CN110247932A - A kind of detection system and method for realizing DNS service defence - Google Patents

A kind of detection system and method for realizing DNS service defence Download PDF

Info

Publication number
CN110247932A
CN110247932A CN201910597175.8A CN201910597175A CN110247932A CN 110247932 A CN110247932 A CN 110247932A CN 201910597175 A CN201910597175 A CN 201910597175A CN 110247932 A CN110247932 A CN 110247932A
Authority
CN
China
Prior art keywords
server
dns
result
parsing
ruling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910597175.8A
Other languages
Chinese (zh)
Inventor
王立俊
贺磊
张若鸿
孙萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING RUNSTONE TECHNOLOGY Co Ltd
Original Assignee
BEIJING RUNSTONE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING RUNSTONE TECHNOLOGY Co Ltd filed Critical BEIJING RUNSTONE TECHNOLOGY Co Ltd
Priority to CN201910597175.8A priority Critical patent/CN110247932A/en
Publication of CN110247932A publication Critical patent/CN110247932A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of detection system and method for realizing DNS service defence, system includes: the DNS recursion resolution server of more isomeries, and above-mentioned DNS recursion resolution server constitutes the server pools that an isomery of equal value executes body together;Above-mentioned execution body can be used as recursion server and can also be used as authorization server, for providing the domain name mapping of local or public internet;DNS distributes ruling server, for receiving the analysis request for analytically server being accelerated to pass over and being distributed to each execution body;The parsing result that the isomery dynamically chosen executes body is collected, and parsing is returned to by algorithm picks one preset most correct result and accelerates server;Parsing accelerates server, for transmitting analysis request and receiving that DNS distribution ruling server transmits as a result, saving that distribution ruling returns as a result, can request return parsing result directly facing user, reduces distribution ruling and calculates pressure.

Description

A kind of detection system and method for realizing DNS service defence
Technical field
The invention belongs to computer field, especially a kind of detection system and method for realizing DNS service defence.
Background technique
With the continuous development of China's Base communication, DNS also increases as internet core infrastructure service software, portfolio It is long swift and violent.Domain Name Service System is converted for realizing the translation of domain names to IP address, is the portal that user enters internet, With protocol open, deployment dispersion, data are huge, are always the main target attacked on internet using extensive feature One of.Frequent for the network attack of DNS Protocol security breaches generation in recent years, caused loss is huge, seriously affects The safety and stabilization of national network development.
In addition to common DNS dos attack on internet, the abduction of domain name data and distorts and be also important attack type. One is acting as fraudulent substitute for a person by domain name, largely invade citizen privacy using fishing website, become offender and implement economic swindleness It deceives and the movable important means such as illegal publicity;Another kind is to implement man-in-the-middle attack using domain name system, can be intercepted and captured any The communication information of government website, Email and commercial affairs social activity etc. can distort control scheduling, financial transaction and logistics transportation etc. The data and software of sensitive industry form and endanger huge cyberspace security risk.
The defect and problems faced of existing DNS recursion resolution system:
(1) DNS Protocol itself is mostly to increase income there are security breaches, the dns resolution software of mainstream, is lacked present in code It falls into and is easier to expose;
(2) since deployment disperses, any dns server generates domain name safety problem, can all have user directly by It influences;
(3) DNS security expands agreement because of the complexity of its management and to the high requirement of network bandwidth, in actual deployment mistake There are certain difficulties in journey, and are readily incorporated the problems such as amplifying type is attacked;
(4) conventional domain name monitoring means can carry out the comparative analysis before and after domain name mapping results change, but be chiefly used in Emphasis domain name, it is difficult to the dynamic implementation within the scope of universe name.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of detection systems and method for realizing DNS service defence, use In solution drawbacks described above of the existing technology.
It is as follows that the present invention solves the technical solution that above-mentioned technical problem is taken:
A kind of detection system for realizing DNS service defence, comprising:
The DNS recursion resolution server of more isomeries, above-mentioned DNS recursion resolution server constitute together one it is of equal value different The server pools of structure execution body;
Above-mentioned execution body can be used as recursion server and can also be used as authorization server, for providing local or public network Domain name mapping;
DNS distributes ruling server, for receiving the analysis request for analytically server being accelerated to pass over and being distributed to Each execution body;
The parsing result that the isomery dynamically chosen executes body is collected, and most just by preset algorithm picks one True result returns to parsing and accelerates server;
Parsing accelerates server, for transmitting analysis request and receiving the result of DNS distribution ruling server transmitting.
Preferably, installed respectively in each DNS recursion resolution server different operating system, dns resolution software or Person's different editions.
Preferably, the server that the isomery executes in the server pools of body can also retain one with all on-line Part is used as standby, in the case where exception occurs in the server of the business of offer, is replaced automatically.
Preferably, the parsing accelerates server to be located at the front end of whole system, plays the role of cache, has There are two layers of operating mode, can be requested with quick response user, reduce parsing time delay, promotes user's perception;
The work load that can reduce distribution ruling server simultaneously is answered in life cycle by data cached It answers.
Preferably, the detection system is based on three-tier switch cooperation and realizes resource isolation, and will be from external use Family service traffics are limited in different VLAN respectively from the distribution ruling flow of inside arbitration;
Wherein, the parsing accelerates between server and DNS distribution ruling server using double on-link mode (OLM)s, the DNS Distribute ruling server and isomery executes and uses private network or connection type trusty between the server pools of body.
A kind of detection method for realizing DNS service defence, comprising:
Building is made of the server pools that isomery executes body the DNS recursion resolution server of more isomeries;
Above-mentioned execution body can be used as recursion server and can also be used as authorization server, for providing local or public network Domain name mapping;
Receive the domain name mapping request for analytically server being accelerated to pass over;
The online situation of server of the server pools of body is executed according to current isomery, is dynamically executed from N platform and is selected M platform in body Execution body, and will request be distributed to them respectively, wherein M <=N;
It obtains above-mentioned isomery and executes the result that body is inquired in local parsing or outside recurrence;
Returning the result for body is executed from M according to what is obtained, is arbitrated using corresponding algorithm, generates one finally As a result, and returning to parsing acceleration server.
Preferably, further includes:
Parsing accelerates server to reply to user terminal for the result that ruling returns is distributed, while result is retained in caching In.
Preferably, further includes: body periodically is executed to each isomery and carries out state-detection, constantly adjusts every execution body Distribution priority, basic principle includes:
It will be rejected from available execution body list completely when its service is unreachable;When some detection cycle finds its service When available, then it is placed back into freelist.
It is not selected after its parsing result is arbitrated, it will be reduced and use weight;
One mesa-shaped state normally executes body since lower weight is after the suspend mode of certain time, will be waken up ginseng With scheduling;
The execution body used for a long time can also be lowered weight after effective time, when exposure to reduce the execution body Between, reduce its traffic load, ensures that executing the balanced of body pond uses.
Preferably, it is arbitrated using corresponding algorithm, generates a final result, above-mentioned algorithm includes:
When the result for executing body return is inconsistent, arbitration unit, which is chosen, there is most results.Usual M value can quilt It is set as odd number, to guarantee to there is result to win in this link;
During carrying out single result relatively, the result of higher weights server is submitted to;
Weight of holding power is identical to be executed under multiple result frequency of occurrence unanimous circumstances that body returns, and random fashion is taken to select One result returns.
Preferably, installed respectively in each DNS recursion resolution server different operating system, dns resolution software or Person's different editions.
This invention takes several threats for after above scheme, coping with domain name system and facing, including deorienting wind Dangerous (such as root name server deletes .cn domain name record), blinding risk (such as root name server is not parsed from China Domain name mapping request) and data tampering risk (such as the Cache Poisoning as caused by unknown loophole and back door and domain name misfortune Hold), which has carrier class domain name service ability and security guarantee.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by written explanation Specifically noted structure is achieved and obtained in book, claims and attached drawing.
Detailed description of the invention
The present invention is described in detail with reference to the accompanying drawing, so that above-mentioned advantage of the invention is definitely.Its In,
Fig. 1 is the structural schematic diagram of the embodiment for the detection system that the present invention realizes DNS service defence.
Fig. 2 is the flow diagram of the embodiment for the detection method that the present invention realizes DNS service defence;
Specific embodiment
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings and examples, how to apply to the present invention whereby Technological means solves technical problem, and the realization process for reaching technical effect can fully understand and implement.It needs to illustrate As long as not constituting conflict, each embodiment in the present invention and each feature in each case study on implementation can be tied mutually It closes, it is within the scope of the present invention to be formed by technical solution.
In addition, step shown in the flowchart of the accompanying drawings can be in the department of computer science of such as a group of computer-executable instructions It is executed in system, although also, logical order is shown in flow charts, and it in some cases, can be to be different from herein Sequence execute shown or described step.
As shown in Figure 1, simple the present invention is directed to establish a nested structure, it is easy to dispose, there is Initiative Defense ability and fault-tolerant The DNS system of ability, improves the robustness of system, evades the risk of Single Point of Faliure, reduces recursive data and is tampered bring shadow It rings, increases the enforcement difficulty and intrusion scene of domain name attack, resist unknown loophole and software back door.
Wherein, DNS recursion resolution server (or authorization server) of the invention by more isomeries of deployment, DNS distribution Ruling server, parsing accelerate server, establish a set of with safety, redundancy, the domain name of isomerism Initiative Defense function Dynamic ruling system.
As shown in Figure 1, a kind of detection system for realizing DNS service defence, comprising:
The DNS recursion resolution server of more isomeries, above-mentioned DNS recursion resolution server constitute together one it is of equal value different The server pools of structure execution body;
Above-mentioned execution body can be used as recursion server and can also be used as authorization server, for providing local or public network Domain name mapping;
DNS distributes ruling server, for receiving the analysis request for analytically server being accelerated to pass over and being distributed to Each execution body;
The parsing result that the isomery dynamically chosen executes body is collected, and most just by preset algorithm picks one True result returns to parsing and accelerates server;
Parsing accelerates server, for transmitting analysis request and receiving the result of DNS distribution ruling server transmitting.
Wherein, the DNS recursion resolution server of the isomery can use different operating system, dns resolution software Or different editions, it forms an isomery of equal value and executes body server pools.
Wherein, above-mentioned isomery execution body, which can be used as recursion server, can also be used as authorization server.
Server in pond can also retain a part as standby, in the server of the business of offer with all on-line In the case where there is exception, replaced automatically.The main function that isomery executes body is to provide the domain name mapping of local or public network, It is the data source in whole system.
The DNS distributes ruling server, is the core component of this system, is located at isomery execution body and parsing accelerates service On the one hand the centre of device receives the analysis request passed over from accelerator and is distributed to each execution body again, on the other hand will move The isomery that state is chosen executes body parsing result and is collected, and is returned to by algorithm picks one preset most correct result Accelerator.Its main function is to carry out dynamic dispatching and result arbitration.
The parsing accelerates server to play the role of cache, two layers of operating mode positioned at the front end of whole system It can be requested with quick response user, reduce parsing time delay, promote user's perception.It can reduce the work of distribution ruling server simultaneously It bears, carries out response by data cached in life cycle.In addition, its superpower processing capacity and effective attack resistance mould The component that formula also can protect rear end is not encroached on by network attack.
In addition, in a preferred embodiment, the present invention realizes resource isolation using three-tier switch cooperation.It will be from outside User traffic from inside arbitration distribution ruling flow be limited in different VLAN respectively.Accelerator and distribution ruling it Between using double on-link mode (OLM)s improve professional abilities, distribute ruling and execute and use private network or connection side trusty between body pond Formula.
Wherein, as shown in Fig. 2, the workflow of above system such as Fig. 2, specifically, a kind of to realize what DNS service was defendd Detection method, comprising:
Building is made of the server pools that isomery executes body the DNS recursion resolution server of more isomeries;
Above-mentioned execution body can be used as recursion server and can also be used as authorization server, for providing local or public network Domain name mapping;
Receive the domain name mapping request for analytically server being accelerated to pass over;
The online situation of server of the server pools of body is executed according to current isomery, is dynamically executed from N platform and is selected M platform in body Execution body, and will request be distributed to them respectively, wherein M <=N;
It obtains above-mentioned isomery and executes the result that body is inquired in local parsing or outside recurrence;
Returning the result for body is executed from M according to what is obtained, is arbitrated using corresponding algorithm, generates one finally As a result, and returning to parsing acceleration server.
Such as in one embodiment, detailed process is as follows:
User pc accesses the webpage of Baidu by browser, inputs request domain name in the position browser URL: Www.baidu.com, if the PC of user is the system of an IPV4 protocol stack, and one address DNSIP of system configuration: 8.8.8.8.At this time request will be sent automatically on the DNS of 8.8.8.8 by system, i.e., the parsing mentioned in this system accelerates Server.Request requires to obtain the corresponding address IPV4 www.baidu.com, and this request type is referred to as type-A, number of request According to having following information in packet:
;;QUESTION SECTION:
;www.baidu.com. IN A
Parsing accelerates the parsing result then direct response in server with the domain name.
Such as: many domain-name informations are saved in the caching of parsing acceleration server, system is sent out in the buffer at this time The A record for having showed www.baidu.com domain name becomes 61.135.169.125 and 61.135.169.121, then returns to user: The address ipv4 of www.baidu.com is the two IP.
Include following information in request:
Parsing accelerates in server without the domain name as a result, request is transparent to distribution ruling server.
Such as: parsing accelerates server not find the corresponding IPV4 address information of www.baidu.com in the buffer, then Will continue to ask point-score ruling server: the address ipv4 of www.baidu.com is how many.
Request is similar with the inquiry that client is initiated, and includes following information:
;;QUESTION SECTION:
;www.baidu.com. IN A
Distribute ruling server and body service state is executed according to isomery at that time, it is certain dynamically to execute selection in body from N platform The execution body of quantity (M platform), and request is distributed to them respectively.
For example, distribution ruling therefrom selects 3 if in system resource pond including 8 execution bodies, requested respectively to them The address ipv4 of www.baidu.com.
Request is similar with the inquiry that client is initiated, and includes following information;
;;QUESTION SECTION:
;www.baidu.com. IN A
Isomery executes body respectively in local parsing (authorization) or outside recurrence, returns to distribution ruling after obtaining parsing result Server.
Such as: after isomery execution body receives inquiry request, it can be inquired to internet, according to dns working mechanism, finally The authorization server of baidu.com can be removed, i.e., by the DNS request wwww.baidu.com's of Baidu company oneself maintenance data The address ipv4, it is 61.135.169.125 that some corresponding server of baidu.com, which replys and executes body 1 and execute the address of body 2, And 61.135.169.121, isomery execute body 1 and 2 and result result are returned to distribution ruling: the address ipv4 of www.baidu.com It is 61.135.169.125 and 61.135.169.121.It executes body 3 for some reason, for example may be held as a hostage and be also possible to match A baidu server for setting mistake returns, and the result that he obtains is 1.2.3.4, and tells point-score ruling: The address ipv4 of www.baidu.com is 1.2.3.4.
Body 1 is executed, the information that body 2 is replied is executed:
Execute the information that body 3 is replied:
Distribution ruling server executes returning the result for body from M according to what is obtained, is carried out using corresponding algorithm secondary It cuts out, generates a final result, and return to parsing and accelerate server.
Such as:: point-score ruling obtains two 61.135.169.125 and 61.135.169.121, a 1.2.3.4, according to Majority principle selects correct result for 61.135.169.125 and 61.135.169.121, returns to accelerator.
Accelerator receives reply;
Parsing accelerates server to reply to user terminal for the result that ruling returns is distributed, while result is retained in caching In.
Such as: parsing accelerate server by www.baidu.com correspond to the address ipv4 61.135.169.125 with 61.135.169.121 result returns to user pc, and after user pc obtains IP address, one can be chosen from two addresses, with Carry out http connection.
The reply that user receives:
Wherein, in the DNS distribution ruling, in query process each time, distribution arbitration module holds dynamic from isomery Preset M platform server is chosen in row body pond carries out business forwarding.System periodically executes body to each isomery and carries out state inspection It surveys, constantly adjusts the distribution priority of every execution body, basic principle includes:
It will be rejected from available execution body list completely when its service is unreachable;When some detection cycle finds its service When available, then it is placed back into freelist.
It is not selected after its parsing result is arbitrated, it will be reduced and use weight;
One mesa-shaped state normally executes body since lower weight is after the suspend mode of certain time, will be waken up ginseng With scheduling.
The execution body used for a long time can also be lowered weight after effective time, when exposure to reduce the execution body Between, reduce its traffic load, ensures that executing the balanced of body pond uses.
A possibility that the use weight of execution body the high scheduled is bigger, and the execution body of equal weight will be selected at random by system It selects.
Wherein, as a result arbitration is responsible for collecting executing from M in the result that body returns and be carried out preferably, finally determining one it is credible It spends highest result and returns to accelerator.Distribution ruling copes with different results using different algorithms and returns to state:
It selects more:
When the result for executing body return is inconsistent, arbitration unit, which is chosen, there is most results.Usual M value can quilt It is set as odd number, to guarantee to there is result to win in this link.
Weight:
Body is executed during the monitoring of dynamic dispatching unit, can constantly be modified it using weight, the weight is in result Also it will affect its selected probability in arbitration.In selecting more algorithms, there is attacked for the server that parsing result is eliminated Bigger possibility, therefore carry out single result relatively during, the result of higher weights server can be submitted to.
It is random:
Weight of holding power is identical to be executed under multiple result frequency of occurrence unanimous circumstances that body returns, and random fashion is taken to select One result returns.Such as M platform server returns to M parsing result, such case is commonly available to the environment of CDN, business clothes Business device is present in the cluster of a load balancing, and authorization server can return to available server at random and carry out balanced business.It is secondary The random selection for cutting out unit protects the use original intention of CDN.
This invention takes several threats for after above scheme, coping with domain name system and facing, including deorienting wind Dangerous (such as root name server deletes .cn domain name record), blinding risk (such as root name server is not parsed from China Domain name mapping request) and data tampering risk (such as the Cache Poisoning as caused by unknown loophole and back door and domain name misfortune Hold), which has carrier class domain name service ability and security guarantee.
It should be noted that for simple description, therefore, it is stated as a series of for above method embodiment Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because According to the application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, related actions and modules not necessarily the application It is necessary.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.
It can be used moreover, the application can be used in the computer that one or more wherein includes computer usable program code The computer program product implemented on storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Form.
Finally, it should be noted that the foregoing is only a preferred embodiment of the present invention, it is not intended to restrict the invention, Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features. All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention Within protection scope.

Claims (10)

1. a kind of detection system for realizing DNS service defence characterized by comprising
The DNS recursion resolution server of more isomeries, above-mentioned DNS recursion resolution server constitute an isomery of equal value together and hold The server pools of row body;
Above-mentioned execution body can be used as recursion server and can also be used as authorization server, for providing the domain name of local or public network Parsing;
DNS distributes ruling server, for receiving the analysis request for analytically server being accelerated to pass over and being distributed to each Execute body;
The parsing result that the isomery dynamically chosen executes body is collected, and most correctly by preset algorithm picks one As a result it returns to parsing and accelerates server;
Parsing accelerates server, for transmitting analysis request and receiving the result of DNS distribution ruling server transmitting.
2. the detection system according to claim 1 for realizing DNS service defence, which is characterized in that each DNS recursion resolution Different operating system, dns resolution software or different editions are installed respectively in server.
3. the detection system according to claim 1 or 2 for realizing DNS service defence, which is characterized in that the isomery executes Server in the server pools of body can also retain a part as standby, in the service of the business of offer with all on-line In the case that exception occurs in device, replaced automatically.
4. the detection system according to claim 1 for realizing DNS service defence, which is characterized in that the parsing accelerates clothes Business device is located at the front end of whole system, plays the role of cache, has two layers of operating mode, can be with quick response user Request reduces parsing time delay, promotes user's perception;
The work load that can reduce distribution ruling server simultaneously, carries out response by data cached in life cycle.
5. the detection system according to claim 1 for realizing DNS service defence, which is characterized in that the detection system base Resource isolation is realized in three-tier switch cooperation, and will be from external user traffic and the internal distribution ruling stream arbitrated Amount is limited in respectively in different VLAN;
Wherein, the parsing accelerates between server and DNS distribution ruling server using double on-link mode (OLM)s, the DNS distribution Ruling server and isomery, which execute, uses private network or connection type trusty between the server pools of body.
6. a kind of detection method for realizing DNS service defence characterized by comprising
Building is made of the server pools that isomery executes body the DNS recursion resolution server of more isomeries;
Above-mentioned execution body can be used as recursion server and can also be used as authorization server, for providing the domain name of local or public network Parsing;
Receive the domain name mapping request for analytically server being accelerated to pass over;
The online situation of server of the server pools of body is executed according to current isomery, is dynamically executed from N platform and is selected holding for M platform in body Row body, and request is distributed to them respectively, wherein M <=N;
It obtains above-mentioned isomery and executes the result that body is inquired in local parsing or outside recurrence;
Returning the result for body is executed from M according to what is obtained, is arbitrated using corresponding algorithm, is generated one and most terminate Fruit, and return to parsing and accelerate server.
7. the detection method according to claim 6 for realizing DNS service defence, which is characterized in that further include:
The result that parsing accelerates server that will distribute ruling return replies to user terminal, while result being retained in the buffer.
8. the detection method according to claim 6 for realizing DNS service defence, which is characterized in that further include: it is periodically right Each isomery executes body and carries out state-detection, constantly adjusts the distribution priority of every execution body, and basic principle includes:
It will be rejected from available execution body list completely when its service is unreachable;When some detection cycle finds that its service is available When, then be placed back into freelist.
It is not selected after its parsing result is arbitrated, it will be reduced and use weight;
One mesa-shaped state normally executes body since lower weight is after the suspend mode of certain time, will be waken up participation and adjusts Degree;
The execution body used for a long time can also be lowered weight after effective time, to reduce the exposure duration of the execution body, subtract Its small traffic load ensures that executing the balanced of body pond uses.
9. the detection method according to claim 6 for realizing DNS service defence, which is characterized in that utilize corresponding algorithm It is arbitrated, generates a final result, above-mentioned algorithm includes:
When the result for executing body return is inconsistent, arbitration unit, which is chosen, there is most results.Usual M value can be set For odd number, to guarantee to there is result to win in this link;
During carrying out single result relatively, the result of higher weights server is submitted to;
Weight of holding power is identical to be executed under multiple result frequency of occurrence unanimous circumstances that body returns, and random fashion is taken to select one As a result it returns.
10. the detection method according to claim 6 for realizing DNS service defence, which is characterized in that each DNS recursive solution Different operating system, dns resolution software or different editions are installed respectively in analysis server.
CN201910597175.8A 2019-07-04 2019-07-04 A kind of detection system and method for realizing DNS service defence Pending CN110247932A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910597175.8A CN110247932A (en) 2019-07-04 2019-07-04 A kind of detection system and method for realizing DNS service defence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910597175.8A CN110247932A (en) 2019-07-04 2019-07-04 A kind of detection system and method for realizing DNS service defence

Publications (1)

Publication Number Publication Date
CN110247932A true CN110247932A (en) 2019-09-17

Family

ID=67890950

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910597175.8A Pending CN110247932A (en) 2019-07-04 2019-07-04 A kind of detection system and method for realizing DNS service defence

Country Status (1)

Country Link
CN (1) CN110247932A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111371747A (en) * 2020-02-21 2020-07-03 中山大学 Method for preventing information leakage of domain name resolution server
CN112367289A (en) * 2020-09-11 2021-02-12 浙江大学 Mimicry WAF construction method
CN112600859A (en) * 2021-01-08 2021-04-02 北京润通丰华科技有限公司 Anomaly detection processing method for mimicry DNS (Domain name System) defense system
CN113268728A (en) * 2021-05-31 2021-08-17 河南信大网御科技有限公司 Decision method and decision device based on mimicry camouflage strategy
CN113900817A (en) * 2021-10-15 2022-01-07 广州电力通信网络有限公司 Mirror image root server processing terminal processing method based on IPV6 energy industry
CN114745356A (en) * 2022-03-29 2022-07-12 深信服科技股份有限公司 Domain name resolution method, device and equipment and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160277433A1 (en) * 2012-03-22 2016-09-22 Los Alamos National Security, Llc Non-harmful insertion of data mimicking computer network attacks
CN106878254A (en) * 2016-11-16 2017-06-20 国家数字交换系统工程技术研究中心 Improve the method and device of DNS securities of system
CN106961422A (en) * 2017-02-24 2017-07-18 中国人民解放军信息工程大学 The mimicry safety method and device of a kind of DNS recursion servers
CN108900654A (en) * 2018-08-04 2018-11-27 中国人民解放军战略支援部队信息工程大学 A kind of DNS dynamic dispatching method based on mimicry name server
CN109067737A (en) * 2018-07-28 2018-12-21 中国人民解放军战略支援部队信息工程大学 A kind of mimicry judgment device and method exported under asynchronous Keep-order requirements

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160277433A1 (en) * 2012-03-22 2016-09-22 Los Alamos National Security, Llc Non-harmful insertion of data mimicking computer network attacks
CN106878254A (en) * 2016-11-16 2017-06-20 国家数字交换系统工程技术研究中心 Improve the method and device of DNS securities of system
CN106961422A (en) * 2017-02-24 2017-07-18 中国人民解放军信息工程大学 The mimicry safety method and device of a kind of DNS recursion servers
CN109067737A (en) * 2018-07-28 2018-12-21 中国人民解放军战略支援部队信息工程大学 A kind of mimicry judgment device and method exported under asynchronous Keep-order requirements
CN108900654A (en) * 2018-08-04 2018-11-27 中国人民解放军战略支援部队信息工程大学 A kind of DNS dynamic dispatching method based on mimicry name server

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZHENPENG WANG等: ""Design and Implementation of an SDN-Enabled DNS Security Framework"", 《CHINA COMMUNICATIONS》 *
王禛鹏等: ""一种基于拟态安全防御的DNS框架设计"", 《电子学报》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111371747A (en) * 2020-02-21 2020-07-03 中山大学 Method for preventing information leakage of domain name resolution server
CN112367289A (en) * 2020-09-11 2021-02-12 浙江大学 Mimicry WAF construction method
CN112367289B (en) * 2020-09-11 2021-08-06 浙江大学 Mimicry WAF construction method
CN112600859A (en) * 2021-01-08 2021-04-02 北京润通丰华科技有限公司 Anomaly detection processing method for mimicry DNS (Domain name System) defense system
CN112600859B (en) * 2021-01-08 2023-03-31 北京润通丰华科技有限公司 Anomaly detection processing method for mimicry DNS (Domain name System) defense system
CN113268728A (en) * 2021-05-31 2021-08-17 河南信大网御科技有限公司 Decision method and decision device based on mimicry camouflage strategy
CN113900817A (en) * 2021-10-15 2022-01-07 广州电力通信网络有限公司 Mirror image root server processing terminal processing method based on IPV6 energy industry
CN113900817B (en) * 2021-10-15 2022-09-13 广州电力通信网络有限公司 Mirror image root server processing terminal processing method based on IPV6 energy industry
CN114745356A (en) * 2022-03-29 2022-07-12 深信服科技股份有限公司 Domain name resolution method, device and equipment and readable storage medium
CN114745356B (en) * 2022-03-29 2024-02-23 深信服科技股份有限公司 Domain name resolution method, device, equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN110247932A (en) A kind of detection system and method for realizing DNS service defence
US10841324B2 (en) Method and system for uniquely identifying a user computer in real time using a plurality of processing parameters and servers
CN106068639B (en) The Transparent Proxy certification handled by DNS
US8447856B2 (en) Policy-managed DNS server for to control network traffic
US20240048579A1 (en) Identification of malicious domain campaigns using unsupervised clustering
WO2015149062A1 (en) System and method for predicting impending cyber security events using multi channel behavioral analysis in a distributed computing environment
US9264440B1 (en) Parallel detection of updates to a domain name system record system using a common filter
JP2015043204A (en) Detection of pattern co-occurring in dns
EP1877904A2 (en) Detecting unwanted electronic mail messages based on probabilistic analysis of referenced resources
Alenazi et al. Holistic model for http botnet detection based on dns traffic analysis
Futai et al. Hybrid detection and tracking of fast-flux botnet on domain name system traffic
EP3332533B1 (en) Parallel detection of updates to a domain name system record system using a common filter
CN106789868A (en) A kind of website user&#39;s Activity recognition and managing and control system
CN103916379A (en) CC attack identification method and system based on high frequency statistics
CN110233774B (en) Detection method, distributed detection method and system for Socks proxy server
Tatang et al. A study of newly observed hostnames and DNS tunneling in the wild
CN115190107B (en) Multi-subsystem management method based on extensive domain name, management terminal and readable storage medium
US20110219440A1 (en) Application-level denial-of-service attack protection
Tatang et al. Below the radar: spotting DNS tunnels in newly observed hostnames in the wild
CN111371917B (en) Domain name detection method and system
Singh et al. TI-16 DNS labeled dataset for detecting botnets
CN117439824B (en) AI-based smart city evaluation method, system, device and storage medium
Arjmandpanah‐Kalat et al. Design and performance analysis of an efficient single flow IP traceback technique in the AS level
Deri et al. Exploiting dns traffic to rank internet domains
Spring Large scale DNS traffic analysis of malicious Internet activity with a focus on evaluating the response time of blocking phishing sites

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190917

RJ01 Rejection of invention patent application after publication