Unlock instant, AI-driven research and patent intelligence for your innovation.

Mimicry DNS defense system communication encryption and decryption method

A defense system and encryption method technology, applied in transmission systems, electrical components, etc., can solve problems affecting the security of the mimic DNS defense system, and achieve the effect of increasing security and dynamics

Active Publication Date: 2021-05-04
BEIJING RUNSTONE TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] When the management module communicates with different components, the plaintext communication method may be used to intercept the communication message on the network link by a "well-disguised" attack device. By extracting the key fields of the communication message, it is disguised as the management module and Different components communicate, affecting the security of the mimic DNS defense system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry DNS defense system communication encryption and decryption method
  • Mimicry DNS defense system communication encryption and decryption method
  • Mimicry DNS defense system communication encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0051] In addition, the steps shown in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, the sequence may be different. The steps shown or described are performed in the order herein.

[0052] The present invention provides a kind of mimic DNS defense system com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mimicry DNS defense system communication encryption and decryption method, and the encryption method comprises the steps: 1) sequentially obtaining DNS analysis operation states counted by all heterogeneous parts, the DNS analysis operation states comprising the number of processed DNS requests and statistical time; 2) according to the processing DNS request quantity recorded by each heterogeneous parts and a difference value between the current time and the statistical time, generating an identity ID of the heterogeneous parts; (3) generating a secret key according to the identity IDs of the heterogeneous parts; and 4) after informing the heterogeneous parts of the key, encrypting the message by using the key and then sending the encrypted message to the heterogeneous parts.

Description

technical field [0001] The invention belongs to a communication encryption and decryption method of a mimic DNS defense system. Background technique [0002] DNS is the "brain" of network information interaction and an important condition for accessing Internet portals. Its development history and direction are the epitome of Internet development, and it is also the key point and commanding height of cyberspace offensive and defensive confrontation. As a device that provides open DNS resolution services, the huge domain name database information is easy to become the target of malicious attackers in a complex network environment. Once the attacker controls the DNS device and steals and tampers with data, it can paralyze the network on a large scale and seriously damage the Internet security. [0003] The mimic DNS defense system introduces multiple heterogeneous redundant executives into its architecture, and optimizes the domain name database information maintained by each...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/062
Inventor 张若鸿孙萍贺磊张伟丽宋强王大深李子田
Owner BEIJING RUNSTONE TECH