CN108650211A - A kind of detection method and device of DNS abduction - Google Patents

A kind of detection method and device of DNS abduction Download PDF

Info

Publication number
CN108650211A
CN108650211A CN201810209928.9A CN201810209928A CN108650211A CN 108650211 A CN108650211 A CN 108650211A CN 201810209928 A CN201810209928 A CN 201810209928A CN 108650211 A CN108650211 A CN 108650211A
Authority
CN
China
Prior art keywords
address
domain name
servers
request
analysis request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810209928.9A
Other languages
Chinese (zh)
Inventor
陈归
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing QIYI Century Science and Technology Co Ltd
Original Assignee
Beijing QIYI Century Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing QIYI Century Science and Technology Co Ltd filed Critical Beijing QIYI Century Science and Technology Co Ltd
Priority to CN201810209928.9A priority Critical patent/CN108650211A/en
Publication of CN108650211A publication Critical patent/CN108650211A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

An embodiment of the present invention provides a kind of DNS detection methods kidnapped and device, this method and device are applied to DNS systems, specially:When user sends out domain name mapping request, obtains local dns server and domain name mapping request is carried out parsing obtained first IP address;It translates domain names into request and is sent to HTTPDNS servers;It obtains HTTPDNS servers domain name mapping request is carried out parsing obtained second IP address;If the first IP address is different from the second IP address, the information warning that domain name analysis request is held as a hostage is returned to user.By issuing the user with information warning when kidnapping, user can be made to stop accessing the wrong content server pointed by the domain name being held as a hostage, user even can further take corresponding Disposal Measures according to the information warning, so as to avoid the normal access for influencing user to internet because DNS is kidnapped.

Description

A kind of detection method and device of DNS abduction
Technical field
The present invention relates to Internet technical fields, more particularly to a kind of DNS detection methods kidnapped and device.
Background technology
DNS, which is kidnapped, is also known as Domain Hijacking, refers to that domain name mapping request is intercepted in the network range of abduction, analysis request Domain name, and the request other than examination scope is let pass, false IP address is otherwise returned to, or do nothing that request is made to lose It goes to respond, effect is exactly to prevent specific network from reacting or making user to access false network address.
Key foundation service of the dns server as internet will influence the big portion of internet once there is DNS abduction The normal operation of separate service can not carry out normal network access thereby using family, or even cause economic loss to user.
Invention content
In view of this, the present invention provides a kind of DNS detection methods kidnapped and devices, to avoid shadow due to DNS is kidnapped Ring normal access of the user to internet.
To solve the above-mentioned problems, the invention discloses the detection methods that a kind of DNS is kidnapped, and are applied to DNS systems, described Detection method includes step:
When user sends out domain name mapping request, obtains local dns server and domain name analysis request is parsed Obtained first IP address;
Domain name analysis request is sent to HTTPDNS servers;
HTTPDNS servers are obtained domain name analysis request is carried out to parse obtained second IP address;
If first IP address is different from second IP address, domain name analysis request quilt is returned to user The information warning of abduction.
Optionally, described that domain name analysis request is sent to HTTPDNS servers, including:
An IP address is randomly selected from HTTPDNS server ip lists;
Domain name analysis request is sent to the HTTPDNS servers corresponding to selected IP address.
Optionally, further include step:
If the HTTPDNS servers are overtime to the parsing of domain name analysis request or can not return to the 2nd IP Domain name analysis request is then sent to URP servers by address;
The URP servers are obtained domain name analysis request is carried out to parse obtained third IP address;
If first IP address is different from the third IP address, domain name analysis request quilt is returned to user The information warning of abduction.
Optionally, described that domain name analysis request is sent to URP servers, including:
An IP address is randomly selected from URP server ip lists;
Domain name analysis request is sent to the URP servers corresponding to selected IP address.
Optionally, further include step:
If the URP servers are to the parsing of domain name analysis request time-out or with can not returning to the 3rd IP Domain name analysis request is then sent to Authoritative DNS server by location;
The Authoritative DNS server is obtained domain name analysis request is carried out to parse obtained 4th IP address;
If first IP address is different from the 4th IP address, domain name analysis request quilt is returned to user The information warning of abduction.
Optionally, described that domain name analysis request is sent to Authoritative DNS server, including:
An IP address is randomly selected from Authoritative DNS server IP lists;
Domain name analysis request is sent to the Authoritative DNS server corresponding to selected IP address.
Correspondingly, in order to ensure the implementation of the above method, the present invention also provides the detection devices that a kind of DNS is kidnapped, and answer For DNS systems, the detection device includes:
First acquisition module, for when user sends out domain name mapping request, obtaining local dns server to domain name Analysis request carries out parsing obtained first IP address;
First sending module, for domain name analysis request to be sent to HTTPDNS servers;
Second acquisition module to domain name analysis request parse for obtaining HTTPDNS servers obtained Second IP address;
First warns module, if different from second IP address for first IP address, to user's return The information warning that domain name analysis request is held as a hostage.
Optionally, first sending module includes:
First selection unit, for randomly selecting an IP address from HTTPDNS server ip lists;
First transmission unit, for domain name analysis request to be sent to corresponding to selected IP address HTTPDNS servers.
Optionally, further include:
Second sending module, if for the HTTPDNS servers to the parsing of domain name analysis request time-out or Second IP address can not be returned, then domain name analysis request is sent to URP servers;
Third acquisition module to domain name analysis request parse for obtaining the URP servers obtained Third IP address;
Second warns module, if different from the third IP address for first IP address, to user's return The information warning that domain name analysis request is held as a hostage.
Optionally, second sending module includes:
Second selection unit, for randomly selecting an IP address from URP server ip lists;
Second transmission unit, the URP clothes for being sent to domain name analysis request corresponding to selected IP address Business device.
Optionally, further include:
Third sending module, if for the URP servers to the parsing of domain name analysis request time-out or can not The third IP address is returned, then domain name analysis request is sent to Authoritative DNS server;
4th acquisition module, domain name analysis request is parsed for obtaining the Authoritative DNS server obtained by The 4th IP address arrived;
Third is warned module, if different from the 4th IP address for first IP address, to user's return The information warning that domain name analysis request is held as a hostage.
Optionally, the third sending module includes:
Third selection unit, for randomly selecting an IP address from Authoritative DNS server IP lists;
Third transmission unit, the authority for being sent to domain name analysis request corresponding to selected IP address Dns server.
It can be seen from the above technical proposal that the present invention provides a kind of DNS detection methods kidnapped and device, this method It is applied to DNS systems with device, specially:When user sends out domain name mapping request, local dns server is obtained to domain name solution Analysis request carries out parsing obtained first IP address;It translates domain names into request and is sent to HTTPDNS servers;It obtains HTTPDNS servers carry out parsing obtained second IP address to domain name mapping request;If the first IP address and the 2nd IP Address is different, then returns to the information warning that domain name analysis request is held as a hostage to user.By being issued the user with when kidnapping Information warning, can make the content server for the mistake that user stops accessing pointed by the domain name be held as a hostage, and user even can be with Corresponding Disposal Measures are further taken according to the information warning, so as to avoid influencing user to interconnection because DNS is kidnapped The normal access of net.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the step flow chart for the detection method that a kind of DNS provided in an embodiment of the present invention is kidnapped;
Fig. 2 is the step flow chart for the detection method that another kind DNS provided in an embodiment of the present invention is kidnapped;
Fig. 3 is the step flow chart for the detection method that another DNS provided in an embodiment of the present invention is kidnapped;
Fig. 4 is the structure diagram for the detection device that a kind of DNS provided in an embodiment of the present invention is kidnapped;
Fig. 5 is the structure diagram for the detection device that another kind DNS provided in an embodiment of the present invention is kidnapped;
Fig. 6 is the structure diagram for the detection device that another DNS provided in an embodiment of the present invention is kidnapped.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Embodiment one
Fig. 1 is the step flow chart for the detection method that a kind of DNS provided in an embodiment of the present invention is kidnapped.
Shown in referring to Fig.1, the detection method that DNS provided in this embodiment is kidnapped is applied to DNS systems, i.e. domain name system, For detecting whether a domain name mapping request is held as a hostage, i.e., the IP for returning to mistake is asked to the domain name mapping of user by malice Location does not return to correct IP address, which specifically comprises the following steps:
S101:Obtain the first IP address that local dns server returns.
It is to send this request to local dns server first when user sends out domain name mapping request, local dns clothes Business device parses the domain-name information entrained by the request, provides and the domain name institute when receiving domain name mapping request The IP address parsed will be returned to terminal device of the user for sending the request, at this point, in order to sentence by corresponding IP address It is disconnected whether to be held as a hostage, the IP address that the local dns server is parsed is obtained, for the ease of distinguishing, is here taken local dns The IP address that business device is parsed is known as the first IP address.
S102:It translates domain names into request and is sent to HTTPDNS servers.
While the domain name mapping request of user is sent to local dns server, also send the request to HTTPDNS servers, so that the server parses the request.
HTTPDNS is made requests on to 80 ports of dns server using http protocol, i.e., instead of traditional DNS Protocol It is made requests on to 53 ports of dns server.It namely goes to carry out dns resolution request using http protocol, server is returned Analysis result, that is, the corresponding server ip address of domain name returns in the equipment of user.
In the present embodiment domain name mapping request is sent to HTTPDNS servers particular by following steps:
First, for load balancing, an IP address is randomly selected from HTTPDNS server ip lists, and by the IP HTTPDNS servers corresponding to address are as target HTTPDNS servers;Then, domain name mapping request is sent to this Target HTTPDNS servers are obtained and are asked so that target HTTPDNS servers parse the domain name in the request The middle corresponding IP address of domain name is herein referred to as second to be distinguished with the IP address that local dns server is returned IP address.
S103:Obtain the second IP address that HTTPDNS servers return.
Here HTTPDNS servers are target HTTPDNS servers described above, are serviced in target HTTPDNS Domain name during device is asked according to the domain name mapping is parsed after obtaining the second IP address, and second IP address is obtained.
S104:Information warning is sent out if the first IP address and the second IP address difference.
After obtaining above-mentioned first IP address and the second IP address, the two is compared, if the two is identical, is shown The domain name mapping request of user is not held as a hostage in local scope, is not done any reaction at this time, i.e., is not made to the behavior of user Go out any warning or intervention.
If the first IP address is different from the second IP address, show that domain name mapping request is robbed in local scope It holds, i.e., it is the content server IP address of mistake to have abduction behavior, i.e. the first IP address in local dns server, at this time Information warning is issued the user in time, the request that it sends out is prompted the user with and has been held as a hostage.Meanwhile in order to make to avoid user into Enter the content server pointed by the IP address of the mistake, the equipment refusal that can also control user logs in the content clothes of the mistake Business device.
It can be seen from the above technical proposal that present embodiments providing a kind of detection method that DNS is kidnapped, this method application In DNS systems, specially:When user sends out domain name mapping request, obtains local dns server and domain name mapping is asked to carry out Parse obtained first IP address;It translates domain names into request and is sent to HTTPDNS servers;Obtain HTTPDNS servers pair Domain name mapping request carries out parsing obtained second IP address;If the first IP address is different from the second IP address, to Family returns to the information warning that domain name analysis request is held as a hostage.By issuing the user with information warning when kidnapping, can make User stops accessing the content server of the mistake pointed by the domain name be held as a hostage, user even can according to the information warning into One step takes corresponding Disposal Measures, so as to avoid the normal access for influencing user to internet because DNS is kidnapped.
Embodiment two
Fig. 2 is the step flow chart for the detection method that another kind DNS provided in an embodiment of the present invention is kidnapped.
With reference to shown in Fig. 2, the detection method that DNS provided in this embodiment is kidnapped is applied to DNS systems, i.e. domain name system, For detecting whether a domain name mapping request is held as a hostage, i.e., the IP for returning to mistake is asked to the domain name mapping of user by malice Location does not return to correct IP address, which specifically comprises the following steps:
S201:Obtain the first IP address that local dns server returns.
Here same or like with the scheme that obtains the first IP address in a upper embodiment, which is not described herein again.
S202:It translates domain names into request and is sent to HTTPDNS servers.
While the domain name mapping request of user is sent to local dns server, also send the request to HTTPDNS servers parse the IP address corresponding to domain name in the request so that the server parses the request, It is herein referred to as the second IP address.
S203:Request is translated domain names into if it cannot obtain the second IP address is sent to URP servers.
If after domain name mapping request is sent to HTTPDNS servers, which can not parse it Obtain the second IP address, or to the parsing time-out of the request, then by domain name mapping request be sent to URP servers to its into Row parsing, concrete operations are:
First, for load balancing, an IP address is randomly selected from URP server ip lists, and by the IP address Corresponding URP servers are as target URP servers;Then, domain name mapping request is sent to target URP services Device obtains IP address corresponding with domain name in request so that target URP servers parse the domain name in the request, In order to which the IP address that the IP address and HTTPDNS servers that are returned with local dns server are returned is distinguished, here It is referred to as third IP address.
If the HTTPDNS servers can normally return to the second IP address, directly by the second IP address and the first IP Address is compared, by comparing the conclusion whether being held as a hostage, also just it is not necessary that domain name mapping request is then forwarded to URP Server.
URP servers are a kind of interactive management servers, and interactivity is mainly manifested in four aspects:
Cooperation with service function:Its message mechanism based on XML is responsible for checking the validity of interactive information, converts not apposition The commercial matters information of formula provides the interim preservation of information for asynchronous information processing;Agency service:It can make various tissues and application The commercial matters information that need to be interacted quickly is received and submits, according to message response and driving application;Process services:Interactive management takes Business device provides a specific graphical environment, to make non-technical personnel that can also be modeled to enterprises union business procedure, it It being capable for the treatment of conditions branch, annular and the parallel Complicated Flows such as route that circulate;Deployment services:Interactive information is needed including management Server address, agent address and the classification of the information to being interacted.Critically important in " interacted information classification " is exactly to join Unified coding system between enterprise of alliance.
S204:Obtain the third IP address that URP servers return.
Here URP servers are target URP servers described above, in target URP servers according to the domain name Domain name in analysis request is parsed after obtaining third IP address, and the third IP address is obtained.Specifically by target URP The mode that server sends UDP packets searches the analysis result of URP servers, to obtain the third IP address.
S205:Information warning is sent out if the first IP address and third IP address difference.
After obtaining above-mentioned first IP address and third IP address, the two is compared, if the two is identical, is shown The domain name mapping request of user is not held as a hostage in local scope, is not done any reaction at this time, i.e., is not made to the behavior of user Go out any warning or intervention.
If the first IP address is different from third IP address, show that domain name mapping request is robbed in local scope It holds, i.e., it is the content server IP address of mistake to have abduction behavior, i.e. the first IP address in local dns server, at this time Information warning is issued the user in time, the request that it sends out is prompted the user with and has been held as a hostage.Meanwhile in order to make to avoid user into Enter the content server pointed by the IP address of the mistake, the equipment refusal that can also control user logs in the content clothes of the mistake Business device.
It can be seen from the above technical proposal that present embodiments providing a kind of detection method that DNS is kidnapped, this method application In DNS systems, specially:When user sends out domain name mapping request, obtains local dns server and domain name mapping is asked to carry out Parse obtained first IP address;It translates domain names into request and is sent to HTTPDNS servers;If HTTPDNS server solutions Analysis time-out can not return to analysis result, then send the request to URP servers;URP servers are obtained to domain name mapping Request carries out parsing obtained third IP address;If the first IP address is different from third IP address, to user's returns to field The information warning that name analysis request is held as a hostage.By issuing the user with information warning when kidnapping, user can be made to stop The content server of the mistake pointed by the domain name being held as a hostage is accessed, user even can further take according to the information warning Corresponding Disposal Measures, so as to avoid the normal access for influencing user to internet because DNS is kidnapped.
Embodiment three
Fig. 3 is the step flow chart for the detection method that another DNS provided in an embodiment of the present invention is kidnapped.
With reference to shown in Fig. 3, the detection method that DNS provided in this embodiment is kidnapped is applied to DNS systems, i.e. domain name system, For detecting whether a domain name mapping request is held as a hostage, i.e., the IP for returning to mistake is asked to the domain name mapping of user by malice Location does not return to correct IP address, which specifically comprises the following steps:
S301:Obtain the first IP address that local dns server returns.
Here same or like with the scheme that obtains the first IP address in a upper embodiment, which is not described herein again.
S302:It translates domain names into request and is sent to HTTPDNS servers.
While the domain name mapping request of user is sent to local dns server, also send the request to HTTPDNS servers parse the IP address corresponding to domain name in the request so that the server parses the request, It is herein referred to as the second IP address.
S303:Request is translated domain names into if it cannot obtain the second IP address is sent to URP servers.
If after domain name mapping request is sent to URP servers, which can not be parsed to obtain to it Second IP address, or to the parsing time-out of the request, then domain name mapping request is sent to URP servers and it is solved Analysis, parsing obtain IP address corresponding with domain name in request, are herein referred to as third IP address.
If the URP servers can normally return to third IP address, directly by third IP address and the first IP address It is compared, by comparing the conclusion whether being held as a hostage.
S304:Request, which is translated domain names into, if it cannot obtain third IP address is sent to Authoritative DNS server.
If after domain name mapping request is sent to URP servers, which can not be to solving the request Analysis obtains third IP address, or to the parsing time-out of the request, then domain name mapping request is sent to Authoritative DNS server Or disclosed dns server parses it, parsing obtains IP address corresponding with the domain name in the request.For the ease of area Point, the IP address is known as the 4th IP address here.
First, for load balancing, from random in Authoritative DNS server IP lists or in open dns server IP lists Choose an IP address, and using corresponding to the IP address Authoritative DNS server or open dns server as destination service Device;Then, by the domain name mapping request be sent to the destination server so that the destination server to the domain name in the request into Row parsing obtains IP address corresponding with domain name in request and is herein referred to as the 4th IP address for the ease of distinguishing.
If being unable to get the 4th IP address or query timeout, information such as " result are unknown " are returned to user, to carry Show that this detection of user determines whether its domain name mapping request is held as a hostage without normal direction user, user can take other corresponding measures It is detected, to increase safety.
S305:Obtain the 4th IP address that Authoritative DNS server returns.
Here Authoritative DNS server is destination server described above, in destination server according to the domain name solution Domain name in analysis request is parsed after obtaining the 4th IP address, and the 4th IP address is obtained.Specially utilize BIND agreements to Target dns server sends inquiry request, to obtain the 4th IP address.
S306:Information warning is sent out if the first IP address and the 4th IP address difference.
After obtaining above-mentioned first IP address and the 4th IP address, the two is compared, if the two is identical, is shown The domain name mapping request of user is not held as a hostage in local scope, is not done any reaction at this time, i.e., is not made to the behavior of user Go out any warning or intervention.
If the first IP address is different from the 4th IP address, show that domain name mapping request is robbed in local scope It holds, i.e., it is the content server IP address of mistake to have abduction behavior, i.e. the first IP address in local dns server, at this time Information warning is issued the user in time, the request that it sends out is prompted the user with and has been held as a hostage.Meanwhile in order to make to avoid user into Enter the content server pointed by the IP address of the mistake, the equipment refusal that can also control user logs in the content clothes of the mistake Business device.
It can be seen from the above technical proposal that present embodiments providing a kind of detection method that DNS is kidnapped, this method application In DNS systems, specially:When user sends out domain name mapping request, obtains local dns server and domain name mapping is asked to carry out Parse obtained first IP address;It translates domain names into request and is sent to HTTPDNS servers;If HTTPDNS server solutions Analysis time-out can not return to analysis result, then send the request to URP servers;If URP servers parsing time-out or Person can not return to analysis result, then send the request to Authoritative DNS server;Authoritative DNS server is obtained to domain name mapping Request carries out parsing obtained 4th IP address;If the first IP address is different from the 4th IP address, to user's returns to field The information warning that name analysis request is held as a hostage.By issuing the user with information warning when kidnapping, user can be made to stop The content server of the mistake pointed by the domain name being held as a hostage is accessed, user even can further take according to the information warning Corresponding Disposal Measures, so as to avoid the normal access for influencing user to internet because DNS is kidnapped.
It should be noted that for embodiment of the method, for simple description, therefore it is all expressed as a series of action group It closes, but those skilled in the art should understand that, the embodiment of the present invention is not limited by the described action sequence, because according to According to the embodiment of the present invention, certain steps can be performed in other orders or simultaneously.Secondly, those skilled in the art also should Know, embodiment described in this description belongs to preferred embodiment, and the involved action not necessarily present invention is implemented Necessary to example.
Example IV
Fig. 4 is the structure diagram for the detection device that a kind of DNS provided in an embodiment of the present invention is kidnapped.
With reference to shown in Fig. 4, the detection method that DNS provided in this embodiment is kidnapped is applied to DNS systems, i.e. domain name system, For detecting whether a domain name mapping request is held as a hostage, i.e., the IP for returning to mistake is asked to the domain name mapping of user by malice Location does not return to correct IP address, which specifically includes the first acquisition module 10, the first sending module 20, second Acquisition module 30 and first is warned module 40.
First acquisition module is used to obtain the first IP address of local dns server return.
It is to send this request to local dns server first when user sends out domain name mapping request, local dns clothes Business device parses the domain-name information entrained by the request, provides and the domain name institute when receiving domain name mapping request The IP address parsed will be returned to terminal device of the user for sending the request, at this point, in order to sentence by corresponding IP address It is disconnected whether to be held as a hostage, the IP address that the local dns server is parsed is obtained, for the ease of distinguishing, is here taken local dns The IP address that business device is parsed is known as the first IP address.
First sending module is sent to HTTPDNS servers for translating domain names into request.
While the domain name mapping request of user is sent to local dns server, also send the request to HTTPDNS servers, so that the server parses the request.
HTTPDNS is made requests on to 80 ports of dns server using http protocol, i.e., instead of traditional DNS Protocol It is made requests on to 53 ports of dns server.It namely goes to carry out dns resolution request using http protocol, server is returned Analysis result, that is, the corresponding server ip address of domain name returns in the equipment of user.
First sending module of the present embodiment specifically includes the first selection unit and the first transmission unit.
For load balancing, the first selection unit randomly selects an IP address from HTTPDNS server ip lists, and Using the HTTPDNS servers corresponding to the IP address as target HTTPDNS servers;First transmission unit is then used for the domain Name analysis request be sent to target HTTPDNS servers so that target HTTPDNS servers to the domain name in the request into Row parsing obtains IP address corresponding with domain name in request, in order to give area with the IP address that local dns server is returned Point, it is herein referred to as the second IP address.
Second acquisition module is used to obtain the second IP address of HTTPDNS servers return.
Here HTTPDNS servers are target HTTPDNS servers described above, are serviced in target HTTPDNS Domain name during device is asked according to the domain name mapping is parsed after obtaining the second IP address, and second IP address is obtained.
First warn module for sending out information warning if the first IP address and the second IP address difference.
After obtaining above-mentioned first IP address and the second IP address, the two is compared, if the two is identical, is shown The domain name mapping request of user is not held as a hostage in local scope, is not done any reaction at this time, i.e., is not made to the behavior of user Go out any warning or intervention.
If the first IP address is different from the second IP address, show that domain name mapping request is robbed in local scope It holds, i.e., it is the content server IP address of mistake to have abduction behavior, i.e. the first IP address in local dns server, at this time Information warning is issued the user in time, the request that it sends out is prompted the user with and has been held as a hostage.Meanwhile in order to make to avoid user into Enter the content server pointed by the IP address of the mistake, the equipment refusal that can also control user logs in the content clothes of the mistake Business device.
It can be seen from the above technical proposal that present embodiments providing a kind of detection device that DNS is kidnapped, the device application In DNS systems, specially:When user sends out domain name mapping request, obtains local dns server and domain name mapping is asked to carry out Parse obtained first IP address;It translates domain names into request and is sent to HTTPDNS servers;Obtain HTTPDNS servers pair Domain name mapping request carries out parsing obtained second IP address;If the first IP address is different from the second IP address, to Family returns to the information warning that domain name analysis request is held as a hostage.By issuing the user with information warning when kidnapping, can make User stops accessing the content server of the mistake pointed by the domain name be held as a hostage, user even can according to the information warning into One step takes corresponding Disposal Measures, so as to avoid the normal access for influencing user to internet because DNS is kidnapped.
Embodiment five
Fig. 5 is the structure diagram for the detection device that another kind DNS provided in an embodiment of the present invention is kidnapped.
Referring to Figure 5, the detection device that DNS provided in this embodiment is kidnapped is added on the basis of a upper embodiment Second sending module 50, third acquisition module 60 and second are warned module 70.
Second sending module is sent to URP services for translating domain names into request if it cannot obtain the second IP address Device.
If after domain name mapping request is sent to HTTPDNS servers, which can not parse it Obtain the second IP address, or to the parsing time-out of the request, then by domain name mapping request be sent to URP servers to its into Row parsing, the module specifically include the second selection unit and the second transmission unit.
For load balancing, the second selection unit randomly selects an IP address from URP server ip lists, and should URP servers corresponding to IP address are as target URP servers;Second transmission unit is then used to ask to send out by the domain name mapping Target URP servers are given, so that target URP servers parse the domain name in the request, in obtaining and asking The corresponding IP address of domain name, the IP returned for the IP address and HTTPDNS servers that are returned with local dns server Address is distinguished, and third IP address is herein referred to as.
If the HTTPDNS servers can normally return to the second IP address, directly by the second IP address and the first IP Address is compared, by comparing the conclusion whether being held as a hostage, also just it is not necessary that domain name mapping request is then forwarded to URP Server.
Third acquisition module is used to obtain the third IP address of URP servers return.
Here URP servers are target URP servers described above, in target URP servers according to the domain name Domain name in analysis request is parsed after obtaining third IP address, and the third IP address is obtained.Specifically by target DNS The mode that server sends UDP packets searches the analysis result of URP servers, to obtain the third IP address.
Second alarm module is used to send out information warning if the first IP address and third IP address difference.
After obtaining above-mentioned first IP address and third IP address, the two is compared, if the two is identical, is shown The domain name mapping request of user is not held as a hostage in local scope, is not done any reaction at this time, i.e., is not made to the behavior of user Go out any warning or intervention.
If the first IP address is different from third IP address, show that domain name mapping request is robbed in local scope It holds, i.e., it is the content server IP address of mistake to have abduction behavior, i.e. the first IP address in local dns server, at this time Information warning is issued the user in time, the request that it sends out is prompted the user with and has been held as a hostage.Meanwhile in order to make to avoid user into Enter the content server pointed by the IP address of the mistake, the equipment refusal that can also control user logs in the content clothes of the mistake Business device.
It can be seen from the above technical proposal that present embodiments providing a kind of detection device that DNS is kidnapped, the device application In DNS systems, specially:When user sends out domain name mapping request, obtains local dns server and domain name mapping is asked to carry out Parse obtained first IP address;It translates domain names into request and is sent to HTTPDNS servers;If HTTPDNS server solutions Analysis time-out can not return to analysis result, then send the request to URP servers;URP servers are obtained to domain name mapping Request carries out parsing obtained third IP address;If the first IP address is different from third IP address, to user's returns to field The information warning that name analysis request is held as a hostage.By issuing the user with information warning when kidnapping, user can be made to stop The content server of the mistake pointed by the domain name being held as a hostage is accessed, user even can further take according to the information warning Corresponding Disposal Measures, so as to avoid the normal access for influencing user to internet because DNS is kidnapped.
Embodiment six
Fig. 6 is the structure diagram for the detection device that another DNS provided in an embodiment of the present invention is kidnapped.
With reference to shown in Fig. 6, the detection device that DNS provided in this embodiment is kidnapped is added on the basis of a upper embodiment Third sending module 80, the 4th acquisition module 90 and third are warned module 100.
Third sending module is sent to authoritative DNS clothes for translating domain names into request if it cannot obtain third IP address Business device.
If after domain name mapping request is sent to URP servers, which can not be to carrying out the request Parsing obtains third IP address, or to the parsing time-out of the request, then domain name mapping request is sent to authoritative DNS service Device or disclosed dns server parse it, and parsing obtains IP address corresponding with the domain name in the request.For the ease of It distinguishes, the IP address is known as the 4th IP address here.The module specifically includes third selection unit and third transmission unit.
For load balancing, the dns server IP lists from Authoritative DNS server IP lists or openly of terrain-choosing unit In randomly select an IP address, and using corresponding to the IP address Authoritative DNS server or open dns server as target Server;Third transmission unit is used to domain name mapping request being sent to the destination server, so that the destination server pair Domain name in the request is parsed, and is obtained IP address corresponding with domain name in request and is herein referred to as the ease of distinguishing 4th IP address.
If being unable to get the 4th IP address or query timeout, information such as " result are unknown " are returned to user, to carry Show that this detection of user determines whether its domain name mapping request is held as a hostage without normal direction user, user can take other corresponding measures It is detected, to increase safety.
4th acquisition module is used to obtain the 4th IP address of Authoritative DNS server return.
Here Authoritative DNS server is destination server described above, in destination server according to the domain name solution Domain name in analysis request is parsed after obtaining the 4th IP address, and the 4th IP address is obtained.Specially utilize BIND agreements to Target dns server sends inquiry request, to obtain the third IP address.
Third warns module for sending out information warning if the first IP address and the 4th IP address difference.
After obtaining above-mentioned first IP address and the 4th IP address, the two is compared, if the two is identical, is shown The domain name mapping request of user is not held as a hostage in local scope, is not done any reaction at this time, i.e., is not made to the behavior of user Go out any warning or intervention.
If the first IP address is different from the 4th IP address, show that domain name mapping request is robbed in local scope It holds, i.e., it is the content server IP address of mistake to have abduction behavior, i.e. the first IP address in local dns server, at this time Information warning is issued the user in time, the request that it sends out is prompted the user with and has been held as a hostage.Meanwhile in order to make to avoid user into Enter the content server pointed by the IP address of the mistake, the equipment refusal that can also control user logs in the content clothes of the mistake Business device.
It can be seen from the above technical proposal that present embodiments providing a kind of detection device that DNS is kidnapped, the device application In DNS systems, specially:When user sends out domain name mapping request, obtains local dns server and domain name mapping is asked to carry out Parse obtained first IP address;It translates domain names into request and is sent to HTTPDNS servers;If HTTPDNS server solutions Analysis time-out can not return to analysis result, then send the request to URP servers;If URP servers parsing time-out or Person can not return to analysis result, then send the request to Authoritative DNS server;Authoritative DNS server is obtained to domain name mapping Request carries out parsing obtained 4th IP address;If the first IP address is different from the 4th IP address, to user's returns to field The information warning that name analysis request is held as a hostage.By issuing the user with information warning when kidnapping, user can be made to stop The content server of the mistake pointed by the domain name being held as a hostage is accessed, user even can further take according to the information warning Corresponding Disposal Measures, so as to avoid the normal access for influencing user to internet because DNS is kidnapped.
In addition, above-mentioned first warn module, second warn module and third module of warning can be same module, i.e., it is sharp The effect of warning in varied situations is completed with a module.
For device embodiments, since it is basically similar to the method embodiment, so fairly simple, the correlation of description Place illustrates referring to the part of embodiment of the method.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with The difference of other embodiment, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can be provided as method, apparatus or calculate Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
The embodiment of the present invention be with reference to according to the method for the embodiment of the present invention, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in flow and/or box combination.These can be provided Computer program instructions are set to all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine so that is held by the processor of computer or other programmable data processing terminal equipments Capable instruction generates for realizing in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes The device of specified function.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing terminal equipments In computer-readable memory operate in a specific manner so that instruction stored in the computer readable memory generates packet The manufacture of command device is included, which realizes in one flow of flow chart or multiple flows and/or one side of block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing terminal equipments so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one flow of flow chart or multiple flows And/or in one box of block diagram or multiple boxes specify function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also include other elements that are not explicitly listed, or further include for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device including the element.
Technical solution provided by the present invention is described in detail above, specific case used herein is to this hair Bright principle and embodiment is expounded, the explanation of above example is only intended to help understand the present invention method and its Core concept;Meanwhile for those of ordinary skill in the art, according to the thought of the present invention, in specific implementation mode and application There will be changes in range, in conclusion the content of the present specification should not be construed as limiting the invention.

Claims (12)

1. the detection method that a kind of DNS is kidnapped is applied to DNS systems, which is characterized in that the detection method includes step:
When user sends out domain name mapping request, obtain obtained by local dns server parses domain name analysis request The first IP address arrived;
Domain name analysis request is sent to HTTPDNS servers;
HTTPDNS servers are obtained domain name analysis request is carried out to parse obtained second IP address;
If first IP address is different from second IP address, returns to domain name analysis request to user and be held as a hostage Information warning.
2. detection method as described in claim 1, which is characterized in that described to be sent to domain name analysis request HTTPDNS servers, including:
An IP address is randomly selected from HTTPDNS server ip lists;
Domain name analysis request is sent to the HTTPDNS servers corresponding to selected IP address.
3. detection method as described in claim 1, which is characterized in that further include step:
If the HTTPDNS servers are to the parsing of domain name analysis request time-out or with can not returning to the 2nd IP Domain name analysis request is then sent to URP servers by location;
The URP servers are obtained domain name analysis request is carried out to parse obtained third IP address;
If first IP address is different from the third IP address, returns to domain name analysis request to user and be held as a hostage Information warning.
4. detection method as claimed in claim 3, which is characterized in that described that domain name analysis request is sent to URP clothes Business device, including:
An IP address is randomly selected from URP server ip lists;
Domain name analysis request is sent to the URP servers corresponding to selected IP address.
5. detection method as claimed in claim 3, which is characterized in that further include step:
If the URP servers are overtime to the parsing of domain name analysis request or can not return to the third IP address, Domain name analysis request is sent to Authoritative DNS server;
The Authoritative DNS server is obtained domain name analysis request is carried out to parse obtained 4th IP address;
If first IP address is different from the 4th IP address, returns to domain name analysis request to user and be held as a hostage Information warning.
6. detection method as claimed in claim 5, which is characterized in that described that domain name analysis request is sent to authority Dns server, including:
An IP address is randomly selected from Authoritative DNS server IP lists;
Domain name analysis request is sent to the Authoritative DNS server corresponding to selected IP address.
7. the detection device that a kind of DNS is kidnapped is applied to DNS systems, which is characterized in that the detection device includes:
First acquisition module, for when user sends out domain name mapping request, obtaining local dns server and being parsed to domain name Request carries out parsing obtained first IP address;
First sending module, for domain name analysis request to be sent to HTTPDNS servers;
Second acquisition module carries out domain name analysis request to parse obtained second for obtaining HTTPDNS servers IP address;
First warns module, if different from second IP address for first IP address, described in user's return The information warning being held as a hostage is asked in domain name mapping.
8. detection device as claimed in claim 7, which is characterized in that first sending module includes:
First selection unit, for randomly selecting an IP address from HTTPDNS server ip lists;
First transmission unit, the HTTPDNS clothes for being sent to domain name analysis request corresponding to selected IP address Business device.
9. detection device as claimed in claim 7, which is characterized in that further include:
Second sending module, if for the HTTPDNS servers to the parsing of domain name analysis request time-out or can not Second IP address is returned, then domain name analysis request is sent to URP servers;
Third acquisition module carries out domain name analysis request to parse obtained third for obtaining the URP servers IP address;
Second warns module, if different from the third IP address for first IP address, described in user's return The information warning being held as a hostage is asked in domain name mapping.
10. detection device as claimed in claim 9, which is characterized in that second sending module includes:
Second selection unit, for randomly selecting an IP address from URP server ip lists;
Second transmission unit, the URP servers for being sent to domain name analysis request corresponding to selected IP address.
11. detection device as claimed in claim 9, which is characterized in that further include:
Third sending module, if to the parsing time-out of domain name analysis request or can not be returned for the URP servers The third IP address, then be sent to Authoritative DNS server by domain name analysis request;
4th acquisition module to domain name analysis request parse for obtaining the Authoritative DNS server obtained 4th IP address;
Third is warned module, if different from the 4th IP address for first IP address, described in user's return The information warning being held as a hostage is asked in domain name mapping.
12. detection device as claimed in claim 11, which is characterized in that the third sending module includes:
Third selection unit, for randomly selecting an IP address from Authoritative DNS server IP lists;
Third transmission unit, the authoritative DNS clothes for being sent to domain name analysis request corresponding to selected IP address Business device.
CN201810209928.9A 2018-03-14 2018-03-14 A kind of detection method and device of DNS abduction Pending CN108650211A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810209928.9A CN108650211A (en) 2018-03-14 2018-03-14 A kind of detection method and device of DNS abduction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810209928.9A CN108650211A (en) 2018-03-14 2018-03-14 A kind of detection method and device of DNS abduction

Publications (1)

Publication Number Publication Date
CN108650211A true CN108650211A (en) 2018-10-12

Family

ID=63744214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810209928.9A Pending CN108650211A (en) 2018-03-14 2018-03-14 A kind of detection method and device of DNS abduction

Country Status (1)

Country Link
CN (1) CN108650211A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572390A (en) * 2019-09-06 2019-12-13 深圳平安通信科技有限公司 Method, device, computer equipment and storage medium for detecting domain name hijacking
CN110912925A (en) * 2019-12-04 2020-03-24 北京小米移动软件有限公司 Method and device for detecting Domain Name System (DNS) hijacking and storage medium
CN111193672A (en) * 2019-12-06 2020-05-22 新浪网技术(中国)有限公司 Method and system for fine scheduling of traffic
CN112887255A (en) * 2019-11-29 2021-06-01 北京一起教育信息咨询有限责任公司 Network communication method and device
CN114338630A (en) * 2021-12-13 2022-04-12 海尔优家智能科技(北京)有限公司 Domain name access method, device, electronic equipment, storage medium and program product
CN114401247A (en) * 2022-01-14 2022-04-26 深圳市和讯华谷信息技术有限公司 High-concurrency service request processing system based on bind service
CN114760267A (en) * 2022-04-08 2022-07-15 中国移动通信集团陕西有限公司 Domain name plugging method, device, equipment, medium and program product
CN117061247A (en) * 2023-10-11 2023-11-14 国家计算机网络与信息安全管理中心 DNS-based traceability positioning method and device, electronic equipment and storage medium
CN114338630B (en) * 2021-12-13 2024-04-19 海尔优家智能科技(北京)有限公司 Domain name access method, device, electronic equipment, storage medium and program product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681358A (en) * 2016-03-31 2016-06-15 北京奇虎科技有限公司 Domain name hijacking detection method, device and system
CN106302384A (en) * 2016-07-25 2017-01-04 中国联合网络通信集团有限公司 DNS message processing method and device
US20170118250A1 (en) * 2015-10-21 2017-04-27 Verisign, Inc. Method for minimizing the risk and exposure duration of improper or hijacked dns records
CN107135236A (en) * 2017-07-06 2017-09-05 广州优视网络科技有限公司 A kind of detection method and system of target Domain Hijacking
CN107528862A (en) * 2017-10-23 2017-12-29 北京京东金融科技控股有限公司 The method and device of domain name mapping
CN107623693A (en) * 2017-09-30 2018-01-23 北京奇虎科技有限公司 Domain name mapping means of defence and device, system, computing device, storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170118250A1 (en) * 2015-10-21 2017-04-27 Verisign, Inc. Method for minimizing the risk and exposure duration of improper or hijacked dns records
CN105681358A (en) * 2016-03-31 2016-06-15 北京奇虎科技有限公司 Domain name hijacking detection method, device and system
CN106302384A (en) * 2016-07-25 2017-01-04 中国联合网络通信集团有限公司 DNS message processing method and device
CN107135236A (en) * 2017-07-06 2017-09-05 广州优视网络科技有限公司 A kind of detection method and system of target Domain Hijacking
CN107623693A (en) * 2017-09-30 2018-01-23 北京奇虎科技有限公司 Domain name mapping means of defence and device, system, computing device, storage medium
CN107528862A (en) * 2017-10-23 2017-12-29 北京京东金融科技控股有限公司 The method and device of domain name mapping

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572390A (en) * 2019-09-06 2019-12-13 深圳平安通信科技有限公司 Method, device, computer equipment and storage medium for detecting domain name hijacking
CN112887255A (en) * 2019-11-29 2021-06-01 北京一起教育信息咨询有限责任公司 Network communication method and device
CN110912925A (en) * 2019-12-04 2020-03-24 北京小米移动软件有限公司 Method and device for detecting Domain Name System (DNS) hijacking and storage medium
CN111193672A (en) * 2019-12-06 2020-05-22 新浪网技术(中国)有限公司 Method and system for fine scheduling of traffic
CN111193672B (en) * 2019-12-06 2023-05-26 新浪技术(中国)有限公司 Flow fine scheduling method and system
CN114338630A (en) * 2021-12-13 2022-04-12 海尔优家智能科技(北京)有限公司 Domain name access method, device, electronic equipment, storage medium and program product
CN114338630B (en) * 2021-12-13 2024-04-19 海尔优家智能科技(北京)有限公司 Domain name access method, device, electronic equipment, storage medium and program product
CN114401247A (en) * 2022-01-14 2022-04-26 深圳市和讯华谷信息技术有限公司 High-concurrency service request processing system based on bind service
CN114760267A (en) * 2022-04-08 2022-07-15 中国移动通信集团陕西有限公司 Domain name plugging method, device, equipment, medium and program product
CN114760267B (en) * 2022-04-08 2024-03-19 中国移动通信集团陕西有限公司 Domain name blocking method, device, equipment, medium and program product
CN117061247A (en) * 2023-10-11 2023-11-14 国家计算机网络与信息安全管理中心 DNS-based traceability positioning method and device, electronic equipment and storage medium
CN117061247B (en) * 2023-10-11 2024-01-05 国家计算机网络与信息安全管理中心 DNS-based traceability positioning method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108650211A (en) A kind of detection method and device of DNS abduction
US7376717B2 (en) Method and apparatus for automatically configuring a computer for different local area networks
US6256671B1 (en) Method and apparatus for providing network access control using a domain name system
US8020045B2 (en) Root cause analysis method, apparatus, and program for IT apparatuses from which event information is not obtained
CN110636115B (en) Cross-cloud service calling processing method, gateway server and requester server
US8605731B2 (en) Network system and server
US7467203B2 (en) System and methods for robust discovery of servers and services in a heterogeneous environment
US9648033B2 (en) System for detecting the presence of rogue domain name service providers through passive monitoring
US10567384B2 (en) Verifying whether connectivity in a composed policy graph reflects a corresponding policy in input policy graphs
CN105610867B (en) A kind of anti-abduction method and apparatus of DNS
CN103929429A (en) Network vulnerability scanning system and method based on RESTful Web service
CN104993953A (en) Method for detecting network service state and device detecting network service state
US20120317254A1 (en) Network platform in a network device ecosystem
US9264440B1 (en) Parallel detection of updates to a domain name system record system using a common filter
CN108027808A (en) Internet security and management equipment
US20090129290A1 (en) Method for acquiring information of network resources connected to ports of network switches
CN110062064A (en) A kind of Address Resolution Protocol ARP request message response method and device
US9762542B2 (en) Parallel detection of updates to a domain name system record system using a common filter
JP4009591B2 (en) Domain naming system (DNS) for accessing databases
KR20140044987A (en) Security system and operating method thereof
US20110302292A1 (en) Systems and methods for service assurance using virtualized federated presence infrastructure
CN101404595B (en) Network bridge uplink port identification
KR101522139B1 (en) Method for blocking selectively in dns server and change the dns address using proxy
US7502847B2 (en) Method of providing views of a managed network that uses network address translation
JP2002368781A (en) User location management domain name conversion system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181012

RJ01 Rejection of invention patent application after publication