A method, device, equipment and medium for detecting a lost host
A detection method and host technology, applied in the field of network security, can solve problems such as low applicability, affecting business experience, and consuming DNS server performance.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of this application.
[0066] see figure 1 As shown, it is a schematic diagram of a general enterprise intranet network design. The general enterprise intranet network design generally deploys one or more DNS servers to undertake and forward DNS requests from all hosts on the intranet, rather than allowing all hosts to directly request the external network, so as to better control the internal and external network. . In this way, when the compromised host requests malicio...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


