Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, device, equipment and medium for detecting a lost host

A detection method and host technology, applied in the field of network security, can solve problems such as low applicability, affecting business experience, and consuming DNS server performance.

Active Publication Date: 2022-08-09
SANGFOR TECH INC
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the general network architecture internally uses one or more DNS servers to forward the DNS requests of the intranet hosts, and when the DNS server forwards the DNS requests of the intranet hosts, it will send the source IP (Internet Protocol, Internet Protocol) address to the DNS server's own IP address, which will cause the network security device to mistakenly detect that the compromised host is the DNS server
[0003] In view of the above problems, the current solutions mainly include the following. One is to copy the original DNS traffic to the network security device by implanting a proxy in the DNS server, but this will consume the performance of the DNS server, and the DNS server will cause insufficient performance due to Forwarding delay and affecting business experience; the second is to modify the DNS server, install a device that can collect DNS request logs, and forward the logs to network security devices, but many DNS server configurations do not support recording the real request source IP in the logs, so The applicability of this method will be low, and it may not be applicable to the DNS server environment after transformation, that is, there will be compatibility risks, which may easily cause risks such as DNS server downtime, resulting in unavailable services and affecting the normal Internet access of the intranet; the third is to transform the network. Mirror the traffic to the network security device before the DNS request reaches the DNS server
However, in this way, if the intranet network structure is large or the partitions and domains are finely divided, multiple traffic mirroring devices are required, and the cost will be high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device, equipment and medium for detecting a lost host
  • A method, device, equipment and medium for detecting a lost host
  • A method, device, equipment and medium for detecting a lost host

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of this application.

[0066] see figure 1 As shown, it is a schematic diagram of a general enterprise intranet network design. The general enterprise intranet network design generally deploys one or more DNS servers to undertake and forward DNS requests from all hosts on the intranet, rather than allowing all hosts to directly request the external network, so as to better control the internal and external network. . In this way, when the compromised host requests malicio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a method, device, equipment and medium for detecting a lost host. The method includes: extracting target information in the DNS traffic request when threat information exists in the monitored DNS traffic request; using a preset The tracking IP address in the IP address of the network segment and the target information construct a DNS reply message corresponding to the DNS traffic request and return the DNS reply message in the same way; The notification information of the tracking IP address, so that the terminal security application management platform sends the tracking IP address to the target terminal, and determines the lost host according to the query result fed back by the target terminal. In this way, the lost host can be detected without affecting the performance of DNS, so there will be no forwarding delay and impact on service experience, and the applicability is high and the cost is low.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular, to a method, apparatus, device and medium for detecting a lost host. Background technique [0002] More and more network security devices, such as situational awareness and next-generation firewalls, have added threat intelligence to detect whether there is traffic accessing the address of external malicious threat servers, so as to discover the compromised host of the intranet. Among them, the most used threat intelligence is DNS (Domain Name Server, domain name server) intelligence, which detects threats by collecting DNS protocol traffic. However, due to the general network architecture, one or more DNS servers are used to forward the DNS requests of the intranet hosts, and when the DNS server forwards the DNS requests of the intranet hosts, it will send the source IP (Internet Protocol, Internet Protocol) address to the DNS server's own IP address, which...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L61/4511
CPCH04L63/1425H04L61/4511
Inventor 吕晓滨
Owner SANGFOR TECH INC