CN110445798A - The anti-abduction method, apparatus of DNS and electronic equipment - Google Patents
The anti-abduction method, apparatus of DNS and electronic equipment Download PDFInfo
- Publication number
- CN110445798A CN110445798A CN201910752532.3A CN201910752532A CN110445798A CN 110445798 A CN110445798 A CN 110445798A CN 201910752532 A CN201910752532 A CN 201910752532A CN 110445798 A CN110445798 A CN 110445798A
- Authority
- CN
- China
- Prior art keywords
- dns
- hostage
- held
- address
- connection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Abstract
Present disclose provides a kind of anti-abduction method, apparatus of DNS and electronic equipment, the anti-abduction methods of DNS, comprising: obtains IP address, is attached according to the IP address of acquisition, judges whether connection succeeds;Such as successful connection, judge whether to parse using local dns according to scene setting, if it is be arranged DNS may be held as a hostage be it is no after retransmit data packet with obtain response, if otherwise directly transmit data packet with obtain response;Judge whether response is normal, it is corresponding to be arranged whether DNS be held as a hostage according to judging result.The disclosure can protect DNS and perceive DNS upon connection and be held as a hostage and restore access in resolving, conducive to good anti-abduction ability is taken into account while guaranteeing performance.
Description
Technical field
This disclosure relates to domain name mapping field more particularly to a kind of anti-abduction method, apparatus of DNS and electronic equipment.
Background technique
Since DNS (Domain Name System, domain name system) agreement occurs, client accesses ten that each website just becomes
It is point convenient, but the key link in DNS service --- often there is certain risk in domain name mapping, Domain Hijacking be exactly wherein it
One.Domain Hijacking just refers to the parsing control that certain domain name is obtained by certain means, modifies the parsing result of this domain name, causes
Modified specified IP is transferred to by former IP address to the access of the domain name, result be exactly specific network address cannot be accessed or
Access is false network address, therefore the anti-abduction of DNS is just at a focus on research direction of network security.
At present for TCP (the Transmission Control that the main method of the anti-abduction of DNS includes using DNS
Protocol, transmission control protocol) form, DNS request and response are encrypted etc. using the mode of encryption.But both
The all different degrees of speed for reducing DNS request of method, second method are even more to need VPS (Virtual Private
Server, Virtual Private Server), cost is excessive.And in these methods, once domain name is held as a hostage, without effective method
Support reconnection, the operation for leaving user for relatively more.
The protection that the prior art kidnaps DNS is protected in the dns resolution stage mostly, but domain name still have it is certainly possible
It is held as a hostage.But after kidnapping user can only manual reconnection, user experience is simultaneously bad.And in intelligent sound box chip all
In the presence of the system file finished writing, in the case where considering load balancing, each corresponding IP of the domain name for needing to connect, if often
It is secondary that all domain name is parsed, it will affect the load balancing of server in extreme circumstances.Therefore needing one can effectively solve
State the anti-abduction method of DNS of problem.
Summary of the invention
(1) technical problems to be solved
It is set forth above at least partly to solve present disclose provides a kind of anti-abduction method, apparatus of DNS and electronic equipment
The technical issues of.
(2) technical solution
According to one aspect of the disclosure, a kind of anti-abduction method of DNS is provided, comprising:
IP address is obtained, is attached according to the IP address of acquisition, judges whether connection succeeds;
Such as successful connection, judge whether to parse using local dns according to scene setting, DNS if it is is arranged may be
It is no for being held as a hostage, if otherwise directly carrying out next step;
Data packet is sent to obtain response;
Judge whether response is normal, it is corresponding to be arranged whether DNS be held as a hostage according to judging result.
In some embodiments of the present disclosure, the acquisition IP address is attached according to the IP address of acquisition, judges to connect
It connects and whether succeeds, comprising:
Such as connection failure, judge whether local dns are held as a hostage according to scene setting;
After carrying out dns resolution if being held as a hostage, is initiated the connection according to the IP that this dns resolution obtains, rejudge IP
Whether connection succeeds;
It is yes for local dns are arranged if not being held as a hostage may being held as a hostage, and rejudges whether connection succeeds.
It is described to judge whether response is normal, and according to judging result, DNS is accordingly arranged in some embodiments of the present disclosure
Whether may be held as a hostage, comprising:
Judge whether response is normal, then judges whether to parse using local dns if YES;
If it is determined that whether resolved to using local dns is, then it is no that DNS, which is arranged, to be held as a hostage.
It is described to judge whether response is normal, and according to judging result, DNS is accordingly arranged in some embodiments of the present disclosure
Whether may be held as a hostage, comprising:
Judge whether response is normal, then judges whether to parse using local dns if YES;
If it is determined that whether being resolved to using local dns no, then terminate.
It is described to judge whether response is normal, and according to judging result, DNS is accordingly arranged in some embodiments of the present disclosure
Whether may be held as a hostage, comprising:
Judge whether response is normal, if it is otherwise judging whether to parse using local dns;
It is yes that DNS is then arranged if YES to be held as a hostage;
Acquisition IP address is disconnected and be back to, is attached according to the IP address of reacquisition, whether judges connection
Success.
It is described to judge whether response is normal, and according to judging result, DNS is accordingly arranged in some embodiments of the present disclosure
Whether may be held as a hostage, comprising:
Judge whether response is normal, if it is otherwise judging whether to parse using local dns;
If it is otherwise disconnecting and being back to acquisition IP address, it is attached, is sentenced according to the IP address of reacquisition
Whether connection breaking succeeds.
In some embodiments of the present disclosure, the scene setting includes: the state that setting may be held as a hostage and setting is
It is no using one of local dns parsing or a variety of.
In some embodiments of the present disclosure, IP address is obtained, is attached according to the IP address of acquisition, judges that connection is
In no success, the IP address obtained for the first time is the IP address in local file.
A kind of DNS antihijacking device another aspect of the present disclosure provides, comprising:
First processing module, for judging whether the corresponding IP connection of domain name succeeds in system file;
Second processing module judges whether to parse using local dns after successful connection, and judges whether response is normal;
First execution module decides whether to execute dns resolution according to first processing module;
Second execution module decides whether that executing disconnection IP connects and carry out according to the judging result of Second processing module
It reconnects.
A kind of electronic equipment another aspect of the present disclosure provides, including memory, processor and network interface
Controller is stored with the computer program that can be run in the processing in the memory, wherein the memory is for depositing
At least one executable instruction is put, for network interface controller for allowing network communication, the executable instruction makes the processing
Device executes the corresponding operation of the foregoing anti-abduction method of DNS.
(3) beneficial effect
It can be seen from the above technical proposal that the anti-abduction method, apparatus of disclosure DNS and electronic equipment at least have it is following
One of beneficial effect or in which a part:
The disclosure can protect DNS and perceive DNS upon connection and be held as a hostage and restore access in resolving,
Conducive to taking into account good anti-abduction ability while guaranteeing performance.
Detailed description of the invention
Fig. 1 is the schematic diagram of the anti-abduction method of disclosure DNS.
Fig. 2 is the schematic diagram of the anti-abduction method of an embodiment of the present disclosure DNS.
Fig. 3 is the schematic diagram of the anti-abduction method of another embodiment of disclosure DNS.
Specific embodiment
Present disclose provides a kind of anti-abduction method, apparatus of DNS and electronic equipment, the anti-abduction methods of DNS, comprising: sentence
Whether the corresponding IP connection of domain name succeeds in disconnected system file;Such as successful connection, judged whether according to scene setting using local
Dns resolution, DNS is if it is set may be held as a hostage be it is no after retransmit data packet to obtain response, if otherwise straight
Data packet is received and sent to obtain response;Judge whether response is normal, it is corresponding DNS to be arranged whether be according to judging result
It is held as a hostage.The disclosure can protect DNS and perceive DNS upon connection and be held as a hostage and restore access in resolving, benefit
In taking into account good anti-abduction ability while guaranteeing performance.
Before describing solution to the problem, first defines some specific vocabulary and be helpful.
Dns resolution, also known as domain name mapping are that domain name is directed toward web space IP, allow people can be with by the domain name of registration
A kind of service of website is easily accessed.IP address is that the numeric address of website is identified on network, remembers for convenience, uses
Domain name come replace IP address identify site address.Domain name mapping is exactly conversion process of the domain name to IP address.
DNS is kidnapped, also known as Domain Hijacking, refers to that attacker using other attack means, has distorted the parsing knot of certain domain name
Fruit causes to be held as a hostage to the access of corresponding web site unreachable to another so that the IP for being directed toward the domain name becomes another IP
Perhaps personation network address thus realize illegally steal user information or destroy proper network service purpose.
For the purposes, technical schemes and advantages of the disclosure are more clearly understood, below in conjunction with specific embodiment, and reference
The disclosure is further described in attached drawing.
Disclosure some embodiments will be done referring to appended attached drawing in rear and more comprehensively describe to property, some of but not complete
The embodiment in portion will be shown.In fact, the various embodiments of the disclosure can be realized in many different forms, and should not be construed
To be limited to this several illustrated embodiment;Relatively, these embodiments are provided so that the disclosure meets applicable legal requirement.
In an exemplary embodiment of the disclosure, a kind of anti-abduction method of DNS is provided.Fig. 1 is anti-for disclosure DNS
The schematic diagram of abduction method.As shown in Figure 1, it includes: to judge domain name pair in system file that the anti-abduction method of disclosure DNS, which includes:,
Whether the IP connection answered succeeds;Such as successful connection, judges whether to parse using local dns according to scene setting, if it is set
It is no for setting DNS and may being held as a hostage, if sending data packet otherwise to obtain response;Judge whether response is normal, according to sentencing
Break as a result, accordingly whether setting DNS may be held as a hostage.
Wherein, in judging in system file whether the corresponding IP connection of domain name is successful, such as connection failure, according to scene setting
Judge whether local dns are held as a hostage;After carrying out dns resolution if being held as a hostage, initiated according to the IP that this dns resolution obtains
Connection, rejudges whether connection succeeds;It is yes for local dns are arranged if not being held as a hostage may being held as a hostage, and is sentenced again
Whether connection breaking succeeds.It is to be or whether no, setting uses this that wherein scene setting, which includes: the state that may be held as a hostage of setting,
The state of ground dns resolution is, and setting may be held as a hostage simultaneously state and whether uses local dns parsing
State is respectively to be or not no 4 kinds of combinations: (being yes) (being, no) (no, yes) (no, no).Furthermore those skilled in the art's energy
The common scene setting enough understood may be selected, and no longer enumerate here.Also it should be further noted that the judgement is
During whether the corresponding IP connection of domain name succeeds in system file, the corresponding IP of domain name may be different in system file.It is specific as follows to state,
The IP address obtained for the first time is the IP address in local file, i.e. local dns parse address.After obtaining for the first time with obtaining IP every time
Location is the dynamic IP addressing for requesting dns resolution to obtain to dns server, is needed exist in view of exception, if local dns
It is not held as a hostage, then the IP address obtained every time after obtaining for the first time is still the IP address in local file.
Judge whether response normal, according to judging result, it is corresponding be arranged DNS whether may be held as a hostage in respectively include
Following situation:
Situation one, home domain name parsing is normal if response is normal, while being parsed using local dns, then modifies local
Domain name mapping is reliable.
Situation two, home domain name parsing is normal if response is normal, and local dns parsing is not used, then not to local
Domain name reliability is modified.
Situation three, if response is abnormal, and is parsed using local dns, then modify home domain name resolve to it is unreliable, break
Open connection and reconnection.
Situation four disconnects simultaneously reconnection if response is abnormal, and is not used local dns parsing.
As shown in Fig. 2, the anti-abduction method of the DNS provided in the present embodiment includes:
Step S10: carrying out scene setting, and any of local dns parsing may be held as a hostage and use by being set as DNS
A kind of state.
Step S12 ': judge whether local dns are held as a hostage according to scene setting.
Step S12 ' 1: if be held as a hostage, local dns has been set using and have resolved to no, progress dns resolution, according to this
The IP that secondary dns resolution obtains enters next step S11.
Step S12 ' 2: if be not held as a hostage, it is yes for DNS is arranged may being held as a hostage, into next step S101.
Step S101: it inquires to obtain IP address by local file.
Step S11: obtaining IP address, be attached according to the IP address of acquisition, judges whether connection succeeds.
Step S111: if connection is unsuccessful, return step S12 '.
Step S112: if successful connection, step S12 is performed the next step.
Step S12: such as successful connection, judge whether to parse using local dns.
Step S121: it is no that DNS, which is if it is arranged, to be held as a hostage.
Step S122: if otherwise continuing step S13.
Step S13: data packet is sent to obtain response.
Step S14: judge whether response is normal.
Step S141: if response is normal, judge whether to parse using local dns.
Step S1411: if it is determined that whether resolved to using local dns is, then it is no that DNS, which is arranged, to be held as a hostage
After terminate process.
Step S1412: if it is determined that whether resolving to using local dns no, then directly terminate process.
Step S141 ': if response is abnormal, judge whether to parse using local dns.
Step S141 ' 1: if YES, then it is yes for DNS is arranged may being held as a hostage, and is disconnected, return step
S12’。
Step S141 ' 2: if NO, then directly disconnecting, return step S12 '.
In addition one specific implementation process is provided again, as shown in figure 3,
Step S10: it sets DNS for scene setting and may be held as a hostage to be no, having used local dns to resolve to is.
Step S101 inquires to obtain IP address by local file.
Step S11: obtaining IP address, be attached according to the IP address of acquisition, judges whether connection succeeds.
Step S12 ': such as connection failure, judge whether local dns are held as a hostage according to scene setting.
Step S12 ' 1: if be held as a hostage, local dns has been set using and have resolved to no, progress dns resolution, according to this
The IP that secondary dns resolution obtains returns to step S11, rejudges whether IP connection succeeds.
Step S12 ' 2: if be not held as a hostage, it is yes for DNS is arranged may being held as a hostage, and returns to step S11.
Step S12: such as successful connection, judge whether to parse using local dns.
Step S121: it is no that DNS, which is if it is arranged, to be held as a hostage.
Step S122: if otherwise continuing step S13.
Step S13: data packet is sent to obtain response.
Step S14: judge whether response is normal.
Step S141: if response is normal, judge whether to parse using local dns.
Step S1411: if it is determined that whether resolved to using local dns is, then it is no that DNS, which is arranged, to be held as a hostage
After terminate process.
Step S1412: if it is determined that whether resolving to using local dns no, then directly terminate process.
Step S141 ': if response is abnormal, judge whether to parse using local dns.
Step S141 ' 1: if YES, then it is yes for DNS is arranged may being held as a hostage, and is disconnected, return step S11.
Step S141 ' 2: if NO, then directly disconnecting, return step S11.
Respond it is abnormal be attached to be held as a hostage domain name in the case where, client turns off connection, then to DNS
Server does DNS request, obtains the IP that dns resolution obtains, then reconnects, the load for enhancing server as far as possible is equal
Weighing apparatus.
In the embodiment that the disclosure provides, after each successful connection, the result of response is detected, if testing result
Correctly to connect, the interaction of client and server-side is carried out, re-starts domain name solution if testing result is incorrect connection
It analyses and connects, with the risk of the reduction Domain Hijacking of maximum possible, ensure user security.
In an exemplary embodiment of the disclosure, a kind of DNS antihijacking device is additionally provided, comprising: the first processing
Module, Second processing module, the first execution module and the second execution module.First processing module is for judging domain in system file
Whether the corresponding IP connection of name succeeds.Second processing module judges whether to parse using local dns after being used for successful connection, and sentences
Whether disconnected response is normal.First execution module decides whether to execute dns resolution according to first processing module.Second execution module
According to the judging result of Second processing module, decide whether that executing disconnection IP connects and reconnected.
In an exemplary embodiment of the disclosure, a kind of electronic equipment is additionally provided, wherein including memory, place
Device and network interface controller are managed, is stored with the computer program that can be run in the processing in the memory, wherein institute
State memory for store at least one executable instruction, network interface controller be used for allow network communication, the processor
The anti-abduction method of DNS as described above is executed according to the executable instruction.
So far, attached drawing is had been combined the embodiment of the present disclosure is described in detail.It should be noted that in attached drawing or saying
In bright book text, the implementation for not being painted or describing is form known to a person of ordinary skill in the art in technical field, and
It is not described in detail.In addition, the above-mentioned definition to each element and method be not limited in mentioning in embodiment it is various specific
Structure, shape or mode, those of ordinary skill in the art simply can be changed or be replaced to it.
According to above description, those skilled in the art should abduction method, apparatus anti-to disclosure DNS and electronic equipment have
Clear understanding.
In conclusion the disclosure, which provides one kind, can protect DNS in resolving and perceive DNS quilt upon connection
It kidnaps and restores access, conducive to the anti-abduction method, apparatus of DNS for taking into account good anti-abduction ability while guaranteeing performance
And electronic equipment.
It should also be noted that, word "comprising" does not exclude the presence of element or step not listed in the claims.It is located at
Word "a" or "an" before element does not exclude the presence of multiple such elements.
The word of ordinal number such as " first ", " second ", " third " etc. used in specification and claim, with modification
Corresponding element, itself is not meant to that the element has any ordinal number, does not also represent the suitable of a certain element and another element
Sequence in sequence or manufacturing method, the use of those ordinal numbers are only used to enable an element and another tool with certain name
Clear differentiation can be made by having the element of identical name.
In addition, unless specifically described or the step of must sequentially occur, there is no restriction in the above institute for the sequence of above-mentioned steps
Column, and can change or rearrange according to required design.And above-described embodiment can be based on the considerations of design and reliability, that
This mix and match is used using or with other embodiments mix and match, i.e., the technical characteristic in different embodiments can be freely combined
Form more embodiments.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of each open aspect, In
Above in the description of the exemplary embodiment of the disclosure, each feature of the disclosure is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
The disclosure of shield requires features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, open aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as the separate embodiments of the disclosure.
Particular embodiments described above has carried out further in detail the purpose of the disclosure, technical scheme and beneficial effects
Describe in detail it is bright, it is all it should be understood that be not limited to the disclosure the foregoing is merely the specific embodiment of the disclosure
Within the spirit and principle of the disclosure, any modification, equivalent substitution, improvement and etc. done should be included in the guarantor of the disclosure
Within the scope of shield.
Claims (10)
1. a kind of anti-abduction method of DNS, comprising:
IP address is obtained, is attached according to the IP address of acquisition, judges whether connection succeeds;
Such as successful connection, judge whether to parse using local dns according to scene setting, if it is be arranged DNS may by
Abduction is no, if otherwise directly carrying out next step;
Data packet is sent to obtain response;
Judge whether response is normal, it is corresponding to be arranged whether DNS be held as a hostage according to judging result.
2. the anti-abduction method of DNS according to claim 1, wherein the acquisition IP address, according to the IP address of acquisition into
Row connection, judges whether connection succeeds, comprising:
Such as connection failure, judge whether local dns are held as a hostage according to scene setting;
Dns resolution is carried out if being held as a hostage, and is initiated the connection according to the IP that this dns resolution obtains, rejudging IP connection is
No success;
It is yes for local dns are arranged if not being held as a hostage may being held as a hostage, and rejudges whether connection succeeds.
3. the anti-abduction method of DNS according to claim 1, wherein it is described to judge whether response is normal, it is tied according to judgement
Fruit, it is corresponding to be arranged whether DNS be held as a hostage, comprising:
Judge whether response is normal, then judges whether to parse using local dns if YES;
If it is determined that whether resolved to using local dns is, then it is no that DNS, which is arranged, to be held as a hostage.
4. the anti-abduction method of DNS according to claim 1, wherein it is described to judge whether response is normal, it is tied according to judgement
Fruit, it is corresponding to be arranged whether DNS be held as a hostage, comprising:
Judge whether response is normal, then judges whether to parse using local dns if YES;
If it is determined that whether being resolved to using local dns no, then terminate.
5. the anti-abduction method of DNS according to claim 1, wherein it is described to judge whether response is normal, it is tied according to judgement
Fruit, it is corresponding to be arranged whether DNS be held as a hostage, comprising:
Judge whether response is normal, if it is otherwise judging whether to parse using local dns;
It is yes that DNS is then arranged if YES to be held as a hostage;
Acquisition IP address is disconnected and be back to, is attached according to the IP address of reacquisition, judges whether connection succeeds.
6. the anti-abduction method of DNS according to claim 1, wherein it is described to judge whether response is normal, it is tied according to judgement
Fruit, it is corresponding to be arranged whether DNS be held as a hostage, comprising:
Judge whether response is normal, if it is otherwise judging whether to parse using local dns;
If it is otherwise disconnecting and being back to acquisition IP address, it is attached according to the IP address of reacquisition, judges to connect
It connects and whether succeeds.
7. the anti-abduction method of DNS according to any one of claim 1 to 6, wherein the scene setting includes: setting
Whether the state that may be held as a hostage and setting use one of local dns parsing or a variety of.
8. the anti-abduction method of DNS according to claim 1, wherein
IP address is obtained, is attached according to the IP address of acquisition, judges whether connection is successful, the IP address obtained for the first time is
IP address in local file.
9. a kind of DNS antihijacking device, wherein include:
First processing module, for judging whether the corresponding IP connection of domain name succeeds in system file;
Second processing module judges whether to parse using local dns after successful connection, and judges whether response is normal;
First execution module decides whether to execute dns resolution according to first processing module;
Second execution module decides whether that executing disconnection IP connects and carry out again according to the judging result of Second processing module
Connection.
10. a kind of electronic equipment, wherein including memory, processor and network interface controller, be stored in the memory
The computer program that can be run in the processing, wherein the memory is for storing at least one executable instruction, network
For allowing network communication, the processor is executed according to the executable instruction as appointed in claim 1-8 interface controller
The anti-abduction method of DNS described in one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910752532.3A CN110445798B (en) | 2019-08-14 | 2019-08-14 | DNS anti-hijacking method and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910752532.3A CN110445798B (en) | 2019-08-14 | 2019-08-14 | DNS anti-hijacking method and device and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110445798A true CN110445798A (en) | 2019-11-12 |
CN110445798B CN110445798B (en) | 2021-09-17 |
Family
ID=68435599
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910752532.3A Active CN110445798B (en) | 2019-08-14 | 2019-08-14 | DNS anti-hijacking method and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110445798B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105610867A (en) * | 2016-03-01 | 2016-05-25 | 阿继琛 | DNS (Domain Name System) hijack prevention method and apparatus |
CN106330849A (en) * | 2015-07-07 | 2017-01-11 | 安恒通(北京)科技有限公司 | Method and device for preventing domain name hijack |
CN106790083A (en) * | 2016-12-22 | 2017-05-31 | 掌阅科技股份有限公司 | Detection method, device and mobile terminal that DNS is kidnapped |
-
2019
- 2019-08-14 CN CN201910752532.3A patent/CN110445798B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106330849A (en) * | 2015-07-07 | 2017-01-11 | 安恒通(北京)科技有限公司 | Method and device for preventing domain name hijack |
CN105610867A (en) * | 2016-03-01 | 2016-05-25 | 阿继琛 | DNS (Domain Name System) hijack prevention method and apparatus |
CN106790083A (en) * | 2016-12-22 | 2017-05-31 | 掌阅科技股份有限公司 | Detection method, device and mobile terminal that DNS is kidnapped |
Also Published As
Publication number | Publication date |
---|---|
CN110445798B (en) | 2021-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7287083B1 (en) | Computing environment failover in a branch office environment | |
JP5693576B2 (en) | Managing instant messaging sessions | |
CN109547458B (en) | Login verification method and device, computer equipment and storage medium | |
CN101232375B (en) | Single sign-on system, information terminal device, single sign-on server, single sign-on utilization method | |
CN101252584B (en) | Authentication method, system and equipment for bidirectional forwarding detection protocol conversation | |
US8990573B2 (en) | System and method for using variable security tag location in network communications | |
US20090217353A1 (en) | Method, system and device for network access control supporting quarantine mode | |
CN101640679A (en) | Domain name resolution agent method and device therefor | |
JP5309496B2 (en) | Authentication system and authentication method | |
US8522336B2 (en) | Gateway device and method for using the same to prevent phishing attacks | |
CN101669347A (en) | Method and apparatus for detecting port scans with fake source address | |
US7496949B2 (en) | Network system, proxy server, session management method, and program | |
WO2017008047A1 (en) | Authentication method, apparatus, and system | |
JPWO2008026288A1 (en) | Network connection terminal authentication method, network connection terminal authentication program, and network connection terminal authentication apparatus | |
CN111049946B (en) | Portal authentication method, portal authentication system, electronic equipment and storage medium | |
CN104168339A (en) | Method and device for preventing domain name from being intercepted | |
US20140041012A1 (en) | System for the management of access points | |
CN101621527B (en) | Method, system and device for realizing safety certificate based on Portal in VPN | |
CN106453349B (en) | Account login method and device | |
CN112596874A (en) | Information processing method and electronic equipment | |
CN105812481A (en) | Hypertext transfer protocol request identification system and hypertext transfer protocol request identification method | |
CN108540552A (en) | Apparatus interconnection method, apparatus, system, equipment and storage medium | |
CN114938288A (en) | Data access method, device, equipment and storage medium | |
CN110445798A (en) | The anti-abduction method, apparatus of DNS and electronic equipment | |
CN109818912B (en) | Method and device for preventing flooding attack, load balancing equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |