CN106713309A - Method and apparatus for reducing DNS hijacking risk - Google Patents

Method and apparatus for reducing DNS hijacking risk Download PDF

Info

Publication number
CN106713309A
CN106713309A CN201611192329.8A CN201611192329A CN106713309A CN 106713309 A CN106713309 A CN 106713309A CN 201611192329 A CN201611192329 A CN 201611192329A CN 106713309 A CN106713309 A CN 106713309A
Authority
CN
China
Prior art keywords
dns server
configuration information
dynamic configuration
server address
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611192329.8A
Other languages
Chinese (zh)
Inventor
刘天
张建新
高永岗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201611192329.8A priority Critical patent/CN106713309A/en
Publication of CN106713309A publication Critical patent/CN106713309A/en
Priority to PCT/CN2017/117689 priority patent/WO2018113727A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • H04L61/5014Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]

Abstract

The invention provides a method and apparatus for reducing a DNS hijacking risk. The method comprises the following steps: sending a dynamic configuration request to a dynamic host configuration protocol DHCP device in a local area network; receiving dynamic configuration information returned by the DHCP, wherein the dynamic configuration information comprises a main primary domain name resolution system DNS server address; switching a dynamic configuration networking state to a static networking state, wherein the dynamic configuration networking state is a state of receiving the dynamic configuration information sent by the DHCP device and accessing the network based on the dynamic configuration information, the static networking state is a state of accessing the network according to static secure configuration information, and the main DNS server address of the secure configuration information is a target wide area network DNS server address; and accessing the network based on the secure configuration information.

Description

The method and apparatus that a kind of reduction DNS kidnaps risk
Technical field
The present invention relates to electronic technology field, more particularly to the method and apparatus that a kind of reduction DNS kidnaps risk.
Background technology
A kind of common LAN DNS (domain name analysis system, Domain Name System) abduction is attacker in office Build a pseudo- dns server for malicious act in the network of domain, and invade the LAN DHCP (DHCP, Dynamic Host Configuration Protocol) DHCP equipment is UE (user equipment, User by equipment Equipment) dns server address of distribution is revised as pseudo- dns server address.So, UE is based on DHCP dynamically distributes Network configuration is connected to pseudo- dns server, there is abduction risk.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on State the method and apparatus that the reduction DNS of problem kidnaps risk.
In a first aspect, the invention provides a kind of method that reduction DNS kidnaps risk, including:
Dynamic configuration requests are sent to the dynamic host configuration protocol DHCP equipment in LAN;
The dynamic configuration information that the DHCP is returned is received, the dynamic configuration information includes Main Domain resolution system Dns server address;
Net state in static state is switched to by net state in dynamic configuration, net state is described to receive in the dynamic configuration The dynamic configuration information that DHCP equipment sends, and the state based on the dynamic configuration information access network, the static state Upper net state is the state according to static security configuration information access network;The primary dns server of the security configuration information Address is target wide area network dns server address;
Based on the security configuration information access network.
Optionally, net state is switched in static state before net state on by dynamic configuration, is also included:
When the primary dns server address in the dynamic configuration information is lan address, the dynamic configuration is judged Whether the gateway address in information is consistent with the primary dns server address in the dynamic configuration information;
When the primary dns server address in the gateway address and the dynamic configuration information is inconsistent, it is determined that in the presence of LAN DNS kidnaps risk, perform described in the step of switch to net state in static state by net state in dynamic configuration.
Optionally, net state is switched in static state after net state on by dynamic configuration, is also included:
Obtain the target wide area network dns server address;
The target wide area network dns server address is defined as the primary dns server ground in the security configuration information Location.
Optionally, the target wide area network dns server address is obtained, including:
Detect the network connectivty of one or more wide area network dns servers;
The address of the optimal wide area network dns server of the network connectivty is defined as the target wide area network DNS clothes Business device address.
Optionally, net state is switched in static state after net state on by dynamic configuration, is also included:
Extract the primary dns server address in the dynamic configuration information or standby dns server address;
Primary dns server address in the dynamic configuration information or standby dns server address are defined as the peace Standby dns server address in full configuration information.
Second aspect, the invention provides the device that a kind of reduction DNS kidnaps risk, including:
Dynamic configuration requests module, for sending dynamic configuration to the dynamic host configuration protocol DHCP equipment in LAN Request;
Receiver module, for receiving the dynamic configuration information that the DHCP is returned, the dynamic configuration information includes master Domain name analysis system dns server address;
Handover module, it is netted in the dynamic configuration for switching to net state in static state by net state in dynamic configuration State is to receive the dynamic configuration information that the DHCP equipment sends, and the shape based on the dynamic configuration information access network State, the static upper net state is the state according to static security configuration information access network;The security configuration information Primary dns server address is target wide area network dns server address;
AM access module, for based on the security configuration information access network.
Optionally, described device also includes:
Judge module, switches in static state before net state for the net state on by dynamic configuration, when the dynamic is matched somebody with somebody When primary dns server address in confidence breath is lan address, the gateway address in the dynamic configuration information and institute are judged Whether the primary dns server address stated in dynamic configuration information is consistent;
First determining module, for when the primary dns server address in the gateway address and the dynamic configuration information When inconsistent, it is determined that there is LAN DNS kidnaps risk, and notify that the handover module is switched to by net state in dynamic configuration Net state in static state.
Optionally, described device also includes:
Acquisition module, switches in static state after net state for the net state on by dynamic configuration, obtains the target Wide area network dns server address;
Second determining module, for the target wide area network dns server address to be defined as into the security configuration information In primary dns server address.
Optionally, the acquisition module is used to detect the network connectivty of one or more wide area network dns servers;By institute The address for stating the optimal wide area network dns server of network connectivty is defined as the target wide area network dns server address.
Optionally, described device also includes:
Extraction module, switches in static state after net state for the net state on by dynamic configuration, extracts the dynamic Primary dns server address or standby dns server address in configuration information;
3rd determining module, for by the primary dns server address in the dynamic configuration information or for dns server Address is defined as the standby dns server address in the security configuration information.
The technical scheme provided in the embodiment of the present application, at least has the following technical effect that or advantage:
In the technical scheme of the embodiment of the present invention, dynamic configuration requests are sent to the DHCP equipment in LAN first, And the dynamic configuration information that DHCP is returned is received, dynamic configuration information includes primary dns server address, then by dynamic configuration Upper net state switches to net state in static state.Net state is the shape according to static security configuration information access network in static state State, and the primary dns server address of security configuration information is target wide area network dns server address.Due to kidnapping wide area network DNS The difficulty of server is generally very big, and after kidnapping and occurring, and the attendant of wide area network dns server can have found different in time Often and it is rapid repair, so relative access to LAN dns server, it is lower to access the risk that wide area network dns server is held as a hostage, Security is higher.So, the present invention is realized reduces the risk that DNS is kidnapped.
Described above is only the general introduction of technical solution of the present invention, in order to better understand technological means of the invention, And can be practiced according to the content of specification, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by specific embodiment of the invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 is the method flow diagram of reduction DNS abduction risks in the embodiment of the present invention;
Fig. 2 is the apparatus structure schematic diagram of reduction DNS abduction risks in the embodiment of the present invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.Conversely, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
The method and apparatus that a kind of reduction DNS kidnaps risk are the embodiment of the invention provides, is used to reduce DNS abduction wind Danger.Fig. 1 is refer to, is the method flow diagram of reduction DNS abduction risks in the embodiment of the present invention, the method includes:
S101:Dynamic configuration requests are sent to the dynamic host configuration protocol DHCP equipment in LAN;
S102:Receive the dynamic configuration information that the DHCP is returned;
S103:Net state in static state is switched to by net state in dynamic configuration, net state is reception in the dynamic configuration The dynamic configuration information that the DHCP equipment sends, and the state based on the dynamic configuration information access network, it is described Net state is the state according to static security configuration information access network in static state;The main DNS clothes of the security configuration information Business device address is target wide area network dns server address;
S104:Based on the security configuration information access network.
Specifically, when UE needs to access a LAN, can be to DHCP (the dynamic host configuration associations in the LAN View, Dynamic Host Configuration Protocol) equipment transmission dynamic configuration requests, to ask DHCP equipment to be UE configures dynamic configuration information.Then, DHCP equipment receive UE transmission dynamic configuration requests after, according to dynamic configuration plan Slightly, it is UE configuration dynamic configuration informations, and the dynamic configuration information that will be configured returns to UE.And then, UE is received in S102 The dynamic configuration information that DHCP equipment sends.
In embodiments of the present invention, dynamic configuration information includes primary dns server address.During implementing, move State configuration information still further comprises gateway address, IP (Internet protocol, Internet Protocol) address, subnet mask With standby dns server address.
Next, due to that cannot confirm now whether LAN occurs DNS and kidnap, so in S103, UE is by upper net state Net state in static state is switched to by dynamic configuration status.
Specifically, the UE in the embodiment of the present invention has two kinds of upper net states, specially in dynamic configuration net state and Net state in static state.During implementing, net state on other can also be included, the present invention is not particularly limited.Wherein, Net state is to receive the dynamic configuration information that DHCP sends in dynamic configuration, and the shape based on dynamic configuration information access network State.In other words, under net state in dynamic configuration, UE will access dynamic according to the IP address in dynamic configuration information and subnet mask Main DNS in gateway and dynamic configuration information in state configuration information indicated by gateway address indicated by primary dns server address Server (or the standby dns server indicated by standby dns server address).And static upper net state is then according to static safety The state of configuration information access network.Wherein, the security configuration information during the present invention is implemented at least includes primary dns server ground Primary dns server address in location, and security configuration information is the target wide area network dns server address of known safety.When So, security configuration information can further include IP address, subnet mask, gateway address and standby dns server address, this hair It is bright to be not particularly limited.
Next, in S104, based on security configuration information access network, and then when dns server is accessed, will access Wide area network dns server, rather than access to LAN dns server.
Because the difficulty for kidnapping wide area network dns server is generally very big, and after generation is kidnapped, wide area network DNS service The attendant of device can in time note abnormalities and repair rapidly, so relative access to LAN dns server, accesses wide area network The risk that dns server is held as a hostage is lower, and security is higher.So, the present invention is realized reduces the risk that DNS is kidnapped.
As a kind of optional implementation, before the S103 of the embodiment of the present invention, can further include:
When the primary dns server address in the dynamic configuration information is lan address, the dynamic configuration is judged Whether the gateway address in information is consistent with the primary dns server address in the dynamic configuration information;
When the primary dns server address in the gateway address and the dynamic configuration information is inconsistent, it is determined that in the presence of LAN DNS kidnaps risk, perform described in the step of switch to net state in static state by net state in dynamic configuration.
Specifically, UE obtains the primary dns server address in dynamic configuration information, then judges the primary dns server Whether address is lan address.Wherein, judge whether the primary dns server address in dynamic configuration information is local entoilage Whether location, be in ClassA, ClassB or ClassC specifically by the main dns address judged in dynamic configuration information It is interval.Wherein, ClassA interval address realm is 10.0.0.0~10.255.255.255, ClassB interval address realm It is 172.16.0.0-172.31.255.255, the address realm in ClassC regions is 192.168.0.0- 192.168.255.255.If the primary dns server address of dynamic configuration information is located in ClassA, ClassB or ClassC Any one interval in, then it represents that primary dns server address in dynamic configuration information is lan address;, whereas if Primary dns server address in dynamic configuration information is not in ClassA, ClassB and ClassC interval, then it represents that dynamic configuration Primary dns server address in information is not lan address.
Further, if the primary dns server address that DHCP equipment is configured is lan address, generally under request, The gateway address that DHCP equipment is configured is consistent with primary dns server address, for example, be all 192.168.1.1, therefore, when Primary dns server address in dynamic configuration information is the gateway address and main DNS in lan address, and dynamic configuration information Server address is consistent, represents that current LAN dns server is normal, and the possibility being held as a hostage is relatively low.Conversely, working as dynamic configuration Primary dns server address in information is lan address, and gateway address and the primary dns server ground in dynamic configuration information Location is inconsistent, then it represents that the primary dns server exception in LAN, may be held as a hostage.So, in embodiment of the present invention S104 In, when the primary dns server address in gateway address and dynamic configuration information in dynamic configuration information is inconsistent, will determine There is currently LAN DNS and kidnap risk.
Further, when UE determines that there is LAN DNS kidnaps risk, prompt message can be exported to user, for example, is shown Show the text information of " current local area network has risk " or play warning tones etc., to point out the timely local area network DNS of user to rob Risk is held to be processed.
After it is determined that there is LAN DNS abduction risks, if continued with net state access network in dynamic configuration, may The danger such as cause user's property loss, stealthy information stolen, so now UE performs S103, is switched by net state in dynamic configuration To static upper net state, and according to security configuration information access network.
By foregoing description as can be seen that when the primary dns server address of dynamic configuration information is lan address, passing through Judge whether the gateway address in dynamic configuration information is consistent with primary dns server address and detect LAN safety, and in net Determine that there is LAN DNS kidnaps risk, is achieved that and detect in a local network when closing address and inconsistent primary dns server DNS kidnaps the technique effect of risk.Meanwhile, according still further to net state access network in static state when it is determined that there is LAN DNS risks Network, it is to avoid the power consumption that UE frequently accesses wide area network dns server and brings is high and the problems such as slow networking speed.
In embodiments of the present invention, security configuration information can be the default information for prestoring.For example in advance will acquiescence It is the IP address of safety, subnet mask, gateway address, primary dns server address (i.e. target wide area network dns server address) and standby Dns server address is stored as security configuration information, being switched in static state after net state, then reads the safety for prestoring and matches somebody with somebody Confidence ceases.Or, security configuration information can also be generated based on user input.For example, user is known according to prompt message working as When preceding LAN has DNS abduction risks, safe IP address, subnet mask, gateway address, primary dns server are voluntarily input into Address (i.e. target wide area network dns server address) and standby dns server address, so UE according to the IP address of user input, Subnet mask, gateway address, primary dns server address and standby dns server address generate security configuration information.Or, safety Configuration information can also be to switch to be generated according to actual conditions after net state in static state.
And then, with reference to any of the above-described embodiment, as a kind of optional embodiment, the net state switching on by dynamic configuration On to static state after net state, can further include:
Obtain the target wide area network dns server address;
Using the target wide area network dns server address as the primary dns server address in the security configuration information.
Specifically, it is being switched in static state after net state, UE obtains target wide area network dns server address.Wherein, mesh Mark wide area network dns server can be currently able to access one or more wide area network dns servers in any one, enter And UE obtains the address of any one wide area network dns server as target wide area network dns server address.Or, in order to keep away Exempt from not connecting wide area network dns server or connection speed is slow, can also be according to the geographical position of each wide area network dns server Put, the address for obtaining the wide area network dns server nearest apart from UE is the address of target wide area network dns server.Or, also may be used With by following Procedure Acquisition target wide area network dns server address:
Detect the network connectivty of one or more wide area network dns servers;
The address of the optimal wide area network dns server of the network connectivty is defined as the target wide area network DNS clothes The address of business device.
Specifically, UE is detected to the network connectivty of one or more wide area network dns servers.Wherein, this hair Network connectivty in bright embodiment represents switching performance of the wide area network dns server for UE, and network connectivty can include Whether wide area network dns server has access to, accesses the time-consuming of the wide area network dns server, the band of the wide area network dns server The wide, load capacity of the wide area network dns server and geographical position etc., the present invention is not particularly limited.
UE measurements obtain whether each wide area network dns server has access to, accesses time-consuming, bandwidth, load capacity and geography Position etc., and then obtain the network connectivty of each wide area network dns server.
During implementing, obtaining the method for the network connectivty of each wide area network dns server has various, this hair Bright those of ordinary skill in the art can be according to actually being selected, and the present invention is not particularly limited.
For example, in advance for the parameter type of each wide area network dns server sets weight, then according to each wide area network The parameter of dns server calculates the weights of each wide area network dns server, and then the weights of wide area network dns server are made It is the network connectivty of the wide area network dns server.As an example it is assumed that UE needs to measure the parameter of wide area network dns server Whether type can be whether that the parameter type having access to sets 0.5 to have access to, accessing time-consuming and geographic distance, then Weight, is the weight of the parameter type setting -0.2 of geographic distance to access the weight that time-consuming parameter type sets -0.3.It is right First wide area network dns server is measured, and measurement obtains first wide area network dns server can not be accessed, turn-on time Time-out (assuming that time-out time is 3 minutes, time-out is calculated by time-out time), geographic distance 10km.To second wide area network DNS clothes Business device is measured, and measurement obtains second wide area network dns server can be accessed, 0.5 minute turn-on time, geographic distance 8km. So, first weights of wide area network dns server is 0*0.5-0.3*3-0.2*10=-2.9, second wide area network DNS clothes The weights of business device are 1*0.5-0.3*0.5-0.2*8=-1.25.As can be seen here, the weights of second wide area network dns server are big In first weights of wide area network dns server, so second network connectivty of wide area network dns server is better than first The network connectivty of wide area network dns server.
Next, in embodiments of the present invention, the optimal wide area network dns server of network connectivty that UE will be measured Address is defined as the address of target wide area network dns server.
Seen from the above description, by wide area network DNS that network connectivty in one or more wide area network dns servers is optimal The address of server makes UE have access to the optimal wide area network of network connectivty as the address of target wide area network dns server Dns server, and then reduce and do not connect wide area network dns server or the slow probability of connection speed.
Further, after target wide area network dns server address is obtained, UE is by the address of target wide area network dns server Used as the primary dns server address in security configuration information, and then UE is accessing primary dns server based on security configuration information When, wide area network dns server will be accessed, rather than the LAN dns server accessed in the presence of abduction risk.
Because the difficulty for kidnapping wide area network dns server is generally very big, and after generation is kidnapped, wide area network DNS service The attendant of device can in time note abnormalities and repair rapidly, so relative access to LAN dns server, accesses wide area network The risk that dns server is held as a hostage is lower, and security is higher.So, the present invention is realized reduces the risk that DNS is kidnapped.
Further, the security configuration information in the embodiment of the present invention also includes standby dns server address.For security configuration The standby dns server address of information, also there is various possibility.Specifically, it is similar with primary dns server address, standby dns server Address can also be the default information for prestoring, or user input address.Or, be switched in static state net state it Afterwards, the address of the optimal wide area network dns server of network connectivty is defined as UE the primary dns server ground of security configuration information Location, the address that then network connectivty is only second to another wide area network dns server of target wide area network dns server determines Standby dns server address in for security configuration information.Or, after switching to static online by net state in dynamic configuration, Can further include:
Extract the primary dns server address in the dynamic configuration information or standby dns server address;
Primary dns server address in the dynamic configuration information or standby dns server address are defined as the peace Standby dns server address in full configuration information.
Specifically, another implementation for determining the standby dns server address in security configuration information is that UE is cutting Change in static state after net state, extract the primary dns server address in dynamic configuration information or standby dns server address, then The primary dns server address of the dynamic configuration information that will be extracted or standby dns server address are defined as security configuration information Standby dns server address.
Further, during implementing, the primary dns server in LAN is relatively generally more reliable for dns server, And be easier to find failure and modified in time, so the primary dns server address in dynamic configuration information is defined as Standby dns server address in security configuration information is preferably selection.
In addition, for the IP address in security configuration information, subnet mask and gateway address etc., it is also possible to directly using dynamic IP address, subnet mask and gateway address in state configuration information, the present invention are not particularly limited.
Based on the inventive concept same with the method that DNS abduction risks are reduced in previous embodiment, second aspect present invention The device that a kind of reduction DNS kidnaps risk is also provided, as shown in Fig. 2 including:
Dynamic configuration requests module 101, for sending dynamic to the dynamic host configuration protocol DHCP equipment in LAN Configuring request;
Receiver module 102, for receiving the dynamic configuration information that the DHCP is returned, the dynamic configuration information includes Main Domain resolution system dns server address;
Handover module 103, for switching to net state in static state, the dynamic configuration online by net state in dynamic configuration State is to receive the dynamic configuration information that the DHCP equipment sends, and based on the dynamic configuration information access network State, the static upper net state is the state according to static security configuration information access network;The security configuration information Primary dns server address be target wide area network dns server address;
AM access module 104, for based on the security configuration information access network.
Further, the device in the embodiment of the present invention also includes:
Judge module, switches in static state before net state for the net state on by dynamic configuration, when the dynamic is matched somebody with somebody When primary dns server address in confidence breath is lan address, the gateway address in the dynamic configuration information and institute are judged Whether the primary dns server address stated in dynamic configuration information is consistent;
First determining module, for when the primary dns server address in the gateway address and the dynamic configuration information When inconsistent, it is determined that there is LAN DNS kidnaps risk, and notify that the handover module is switched to by net state in dynamic configuration Net state in static state.
Further, the device in the embodiment of the present invention also includes:
Acquisition module, switches in static state after net state for the net state on by dynamic configuration, obtains the target Wide area network dns server address;
Second determining module, for the target wide area network dns server address to be defined as into the security configuration information In primary dns server address.
Wherein, acquisition module is used to detect the network connectivty of one or more wide area network dns servers;By the network The address of connective optimal wide area network dns server is defined as the target wide area network dns server address.
Further, the device in the embodiment of the present invention also includes:
Extraction module, switches in static state after net state for the net state on by dynamic configuration, extracts the dynamic Primary dns server address or standby dns server address in configuration information;
3rd determining module, for by the primary dns server address in the dynamic configuration information or for dns server Address is defined as the standby dns server address in the security configuration information.
The various change mode and instantiation that reduction DNS in the embodiment of earlier figures 1 kidnaps the method for risk are equally fitted Reduction DNS for the present embodiment kidnaps the device of risk, is retouched by foregoing the detailed of method for kidnapping reducing DNS risk State, those skilled in the art reduce the implementation that DNS kidnaps the device of risk in being clear that the present embodiment, so It is succinct for specification, will not be described in detail herein.
The technical scheme provided in the embodiment of the present application, at least has the following technical effect that or advantage:
In the technical scheme of the embodiment of the present invention, dynamic configuration requests are sent to the DHCP equipment in LAN first, And the dynamic configuration information that DHCP is returned is received, dynamic configuration information includes primary dns server address, then by dynamic configuration Upper net state switches to net state in static state.Net state is the shape according to static security configuration information access network in static state State, and the primary dns server address of security configuration information is target wide area network dns server address.Due to kidnapping wide area network DNS The difficulty of server is generally very big, and after kidnapping and occurring, and the attendant of wide area network dns server can have found different in time Often and it is rapid repair, so relative access to LAN dns server, it is lower to access the risk that wide area network dns server is held as a hostage, Security is higher.So, the present invention is realized reduces the risk that DNS is kidnapped.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system Structure be obvious.Additionally, the present invention is not also directed to any certain programmed language.It is understood that, it is possible to use it is various Programming language realizes the content of invention described herein, and the description done to language-specific above is to disclose this hair Bright preferred forms.
In specification mentioned herein, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be put into practice in the case of without these details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify one or more that the disclosure and helping understands in each inventive aspect, exist Above to the description of exemplary embodiment of the invention in, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield features more more than the feature being expressly recited in each claim.More precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, and wherein each claim is in itself All as separate embodiments of the invention.
Those skilled in the art are appreciated that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Unit or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, can use any Combine to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit is required, summary and accompanying drawing) disclosed in each feature can the alternative features of or similar purpose identical, equivalent by offer carry out generation Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments in this include institute in other embodiments Including some features rather than further feature, but the combination of the feature of different embodiments means in the scope of the present invention Within and form different embodiments.For example, in the following claims, embodiment required for protection it is any it One mode can use in any combination.
All parts embodiment of the invention can be realized with hardware, or be run with one or more processor Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) are come in realizing gateway according to embodiments of the present invention, proxy server, system Some or all parts some or all functions.The present invention is also implemented as performing side as described herein Some or all equipment or program of device (for example, computer program and computer program product) of method.It is such Realize that program of the invention can be stored on a computer-readable medium, or there can be the shape of one or more signal Formula.Such signal can be downloaded from internet website and obtained, or be provided on carrier signal, or with any other shape Formula is provided.
It should be noted that above-described embodiment the present invention will be described rather than limiting the invention, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol being located between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not Element listed in the claims or step.Word "a" or "an" before element is not excluded the presence of as multiple Element.The present invention can come real by means of the hardware for including some different elements and by means of properly programmed computer It is existing.If in the unit claim for listing equipment for drying, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.
The invention discloses a kind of method that A1, reduction DNS kidnap risk, it is characterised in that including:
Dynamic configuration requests are sent to the dynamic host configuration protocol DHCP equipment in LAN;
The dynamic configuration information that the DHCP is returned is received, the dynamic configuration information includes Main Domain resolution system Dns server address;
Net state in static state is switched to by net state in dynamic configuration, net state is described to receive in the dynamic configuration The dynamic configuration information that DHCP equipment sends, and the state based on the dynamic configuration information access network, the static state Upper net state is the state according to static security configuration information access network;The primary dns server of the security configuration information Address is target wide area network dns server address;
Based on the security configuration information access network.
A2, the method according to A1, it is characterised in that net state switches to net state in static state on by dynamic configuration Before, also include:
When the primary dns server address in the dynamic configuration information is lan address, the dynamic configuration is judged Whether the gateway address in information is consistent with the primary dns server address in the dynamic configuration information;
When the primary dns server address in the gateway address and the dynamic configuration information is inconsistent, it is determined that in the presence of LAN DNS kidnaps risk, perform described in the step of switch to net state in static state by net state in dynamic configuration.
A3, the method according to A1 or A2, it is characterised in that net state switches to static online on by dynamic configuration After state, also include:
Obtain the target wide area network dns server address;
The target wide area network dns server address is defined as the primary dns server ground in the security configuration information Location.
A4, the method according to A3, it is characterised in that obtain the target wide area network dns server address, including:
Detect the network connectivty of one or more wide area network dns servers;
The address of the optimal wide area network dns server of the network connectivty is defined as the target wide area network DNS clothes Business device address.
A5, the method according to A1 or A2, it is characterised in that net state switches to static online on by dynamic configuration After state, also include:
Extract the primary dns server address in the dynamic configuration information or standby dns server address;
Primary dns server address in the dynamic configuration information or standby dns server address are defined as the peace Standby dns server address in full configuration information.
B6, a kind of reduction DNS kidnap the device of risk, it is characterised in that including:
Dynamic configuration requests module, for sending dynamic configuration to the dynamic host configuration protocol DHCP equipment in LAN Request;
Receiver module, for receiving the dynamic configuration information that the DHCP is returned, the dynamic configuration information includes master Domain name analysis system dns server address;
Handover module, it is netted in the dynamic configuration for switching to net state in static state by net state in dynamic configuration State is to receive the dynamic configuration information that the DHCP equipment sends, and the shape based on the dynamic configuration information access network State, the static upper net state is the state according to static security configuration information access network;The security configuration information Primary dns server address is target wide area network dns server address;
AM access module, for based on the security configuration information access network.
B7, the device according to B6, it is characterised in that described device also includes:
Judge module, switches in static state before net state for the net state on by dynamic configuration, when the dynamic is matched somebody with somebody When primary dns server address in confidence breath is lan address, the gateway address in the dynamic configuration information and institute are judged Whether the primary dns server address stated in dynamic configuration information is consistent;
First determining module, for when the primary dns server address in the gateway address and the dynamic configuration information When inconsistent, it is determined that there is LAN DNS kidnaps risk, and notify that the handover module is switched to by net state in dynamic configuration Net state in static state.
B8, the device according to B6 or B7, it is characterised in that described device also includes:
Acquisition module, switches in static state after net state for the net state on by dynamic configuration, obtains the target Wide area network dns server address;
Second determining module, for the target wide area network dns server address to be defined as into the security configuration information In primary dns server address.
B9, the device according to B8, it is characterised in that the acquisition module is used to detect one or more wide area networks The network connectivty of dns server;The address of the optimal wide area network dns server of the network connectivty is defined as the mesh Mark wide area network dns server address.
B10, the device according to B6 or B7, it is characterised in that described device also includes:
Extraction module, switches in static state after net state for the net state on by dynamic configuration, extracts the dynamic Primary dns server address or standby dns server address in configuration information;
3rd determining module, for by the primary dns server address in the dynamic configuration information or for dns server Address is defined as the standby dns server address in the security configuration information.

Claims (10)

1. a kind of method that reduction DNS kidnaps risk, it is characterised in that including:
Dynamic configuration requests are sent to the dynamic host configuration protocol DHCP equipment in LAN;
The dynamic configuration information that the DHCP is returned is received, the dynamic configuration information includes that Main Domain resolution system DNS takes Business device address;
Net state in static state is switched to by net state in dynamic configuration, net state sets to receive the DHCP in the dynamic configuration The dynamic configuration information that preparation is sent, and the state based on the dynamic configuration information access network, it is described static netted State is the state according to static security configuration information access network;The primary dns server address of the security configuration information is Target wide area network dns server address;
Based on the security configuration information access network.
2. the method for claim 1, it is characterised in that net state switches to net state in static state on by dynamic configuration Before, also include:
When the primary dns server address in the dynamic configuration information is lan address, the dynamic configuration information is judged In gateway address it is whether consistent with the primary dns server address in the dynamic configuration information;
When the primary dns server address in the gateway address and the dynamic configuration information is inconsistent, it is determined that there is local Net DNS kidnaps risk, perform described in the step of switch to net state in static state by net state in dynamic configuration.
3. method as claimed in claim 1 or 2, it is characterised in that net state switches to static online on by dynamic configuration After state, also include:
Obtain the target wide area network dns server address;
The target wide area network dns server address is defined as the primary dns server address in the security configuration information.
4. method as claimed in claim 3, it is characterised in that obtain the target wide area network dns server address, including:
Detect the network connectivty of one or more wide area network dns servers;
The address of the optimal wide area network dns server of the network connectivty is defined as the target wide area network dns server Address.
5. method as claimed in claim 1 or 2, it is characterised in that net state switches to static online on by dynamic configuration After state, also include:
Extract the primary dns server address in the dynamic configuration information or standby dns server address;
Primary dns server address in the dynamic configuration information or standby dns server address are defined as the safety and matched somebody with somebody Standby dns server address in confidence breath.
6. a kind of reduction DNS kidnaps the device of risk, it is characterised in that including:
Dynamic configuration requests module, please for sending dynamic configuration to the dynamic host configuration protocol DHCP equipment in LAN Ask;
Receiver module, for receiving the dynamic configuration information that the DHCP is returned, the dynamic configuration information includes Main Domain Resolution system dns server address;
Handover module, for switching to net state in static state by net state in dynamic configuration, net state is in the dynamic configuration The dynamic configuration information that the DHCP equipment sends, and the state based on the dynamic configuration information access network are received, The static upper net state is the state according to static security configuration information access network;The master of the security configuration information Dns server address is target wide area network dns server address;
AM access module, for based on the security configuration information access network.
7. device as claimed in claim 6, it is characterised in that described device also includes:
Judge module, switches in static state before net state for the net state on by dynamic configuration, when dynamic configuration letter When primary dns server address in breath is lan address, judges the gateway address in the dynamic configuration information and described move Whether the primary dns server address in state configuration information is consistent;
First determining module, for differing when the primary dns server address in the gateway address and the dynamic configuration information During cause, it is determined that there is LAN DNS kidnaps risk, and notify that the handover module switches to static state by net state in dynamic configuration Upper net state.
8. device as claimed in claims 6 or 7, it is characterised in that described device also includes:
Acquisition module, switches in static state after net state for the net state on by dynamic configuration, obtains the target wide area Net dns server address;
Second determining module, for the target wide area network dns server address to be defined as in the security configuration information Primary dns server address.
9. device as claimed in claim 8, it is characterised in that the acquisition module is used to detect one or more wide area networks The network connectivty of dns server;The address of the optimal wide area network dns server of the network connectivty is defined as the mesh Mark wide area network dns server address.
10. device as claimed in claims 6 or 7, it is characterised in that described device also includes:
Extraction module, switches in static state after net state for the net state on by dynamic configuration, extracts the dynamic configuration Primary dns server address or standby dns server address in information;
3rd determining module, for by the primary dns server address in the dynamic configuration information or for dns server address It is defined as the standby dns server address in the security configuration information.
CN201611192329.8A 2016-12-21 2016-12-21 Method and apparatus for reducing DNS hijacking risk Pending CN106713309A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201611192329.8A CN106713309A (en) 2016-12-21 2016-12-21 Method and apparatus for reducing DNS hijacking risk
PCT/CN2017/117689 WO2018113727A1 (en) 2016-12-21 2017-12-21 Method and apparatus for reducing the risk of dns hijacking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611192329.8A CN106713309A (en) 2016-12-21 2016-12-21 Method and apparatus for reducing DNS hijacking risk

Publications (1)

Publication Number Publication Date
CN106713309A true CN106713309A (en) 2017-05-24

Family

ID=58938530

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611192329.8A Pending CN106713309A (en) 2016-12-21 2016-12-21 Method and apparatus for reducing DNS hijacking risk

Country Status (2)

Country Link
CN (1) CN106713309A (en)
WO (1) WO2018113727A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113727A1 (en) * 2016-12-21 2018-06-28 北京奇虎科技有限公司 Method and apparatus for reducing the risk of dns hijacking
WO2018113729A1 (en) * 2016-12-21 2018-06-28 北京奇虎科技有限公司 Method and apparatus for detecting local area network dns hijacking
WO2018113731A1 (en) * 2016-12-21 2018-06-28 北京奇虎科技有限公司 Method and device for reducing risk of dns hijacking

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040083306A1 (en) * 2002-10-24 2004-04-29 International Business Machines Corporation Method and apparatus for maintaining internet domain name data
CN103561121A (en) * 2013-10-11 2014-02-05 北京奇虎科技有限公司 Method and device for analyzing DNS and browser
CN103916490A (en) * 2014-04-03 2014-07-09 深信服网络科技(深圳)有限公司 DNS tamper-proof method and device
CN104468866A (en) * 2014-12-26 2015-03-25 陈晨 Fast roaming method for multi-gateway terminal in wireless local area network
CN105142243A (en) * 2015-08-14 2015-12-09 江苏轩博电子科技有限公司 Intelligent double-channel broadband gateway and working method of intelligent broadband gateway

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105262858B (en) * 2015-11-06 2018-09-11 北京金山安全软件有限公司 Method and device for detecting safety of Domain Name System (DNS) server
CN106713311B (en) * 2016-12-21 2021-01-15 北京奇虎科技有限公司 Method and device for reducing DNS hijacking risk
CN106713309A (en) * 2016-12-21 2017-05-24 北京奇虎科技有限公司 Method and apparatus for reducing DNS hijacking risk

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040083306A1 (en) * 2002-10-24 2004-04-29 International Business Machines Corporation Method and apparatus for maintaining internet domain name data
CN103561121A (en) * 2013-10-11 2014-02-05 北京奇虎科技有限公司 Method and device for analyzing DNS and browser
CN103916490A (en) * 2014-04-03 2014-07-09 深信服网络科技(深圳)有限公司 DNS tamper-proof method and device
CN104468866A (en) * 2014-12-26 2015-03-25 陈晨 Fast roaming method for multi-gateway terminal in wireless local area network
CN105142243A (en) * 2015-08-14 2015-12-09 江苏轩博电子科技有限公司 Intelligent double-channel broadband gateway and working method of intelligent broadband gateway

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113727A1 (en) * 2016-12-21 2018-06-28 北京奇虎科技有限公司 Method and apparatus for reducing the risk of dns hijacking
WO2018113729A1 (en) * 2016-12-21 2018-06-28 北京奇虎科技有限公司 Method and apparatus for detecting local area network dns hijacking
WO2018113731A1 (en) * 2016-12-21 2018-06-28 北京奇虎科技有限公司 Method and device for reducing risk of dns hijacking

Also Published As

Publication number Publication date
WO2018113727A1 (en) 2018-06-28

Similar Documents

Publication Publication Date Title
CN103957201B (en) Domain-name information processing method based on DNS, apparatus and system
US8640239B2 (en) Network intrusion detection in a network that includes a distributed virtual switch fabric
RU2583703C2 (en) Malicious attack detection and analysis
CN105745869B (en) For regional network/home network security gateway
CN109714312B (en) Acquisition strategy generation method and system based on external threats
US9648033B2 (en) System for detecting the presence of rogue domain name service providers through passive monitoring
CN107483572A (en) The dispositions method and device of a kind of server
CN104484259A (en) Application program traffic monitoring method and device, and mobile terminal
CN106713311B (en) Method and device for reducing DNS hijacking risk
CN105897947B (en) The Network Access Method and device of mobile terminal
US20150156069A1 (en) Method and Apparatus for Configuring Proxy Server
CN103095778A (en) Web application firewall and web application safety protection method
CN104168339A (en) Method and device for preventing domain name from being intercepted
CN106713309A (en) Method and apparatus for reducing DNS hijacking risk
CN107689965A (en) Means of defence, the apparatus and system of the network equipment
CN106685891A (en) Verification method and apparatus for accessing network
CN101150583A (en) Anti-virus method and device for terminal device
CN106656636A (en) Cloud platform fault detection method and device
CN106209918A (en) The method of a kind of internet security management and terminal
CN114745356B (en) Domain name resolution method, device, equipment and readable storage medium
McLaughlin et al. Secure communications in smart grid: Networking and protocols
CN106506544B (en) A kind of method and apparatus that local area network DNS kidnaps detection
CN106790077A (en) A kind of DNS full flows kidnap the detection method and device of risk
CN108333449B (en) Online monitoring method and device for transformer substation equipment
CN106790071B (en) Method and device for detecting DNS full-flow hijacking risk

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170524