CN103916490A - DNS tamper-proof method and device - Google Patents

DNS tamper-proof method and device Download PDF

Info

Publication number
CN103916490A
CN103916490A CN201410133605.8A CN201410133605A CN103916490A CN 103916490 A CN103916490 A CN 103916490A CN 201410133605 A CN201410133605 A CN 201410133605A CN 103916490 A CN103916490 A CN 103916490A
Authority
CN
China
Prior art keywords
dns server
address
server address
legal
dns
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410133605.8A
Other languages
Chinese (zh)
Other versions
CN103916490B (en
Inventor
曾加良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sangfor Technologies Co Ltd
Original Assignee
Sangfor Network Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sangfor Network Technology Shenzhen Co Ltd filed Critical Sangfor Network Technology Shenzhen Co Ltd
Priority to CN201410133605.8A priority Critical patent/CN103916490B/en
Publication of CN103916490A publication Critical patent/CN103916490A/en
Application granted granted Critical
Publication of CN103916490B publication Critical patent/CN103916490B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a DNS tamper-proof method and device. The method includes the steps that DNS data, sent by intranet equipment, in network flow are received and analyzed on a gateway, and a DNS server address and domain data are extracted from the DNS data; whether the extracted DNS server address is a legal address or not is judged according to a first preset rule; if not, the extracted DNS server address is abandoned, and a legal DNS server address is obtained according to a second preset rule; the domain data are sent to the legal DNS server address so as to obtain an IP address corresponding to the domain data; the obtained IP address corresponding to the domain data is returned to the intranet equipment. By the adoption of the DNS tamper-proof method and device, the network security problem that when a DNS server address on the internet equipment is tampered into a malicious DNS IP address, a normal address is analyzed to a phishing website or a host controlled by hackers is avoided.

Description

A kind of domain name system DNS tamper resistant method and device
Technical field
The present invention relates to field of mobile communication, specially refer to a kind of domain name system DNS tamper resistant method and device.
Background technology
In computer communication network, between domain name (Domain Name, referred to as DN) and procotol (Internet Protocol, referred to as IP) address, exist one to one or many-to-one mapping relations.User uses the computer on the domain name access network of being convenient to memory conventionally, but intercomputer must use IP address to carry out data communication.Therefore, need to exist for the service system that user provides domain name to arrive IP address transition in communication network, this service system is called domain name system (Domain Name System, DNS).For user provides the main frame of this Transformation Service, be called dns server.Domain name, to the transfer process of IP address, is called dns resolution or address resolution.
Access Baidu (www.baidu.com) as example taking user by internet (Internet): when operating system is received after user's browse request, first send query message to dns server, the inquiry corresponding IP of www.baidu.com address.Receive after the response packet of dns server when operating system, first parse the corresponding IP of www.baidu.com address, then carry out network service with this IP address, user side can normally access www.baidu.com.But, in network communication process, hacker usually distorts the dns server address arranging in client into malice dns server address, thus normal network address analysis to fishing website or be subject on main frame that hacker controls, to reach the object of gaining user's wealth by cheating or stealing privacy of user; To cause serious network security problem, bring economic loss and information leakage risk to enterprise or government or individual.
For addressing the aforementioned drawbacks, the mode of available technology adopting is: in client (Intranet equipment), Prevention-Security product is set, this Prevention-Security product judges whether at the dns server address of client setting be legal, and illegal dns server address is modified; But adopt this kind of mode to have following defect: need to Prevention-Security product be set in each client; this is in enterprises; workload and the management disposed are to bother very much; efficiency is very low; and some Prevention-Security products (as certain fail-safe software); operate in windows upper, for the client much operating in linux system, do not have protective effect.
Foregoing only, for auxiliary understanding technical scheme of the present invention, does not represent and admits that foregoing is prior art.
Summary of the invention
Main purpose of the present invention is for providing a kind of domain name system DNS tamper resistant method and device, while being intended to avoid be tampered as malice DNS IP address due to the dns server address arranging on Intranet equipment, and normal network address analysis to fishing website or be subject on main frame that hacker controls the network security problem of initiation.
The invention provides a kind of domain name system DNS tamper resistant method, the method comprises:
On gateway, receive and resolve the DNS data in the network traffics that Intranet equipment sends over, and from described DNS extracting data dns server address and domain name data;
Described gateway judges according to the first preset rules whether the dns server address of described extraction is legal address;
If the dns server address of described extraction is not legal address, described gateway abandons the dns server address of described extraction, and obtains a legal dns server address according to the second preset rules;
Domain name data are sent to described legal dns server address by described gateway, to obtain IP address corresponding to domain name data; And IP address corresponding the domain name data of obtaining is returned to described Intranet equipment.
Preferably, described gateway judges that according to the first preset rules whether the dns server address of described extraction is that the step of legal address comprises:
Described gateway judges that the dns server address of described extraction is whether in default malice dns server address storehouse;
If the dns server address of described extraction is in default malice dns server address storehouse, described gateway determines that the dns server address of described extraction is not legal address;
If the dns server address of described extraction is not in default malice dns server address storehouse, described gateway determines that the dns server address of described extraction is legal address.
Preferably, the described step of obtaining a legal dns server address according to the second preset rules comprises:
According to the malice dns server address of user preset and the mapping relations of legal dns server address, or according to the malice dns server address of gateway acquiescence and the mapping relations of legal dns server address, obtain the legal dns server address corresponding to dns server address of described extraction.
Preferably, the described DNS data that receive on gateway and resolve in the network traffics that Intranet equipment sends over, and after the step of described DNS extracting data dns server address and domain name data, the method also comprises: described gateway is from the IP address of described DNS extracting data Intranet equipment;
Described gateway judges that according to the first preset rules whether the dns server address of described extraction is that the step of legal address comprises:
Described gateway obtains the affiliated network area, IP address of described Intranet equipment, and obtains the dns server address corresponding to IP address of described Intranet equipment according to default network area and the mapping relations of dns server address;
Described gateway judges that the dns server address whether dns server address of described extraction is corresponding with the IP address of Intranet equipment is identical;
If the dns server address that the dns server address of described extraction is corresponding from the IP address of Intranet equipment is different, described gateway determines that the dns server address of described extraction is not legal address;
If the dns server address that the dns server address of described extraction is corresponding with the IP address of Intranet equipment is identical, described gateway determines that the dns server address of described extraction is legal address.
Preferably, the described step of obtaining a legal dns server address according to the second preset rules comprises:
Using dns server address corresponding the IP address of the described Intranet equipment obtaining as legal dns server address.
Preferably, described gateway abandons the dns server address of described extraction, and obtain the step of a legal dns server address according to the second preset rules before or after or simultaneously, the method also comprises:
The described gateway information that gives a warning.
The present invention also provides a kind of domain name system DNS tamper resistant device, and this device comprises gateway, and described gateway comprises:
Receive parsing module, for receiving and resolve the DNS data of the network traffics that Intranet equipment sends over, and from described DNS extracting data dns server address and domain name data;
Whether judge module is legal address for the dns server address that judges described extraction according to the first preset rules;
Processing module, in the time that the dns server address of described extraction is not legal address, abandons the dns server address of described extraction, and obtains a legal dns server address according to the second preset rules;
Transceiver module, for sending to domain name data described legal dns server address, to obtain IP address corresponding to domain name data; And IP address corresponding the domain name data of obtaining is returned to described Intranet equipment.
Preferably, described judge module comprises the first judging unit, whether the dns server address that described the first judging unit is used for judging extraction is in default malice dns server address storehouse, if the dns server address of described extraction is in default malice dns server address storehouse, the dns server address of determining described extraction is not legal address, if the dns server address of described extraction not in default malice dns server address storehouse, determines that the dns server address of described extraction is legal address.
Preferably, described processing module comprises the first processing unit, for being that the dns server address that extracts is while being not legal address in the judged result of described the first judging unit, according to the malice dns server address of user preset and the mapping relations of legal dns server address, or according to the malice dns server address of gateway acquiescence and the mapping relations of legal dns server address, obtain the legal dns server address corresponding to dns server address of described extraction.
Preferably, described reception parsing module is also for the IP address from described DNS extracting data Intranet equipment;
Described judge module comprises the second judging unit, for obtaining the affiliated network area, IP address of described Intranet equipment, and obtain the dns server address corresponding to IP address of described Intranet equipment according to default network area and the mapping relations of dns server address, if the dns server address that the dns server address extracting is corresponding from the IP address of Intranet equipment is different, the dns server address of determining described extraction is not legal address, if the dns server address that the dns server address of described extraction is corresponding with the IP address of Intranet equipment is identical, the dns server address of determining described extraction is legal address.
Preferably, described processing module comprises the second processing unit, when not identical for the dns server address that is this extraction in the judged result of described the second judging unit the dns server address corresponding with the IP address of Intranet equipment, using dns server address corresponding the IP address of the described Intranet equipment obtaining as legal dns server address.
Preferably, described gateway also comprises alarm module, and while being not legal address for the dns server address that is this extraction in the judged result of described judge module, information gives a warning.
Adopt the present invention, on gateway, receive and resolve the DNS data in the network traffics that Intranet equipment sends over, and from described DNS extracting data dns server address and domain name data; Described gateway judges according to the first preset rules whether the dns server address of described extraction is legal address; If the dns server address of described extraction is not legal address, described gateway abandons the dns server address of described extraction, and obtains a legal dns server address according to the second preset rules; Domain name data are sent to described legal dns server address by described gateway, to obtain IP address corresponding to domain name data; And IP address corresponding the domain name data of obtaining is returned to described Intranet equipment; Can avoid being tampered as malice DNS IP address due to the dns server address arranging on Intranet equipment time, and normal network address analysis to fishing website or be subject on main frame that hacker controls the network security problem of initiation.
Brief description of the drawings
Fig. 1 is the first embodiment schematic flow sheet of domain name system DNS tamper resistant method of the present invention;
Fig. 2 is an embodiment schematic flow sheet of step S20 in Fig. 1;
Fig. 3 is another embodiment schematic flow sheet of step S20 in Fig. 1;
Fig. 4 is the second embodiment schematic flow sheet of domain name system DNS tamper resistant method of the present invention;
Fig. 5 is the first example structure schematic diagram of domain name system DNS tamper resistant device of the present invention;
Fig. 6 is the second example structure schematic diagram of domain name system DNS tamper resistant device of the present invention.
Realization, functional characteristics and the advantage of the object of the invention, in connection with embodiment, are described further with reference to accompanying drawing.
Embodiment
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
With reference to Fig. 1, Fig. 1 is the first embodiment schematic flow sheet of domain name system DNS tamper resistant method of the present invention, and the method comprises:
S10, on gateway, receive and resolve the DNS data in the network traffics that Intranet equipment sends over, and from this DNS extracting data dns server address and domain name data.
In this step S10, receive and resolve the DNS data in the network traffics that Intranet equipment sends at gateway, this gateway can receive the DNS data in the network traffics that one or more Intranet equipment sends over; According to RFC DNS Protocol, resolve the DNS data in network traffics at gateway, to extract dns server address and domain name data, if the dns server address extracting is 8.8.8.8, domain name data is: baidu.com.Further, also can be in the IP address of this DNS extracting data Intranet equipment.
S20, this gateway judge according to the first preset rules whether the dns server address of this extraction is legal address, if the dns server address of this extraction is not legal address, performs step S30; If the dns server address of this extraction is legal address, perform step S40.
In this step S20, this gateway judges according to the first preset rules whether the dns server address of this extraction is legal address.
Concrete, in one embodiment, this step S20 comprises (as shown in Figure 2):
Whether the dns server address that S21, this gateway judge this extraction in default malice dns server address storehouse, if the dns server address of this extraction is in default malice dns server address storehouse, performs step S22; If the dns server address of this extraction, in default malice dns server address storehouse, does not perform step S23.
This default malice dns server address storehouse can be preset by keeper, as this keeper is thought that according to actual conditions malice dns server address joins in malice dns server address storehouse, this malice dns server address storehouse can be upgraded by keeper.Malice dns server address that this default malice dns server address storehouse comprises is as 8.80.8.80.
S22, this gateway determine that the dns server address of this extraction is not legal address.
S23, this gateway determine that the dns server address of this extraction is legal address.
In another embodiment, this step S20 comprises (as shown in Figure 3):
S24, this gateway obtain the affiliated network area, IP address of this Intranet equipment, and obtain the dns server address corresponding to IP address of this Intranet equipment according to default network area and the mapping relations of dns server address.
In this step S24, this gateway obtains the network area under the IP address of this Intranet equipment, as the network area getting under the IP address of this Intranet equipment is region one.
The network area that this is default and the mapping relations of dns server address can be set according to actual conditions by keeper, and the network area that this is default and the mapping relations of dns server address are as shown in Table 1.
Table one:
Network area Dns server address
Region one 1.1.1.1
Region two 2.2.2.2
Region three 8.8.8.8
…… ……
If the network area under the IP address of Intranet equipment is region two, from the mapping relations of this default network area and dns server address, can learn that the dns server address corresponding to IP address of this Intranet equipment is 2.2.2.2.
S25, this gateway judge that the dns server address whether dns server address of this extraction is corresponding with the IP address of Intranet equipment is identical, if the dns server address that the dns server address of this extraction is corresponding from the IP address of Intranet equipment is different, perform step S26; If the dns server address that the dns server address of this extraction is corresponding with the IP address of Intranet equipment is identical, perform step S27.
In this step S25, judge that the dns server address whether dns server address of this extraction is corresponding with the IP address of Intranet equipment is identical, if the dns server address extracting is 8.8.8.8, the dns server address corresponding to IP address of Intranet equipment is 8.8.8.8, illustrates that the dns server address that the dns server address of this extraction is corresponding with the IP address of Intranet equipment is identical; If the dns server address extracting is 8.8.8.8, the dns server address corresponding to IP address of Intranet equipment is 2.2.2.2, illustrates that the dns server address that the dns server address of this extraction is corresponding from the IP address of Intranet equipment is different.
S26, this gateway determine that the dns server address of this extraction is not legal address.
S27, this gateway determine that the dns server address of this extraction is legal address.
S30, this gateway abandon the dns server address of this extraction, and obtain a legal dns server address according to the second preset rules, then perform step S40.
In this step S30, this gateway provides agent functionality (anti-tamper), this gateway abandons the dns server address of this extraction, in the time that the dns server address of this extraction is not legal address, abandoned, carried out the parsing of domain name data to IP address and the domain name data extracting from Intranet equipment can not sent to the dns server address of this extraction.
Concrete, in one embodiment, in this step S30, obtaining a legal dns server address according to the second preset rules comprises: according to the malice dns server address of user preset and the mapping relations of legal dns server address, or according to the malice dns server address of gateway acquiescence and the mapping relations of legal dns server address, obtain the legal dns server address corresponding to dns server address of this extraction.
The malice dns server address that this is default and the mapping relations of legal dns server address can be preset by keeper, as keeper carries out corresponding by malice dns server address 8.80.8.80 with legal dns server address 8.8.8.8 according to actual conditions,, in the time that the dns server address of this extraction is 8.80.8.80, legal dns server address corresponding to dns server address 8.80.8.80 that obtains this extraction is 8.8.8.8.
The malice dns server address of this gateway acquiescence and the mapping relations of legal dns server address are by gateway Lookup protocol, as gateway carries out corresponding by malice dns server address 9.90.9.90 with legal dns server address 9.9.9.9 according to actual conditions,, in the time that the dns server address of this extraction is 9.90.9.90, legal dns server address corresponding to dns server address 9.90.9.90 that obtains this extraction is 9.9.9.9.
Concrete, in another embodiment, in this step S30, obtain a legal dns server address according to the second preset rules and comprise: using dns server address corresponding the IP address of this Intranet equipment obtaining at step S24 as legal dns server address.
Dns server address as corresponding in the IP address of this Intranet equipment obtaining in step S24 is 2.2.2.2, using this dns server address 2.2.2.2 as legal dns server address.
This domain name data is sent to this legal dns server address by S40, this gateway, to obtain the IP address that this domain name data is corresponding; And IP address corresponding this domain name data obtaining is returned to this Intranet equipment.
In this step S40, domain name data is sent to this legal dns server address by this gateway, as domain name data baidu.com sent to legal dns server address 8.8.8.8, the dns server that is 8.8.8.8 by address is resolved baidu.com, generate corresponding IP address, as the IP address that baidu.com is resolved to is: 222.234.23.12.In this step S40, also IP address corresponding this domain name data obtaining is returned to this Intranet equipment, as IP address 222.234.23.12 is returned to this Intranet equipment, then this Intranet equipment is initiated access request according to this IP address 222.234.23.12.In the specific implementation, in this step S40, this gateway sends to this domain name data after this legal dns server address, this legal dns server generates corresponding packet according to this domain name data, this packet comprises IP address and other data that this domain name data is corresponding, the Packet Generation of this generation is given this gateway by this legal dns server, this gateway receives this packet and this packet is returned to this Intranet equipment, and this Intranet equipment is initiated corresponding access request according to the packet receiving.
With reference to Fig. 4, Fig. 4 is the second embodiment schematic flow sheet of domain name system DNS tamper resistant method of the present invention.
Based on the first embodiment schematic flow sheet of above-mentioned domain name system DNS tamper resistant method, before or after step S30 or simultaneously, the method also comprises:
S50, this gateway information that gives a warning.
In this step S50, when the dns server address of gateway discovery Intranet equipment is while being illegal (as the dns server address when the setting of Intranet equipment is distorted by hacker's malice), information gives a warning, this warning message can Word message or acoustic information, concrete, can warning message be sent to keeper by the mode such as note, mail.
With reference to Fig. 5, Fig. 5 is the first example structure schematic diagram of domain name system DNS tamper resistant device of the present invention, this device comprises gateway 100, this gateway 100 comprises: receive parsing module 10, the judge module 20 being connected with this reception parsing module 10, the processing module 30 being connected with this judge module 20, the transceiver module 40 being connected with this processing module 30, this judge module 20 is also connected with this transceiver module 40, wherein:
This reception parsing module 10, for receiving and resolve the DNS data of the network traffics that Intranet equipment sends over, and from this DNS extracting data dns server address and domain name data;
Whether this judge module 20 is legal address for the dns server address that judges this extraction according to the first preset rules;
This processing module 30, in the time that the dns server address of this extraction is not legal address, abandons the dns server address of this extraction, and obtains a legal dns server address according to the second preset rules;
This transceiver module 40, for this domain name data being sent to this legal dns server address, to obtain the IP address that this domain name data is corresponding; And IP address corresponding this domain name data obtaining is returned to this Intranet equipment.
This reception parsing module 10 receives and resolves the DNS data in the network traffics that Intranet equipment sends over, and this reception parsing module 10 can receive the DNS data in the network traffics that one or more Intranet equipment sends over; These reception parsing module 10 places, according to RFC DNS Protocol, resolve the DNS data in network traffics, and to extract dns server address and domain name data, if the dns server address extracting is 8.8.8.8, domain name data is: baidu.com.Further, this reception parsing module 10 also can be in the IP address of this DNS extracting data Intranet equipment.
In one embodiment, this judge module 20 comprises the first judging unit, whether the dns server address that this first judging unit is used for judging extraction is in default malice dns server address storehouse, if the dns server address of this extraction is in default malice dns server address storehouse, the dns server address of determining this extraction is not legal address, if the dns server address of this extraction not in default malice dns server address storehouse, determines that the dns server address of this extraction is legal address.
This default malice dns server address storehouse can be preset by keeper, as this keeper is thought that according to actual conditions malice dns server address joins in malice dns server address storehouse, this malice dns server address storehouse can be upgraded by keeper.Malice dns server address that this default malice dns server address storehouse comprises is as 8.80.8.80.
This processing module 30 provides agent functionality (anti-tamper), this processing module 30 is in the time that the dns server address of this extraction is not legal address, abandoned, carried out the parsing of domain name data to IP address and the domain name data extracting from Intranet equipment can not sent to by transceiver module 40 dns server address of this extraction.
In one embodiment, this processing module 30 comprises the first processing unit, when the dns server address that it is extraction that this first processing unit is used in the judged result of this first judging unit is not legal address, according to the malice dns server address of user preset and the mapping relations of legal dns server address, or according to the malice dns server address of gateway acquiescence and the mapping relations of legal dns server address, obtain the legal dns server address corresponding to dns server address of this extraction.
The malice dns server address that this is default and the mapping relations of legal dns server address can be preset by keeper, as keeper carries out corresponding by malice dns server address 8.80.8.80 with legal dns server address 8.8.8.8 according to actual conditions,, in the time that the dns server address of this extraction is 8.80.8.80, legal dns server address corresponding to dns server address 8.80.8.80 that obtains this extraction is 8.8.8.8.
The malice dns server address of this gateway acquiescence and the mapping relations of legal dns server address are by gateway Lookup protocol, as gateway carries out corresponding by malice dns server address 9.90.9.90 with legal dns server address 9.9.9.9 according to actual conditions,, in the time that the dns server address of this extraction is 9.90.9.90, legal dns server address corresponding to dns server address 9.90.9.90 that obtains this extraction is 9.9.9.9.
In another embodiment, this reception parsing module 10 is also for the IP address from described DNS extracting data Intranet equipment, this judge module 20 comprises the second judging unit, this second judging unit is for obtaining the affiliated network area, IP address of this Intranet equipment, and obtain the dns server address corresponding to IP address of this Intranet equipment according to default network area and the mapping relations of dns server address, if the dns server address that the dns server address extracting is corresponding from the IP address of Intranet equipment is different, the dns server address of determining this extraction is not legal address, if the dns server address that the dns server address of this extraction is corresponding with the IP address of Intranet equipment is identical, the dns server address of determining this extraction is legal address.
This second judging unit obtains the network area under the IP address of this Intranet equipment, as the network area getting under the IP address of this Intranet equipment is region one.
The network area that this is default and the mapping relations of dns server address can be set according to actual conditions by keeper, and the network area that this is default and the mapping relations of dns server address are as shown in above-mentioned table one.If the network area under the IP address of Intranet equipment is region two, from the mapping relations of this default network area and dns server address, can learn that the dns server address corresponding to IP address of this Intranet equipment is 2.2.2.2.
This second judging unit judges that the dns server address whether dns server address of this extraction is corresponding with the IP address of Intranet equipment is identical, if the dns server address extracting is 8.8.8.8, the dns server address corresponding to IP address of Intranet equipment is 8.8.8.8, illustrates that the dns server address that the dns server address of this extraction is corresponding with the IP address of Intranet equipment is identical; If the dns server address extracting is 8.8.8.8, the dns server address corresponding to IP address of Intranet equipment is 2.2.2.2, illustrates that the dns server address that the dns server address of this extraction is corresponding from the IP address of Intranet equipment is different.
In another embodiment, this processing module 30 comprises the second processing unit, when this second processing unit is not identical for the dns server address that is this extraction in the judged result of this second judging unit the dns server address corresponding with the IP address of Intranet equipment, using dns server address corresponding the IP address of this this Intranet equipment obtaining as legal dns server address; The dns server address corresponding to IP address of this Intranet equipment obtaining as the second judging unit is 2.2.2.2, using this dns server address 2.2.2.2 as legal dns server address.
This domain name data is sent to this legal dns server address by this transceiver module 40, as domain name data baidu.com sent to legal dns server address 8.8.8.8, the dns server that is 8.8.8.8 by this address is resolved baidu.com, generate corresponding IP address, as the IP address that baidu.com is resolved to is: 222.234.23.12.This transceiver module 40 also returns to this Intranet equipment by IP address corresponding this domain name data obtaining, and as IP address 222.234.23.12 is returned to this Intranet equipment, then this Intranet equipment is initiated access request according to this IP address 222.234.23.12.In the specific implementation, this transceiver module 40 sends to this domain name data after this legal dns server address, this legal dns server generates corresponding packet according to this domain name data, this packet comprises IP address and other data that this domain name data is corresponding, the Packet Generation of this generation is given this gateway by this legal dns server, the transceiver module of this gateway receives this packet and this packet is returned to this Intranet equipment, and this Intranet equipment is initiated corresponding access request according to the packet receiving.
With reference to Fig. 6, Fig. 6 is the second example structure schematic diagram of domain name system DNS tamper resistant device of the present invention.
Based on the first embodiment of above-mentioned domain name system DNS tamper resistant device, this gateway 100 also comprises the alarm module 50 being connected with this judge module 20, when this alarm module 50 is not legal address for the dns server address that is this extraction in the judged result of this judge module 20, information gives a warning.When the dns server address of gateway discovery Intranet equipment is while being illegal (as the dns server address when the setting of Intranet equipment is distorted by hacker's malice), by alarm module 50 information that gives a warning, this warning message can Word message or acoustic information, concrete, can warning message be sent to keeper by the mode such as note, mail.
The foregoing is only the preferred embodiments of the present invention; not thereby limit the scope of the claims of the present invention; every equivalent structure or conversion of equivalent flow process that utilizes specification of the present invention and accompanying drawing content to do; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (12)

1. a domain name system DNS tamper resistant method, is characterized in that, the method comprises:
On gateway, receive and resolve the DNS data in the network traffics that Intranet equipment sends over, and from described DNS extracting data dns server address and domain name data;
Described gateway judges according to the first preset rules whether the dns server address of described extraction is legal address;
If the dns server address of described extraction is not legal address, described gateway abandons the dns server address of described extraction, and obtains a legal dns server address according to the second preset rules;
Domain name data are sent to described legal dns server address by described gateway, to obtain IP address corresponding to domain name data; And IP address corresponding the domain name data of obtaining is returned to described Intranet equipment.
2. method according to claim 1, is characterized in that, described gateway judges that according to the first preset rules whether the dns server address of described extraction is that the step of legal address comprises:
Described gateway judges that the dns server address of described extraction is whether in default malice dns server address storehouse;
If the dns server address of described extraction is in default malice dns server address storehouse, described gateway determines that the dns server address of described extraction is not legal address;
If the dns server address of described extraction is not in default malice dns server address storehouse, described gateway determines that the dns server address of described extraction is legal address.
3. method according to claim 2, is characterized in that, the described step of obtaining a legal dns server address according to the second preset rules comprises:
According to the malice dns server address of user preset and the mapping relations of legal dns server address, or according to the malice dns server address of gateway acquiescence and the mapping relations of legal dns server address, obtain the legal dns server address corresponding to dns server address of described extraction.
4. method according to claim 1, it is characterized in that, the described DNS data that receive on gateway and resolve in the network traffics that Intranet equipment sends over, and after the step of described DNS extracting data dns server address and domain name data, the method also comprises: described gateway is from the IP address of described DNS extracting data Intranet equipment;
Described gateway judges that according to the first preset rules whether the dns server address of described extraction is that the step of legal address comprises:
Described gateway obtains the affiliated network area, IP address of described Intranet equipment, and obtains the dns server address corresponding to IP address of described Intranet equipment according to default network area and the mapping relations of dns server address;
Described gateway judges that the dns server address whether dns server address of described extraction is corresponding with the IP address of Intranet equipment is identical;
If the dns server address that the dns server address of described extraction is corresponding from the IP address of Intranet equipment is different, described gateway determines that the dns server address of described extraction is not legal address;
If the dns server address that the dns server address of described extraction is corresponding with the IP address of Intranet equipment is identical, described gateway determines that the dns server address of described extraction is legal address.
5. method according to claim 4, is characterized in that, the described step of obtaining a legal dns server address according to the second preset rules comprises:
Using dns server address corresponding the IP address of the described Intranet equipment obtaining as legal dns server address.
6. according to the described method of claim 1, it is characterized in that, described gateway abandons the dns server address of described extraction, and obtain the step of a legal dns server address according to the second preset rules before or after or simultaneously, the method also comprises:
The described gateway information that gives a warning.
7. a domain name system DNS tamper resistant device, is characterized in that, this device comprises gateway, and described gateway comprises:
Receive parsing module, for receiving and resolve the DNS data of the network traffics that Intranet equipment sends over, and from described DNS extracting data dns server address and domain name data;
Whether judge module is legal address for the dns server address that judges described extraction according to the first preset rules;
Processing module, in the time that the dns server address of described extraction is not legal address, abandons the dns server address of described extraction, and obtains a legal dns server address according to the second preset rules;
Transceiver module, for sending to domain name data described legal dns server address, to obtain IP address corresponding to domain name data; And IP address corresponding the domain name data of obtaining is returned to described Intranet equipment.
8. device according to claim 7, it is characterized in that, described judge module comprises the first judging unit, whether the dns server address that described the first judging unit is used for judging extraction is in default malice dns server address storehouse, if the dns server address of described extraction is in default malice dns server address storehouse, the dns server address of determining described extraction is not legal address, if the dns server address of described extraction not in default malice dns server address storehouse, determines that the dns server address of described extraction is legal address.
9. device according to claim 8, it is characterized in that, described processing module comprises the first processing unit, for being that the dns server address that extracts is while being not legal address in the judged result of described the first judging unit, according to the malice dns server address of user preset and the mapping relations of legal dns server address, or according to the malice dns server address of gateway acquiescence and the mapping relations of legal dns server address, obtain the legal dns server address corresponding to dns server address of described extraction.
10. device according to claim 7, is characterized in that, described reception parsing module is also for the IP address from described DNS extracting data Intranet equipment;
Described judge module comprises the second judging unit, for obtaining the affiliated network area, IP address of described Intranet equipment, and obtain the dns server address corresponding to IP address of described Intranet equipment according to default network area and the mapping relations of dns server address, if the dns server address that the dns server address extracting is corresponding from the IP address of Intranet equipment is different, the dns server address of determining described extraction is not legal address, if the dns server address that the dns server address of described extraction is corresponding with the IP address of Intranet equipment is identical, the dns server address of determining described extraction is legal address.
11. devices according to claim 10, it is characterized in that, described processing module comprises the second processing unit, when not identical for the dns server address that is this extraction in the judged result of described the second judging unit the dns server address corresponding with the IP address of Intranet equipment, using dns server address corresponding the IP address of the described Intranet equipment obtaining as legal dns server address.
12. devices according to claim 7, is characterized in that, described gateway also comprises alarm module, and while being not legal address for the dns server address that is this extraction in the judged result of described judge module, information gives a warning.
CN201410133605.8A 2014-04-03 2014-04-03 DNS tamper-proof method and device Active CN103916490B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410133605.8A CN103916490B (en) 2014-04-03 2014-04-03 DNS tamper-proof method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410133605.8A CN103916490B (en) 2014-04-03 2014-04-03 DNS tamper-proof method and device

Publications (2)

Publication Number Publication Date
CN103916490A true CN103916490A (en) 2014-07-09
CN103916490B CN103916490B (en) 2017-05-24

Family

ID=51041886

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410133605.8A Active CN103916490B (en) 2014-04-03 2014-04-03 DNS tamper-proof method and device

Country Status (1)

Country Link
CN (1) CN103916490B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105262722A (en) * 2015-09-07 2016-01-20 深信服网络科技(深圳)有限公司 Terminal malicious traffic rule updating method, cloud server and security gateway
CN105610812A (en) * 2015-12-24 2016-05-25 北京奇虎科技有限公司 Method and device for preventing hijacking of webpage
CN105979020A (en) * 2015-03-12 2016-09-28 通用汽车有限责任公司 Enhancing dns availability
CN106161347A (en) * 2015-03-30 2016-11-23 中兴通讯股份有限公司 The control method of network security and device
CN106302384A (en) * 2016-07-25 2017-01-04 中国联合网络通信集团有限公司 DNS message processing method and device
CN106612239A (en) * 2015-10-22 2017-05-03 中国电信股份有限公司 A DNS query flow control method, device and system
CN106657422A (en) * 2015-10-30 2017-05-10 北京国双科技有限公司 Method, apparatus and system for crawling website page
CN106713309A (en) * 2016-12-21 2017-05-24 北京奇虎科技有限公司 Method and apparatus for reducing DNS hijacking risk
CN108924165A (en) * 2018-08-24 2018-11-30 北京和利时工业软件有限公司 A kind of Intranet remote access method and its device and Intranet gateway
CN110247897A (en) * 2019-05-20 2019-09-17 中国平安财产保险股份有限公司 A kind of system login method, equipment, gateway and computer readable storage medium
CN112565092A (en) * 2019-09-10 2021-03-26 阿自倍尔株式会社 Determining apparatus and determining method
CN114039799A (en) * 2021-12-10 2022-02-11 国网福建省电力有限公司 Network security protection system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102244613A (en) * 2011-08-11 2011-11-16 深信服网络科技(深圳)有限公司 DNS (domain name system)-based multilink traffic balancing method, gateway and network
CN102685074A (en) * 2011-03-14 2012-09-19 国基电子(上海)有限公司 Anti-phishing network communication system and method
CN102761500A (en) * 2011-04-26 2012-10-31 国基电子(上海)有限公司 Gateway and method for phishing defense
CN103269389A (en) * 2013-06-03 2013-08-28 北京奇虎科技有限公司 Method and device for detecting and repairing malicious DNS setting
US8578166B2 (en) * 2007-08-06 2013-11-05 Morgamon SA System and method for authentication, data transfer, and protection against phishing

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8578166B2 (en) * 2007-08-06 2013-11-05 Morgamon SA System and method for authentication, data transfer, and protection against phishing
CN102685074A (en) * 2011-03-14 2012-09-19 国基电子(上海)有限公司 Anti-phishing network communication system and method
CN102761500A (en) * 2011-04-26 2012-10-31 国基电子(上海)有限公司 Gateway and method for phishing defense
CN102244613A (en) * 2011-08-11 2011-11-16 深信服网络科技(深圳)有限公司 DNS (domain name system)-based multilink traffic balancing method, gateway and network
CN103269389A (en) * 2013-06-03 2013-08-28 北京奇虎科技有限公司 Method and device for detecting and repairing malicious DNS setting

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105979020A (en) * 2015-03-12 2016-09-28 通用汽车有限责任公司 Enhancing dns availability
CN105979020B (en) * 2015-03-12 2020-02-18 通用汽车有限责任公司 Method and device for improving DNS availability
CN106161347A (en) * 2015-03-30 2016-11-23 中兴通讯股份有限公司 The control method of network security and device
CN105262722A (en) * 2015-09-07 2016-01-20 深信服网络科技(深圳)有限公司 Terminal malicious traffic rule updating method, cloud server and security gateway
CN106612239A (en) * 2015-10-22 2017-05-03 中国电信股份有限公司 A DNS query flow control method, device and system
CN106657422A (en) * 2015-10-30 2017-05-10 北京国双科技有限公司 Method, apparatus and system for crawling website page
CN105610812B (en) * 2015-12-24 2019-12-06 北京奇虎科技有限公司 Method and device for preventing webpage from being hijacked
CN105610812A (en) * 2015-12-24 2016-05-25 北京奇虎科技有限公司 Method and device for preventing hijacking of webpage
CN106302384A (en) * 2016-07-25 2017-01-04 中国联合网络通信集团有限公司 DNS message processing method and device
CN106713309A (en) * 2016-12-21 2017-05-24 北京奇虎科技有限公司 Method and apparatus for reducing DNS hijacking risk
CN108924165A (en) * 2018-08-24 2018-11-30 北京和利时工业软件有限公司 A kind of Intranet remote access method and its device and Intranet gateway
CN110247897A (en) * 2019-05-20 2019-09-17 中国平安财产保险股份有限公司 A kind of system login method, equipment, gateway and computer readable storage medium
CN110247897B (en) * 2019-05-20 2023-04-07 中国平安财产保险股份有限公司 System login method, device, gateway and computer readable storage medium
CN112565092A (en) * 2019-09-10 2021-03-26 阿自倍尔株式会社 Determining apparatus and determining method
CN112565092B (en) * 2019-09-10 2023-02-28 阿自倍尔株式会社 Determining apparatus and determining method
CN114039799A (en) * 2021-12-10 2022-02-11 国网福建省电力有限公司 Network security protection system and method
CN114039799B (en) * 2021-12-10 2023-11-17 国网福建省电力有限公司 Network security protection system and method

Also Published As

Publication number Publication date
CN103916490B (en) 2017-05-24

Similar Documents

Publication Publication Date Title
CN103916490A (en) DNS tamper-proof method and device
WO2016006520A1 (en) Detection device, detection method and detection program
CN102685074B (en) Anti-phishing network communication system and method
CN109672680B (en) Cross-domain login method
CN104811449A (en) Base collision attack detecting method and system
CN108063833B (en) HTTP DNS analysis message processing method and device
CN104168339A (en) Method and device for preventing domain name from being intercepted
US8572366B1 (en) Authenticating clients
CN104410622A (en) Safety authentication method, client side and system for logging in Web system
CN105025025A (en) Cloud-platform-based domain name active detecting method and system
CN108156270B (en) Domain name request processing method and device
JP2015225500A (en) Authentication information theft detection method, authentication information theft detection device, and program
KR101996471B1 (en) Network Securing Device and Securing method Using The Same
CN104935551A (en) Webpage tampering protecting device and method thereof
CN111314381A (en) Safety isolation gateway
CN105530251A (en) Method and device for identifying phishing website
CN106790073B (en) Blocking method and device for malicious attack of Web server and firewall
CN112311722B (en) Access control method, device, equipment and computer readable storage medium
CN102223422A (en) Domain name system (DNS) message processing method and network safety equipment
CN103312724A (en) Domain name system (DNS) request authentication method and device
US8724506B2 (en) Detecting double attachment between a wired network and at least one wireless network
WO2019047693A1 (en) Method and device for carrying out wifi network security monitoring
US20230254281A1 (en) Local network device connection control
CN101771529A (en) Terminal apparatus, relay apparatus, processing method, recording medium, and data signal
CN103001928A (en) Communication method of terminals interconnected among different networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200611

Address after: Nanshan District Xueyuan Road in Shenzhen city of Guangdong province 518000 No. 1001 Nanshan Chi Park building A1 layer

Patentee after: SANGFOR TECHNOLOGIES Inc.

Address before: 518000 Nanshan Science and Technology Pioneering service center, No. 1 Qilin Road, Guangdong, Shenzhen 418, 419,

Patentee before: Shenxin network technology (Shenzhen) Co.,Ltd.

TR01 Transfer of patent right