, adding the domain name into a white list database, and entering S6; if it is judged that the current domain name is a malicious domain name, adding the domain name into a blacklist database, positioning an infected terminal IP corresponding to the domain name and host user information of the infected terminal IP, and giving an alarm;and S6, deleting the DNS server log. According to the invention, the host IP address accessing the malicious domain name and the host user information thereof can be quickly and accurately positioned.

Description

technical field [0001] The invention relates to the technical field of computer desktop terminal system security, in particular to a method and system for quickly locating and handling a terminal requesting a malicious domain name. Background technique [0002] With the continuous growth of global Internet users and the enrichment of network applications, the technology that threatens network security is also developing continuously. The threats to property safety and privacy security brought by malicious domain name websites to netizens are also increasing rapidly. Increased the cost of network security protection construction. Especially for some large enterprises, the number of desktop terminals is huge. Once the host is infected, because they are in the same local area network, the hosts can be related to each other, and the data can be called at any time. Malicious code will quickly spread among multiple hosts. Infect. [0003] However, it is difficult for existing te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/101H04L63/1441H04L63/1425H04L61/4511
Inventor 张坤三
Owner STATE GRID FUJIAN ELECTRIC POWER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products