CN110445798A - The anti-abduction method, apparatus of DNS and electronic equipment - Google Patents

The anti-abduction method, apparatus of DNS and electronic equipment Download PDF

Info

Publication number
CN110445798A
CN110445798A CN201910752532.3A CN201910752532A CN110445798A CN 110445798 A CN110445798 A CN 110445798A CN 201910752532 A CN201910752532 A CN 201910752532A CN 110445798 A CN110445798 A CN 110445798A
Authority
CN
China
Prior art keywords
dns
hostage
held
address
connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910752532.3A
Other languages
Chinese (zh)
Other versions
CN110445798B (en
Inventor
陈孝良
王彦龙
苏少炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sound Intelligence Technology Co Ltd
Beijing SoundAI Technology Co Ltd
Original Assignee
Beijing Sound Intelligence Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sound Intelligence Technology Co Ltd filed Critical Beijing Sound Intelligence Technology Co Ltd
Priority to CN201910752532.3A priority Critical patent/CN110445798B/en
Publication of CN110445798A publication Critical patent/CN110445798A/en
Application granted granted Critical
Publication of CN110445798B publication Critical patent/CN110445798B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Abstract

Present disclose provides a kind of anti-abduction method, apparatus of DNS and electronic equipment, the anti-abduction methods of DNS, comprising: obtains IP address, is attached according to the IP address of acquisition, judges whether connection succeeds;Such as successful connection, judge whether to parse using local dns according to scene setting, if it is be arranged DNS may be held as a hostage be it is no after retransmit data packet with obtain response, if otherwise directly transmit data packet with obtain response;Judge whether response is normal, it is corresponding to be arranged whether DNS be held as a hostage according to judging result.The disclosure can protect DNS and perceive DNS upon connection and be held as a hostage and restore access in resolving, conducive to good anti-abduction ability is taken into account while guaranteeing performance.

Description

The anti-abduction method, apparatus of DNS and electronic equipment
Technical field
This disclosure relates to domain name mapping field more particularly to a kind of anti-abduction method, apparatus of DNS and electronic equipment.
Background technique
Since DNS (Domain Name System, domain name system) agreement occurs, client accesses ten that each website just becomes It is point convenient, but the key link in DNS service --- often there is certain risk in domain name mapping, Domain Hijacking be exactly wherein it One.Domain Hijacking just refers to the parsing control that certain domain name is obtained by certain means, modifies the parsing result of this domain name, causes Modified specified IP is transferred to by former IP address to the access of the domain name, result be exactly specific network address cannot be accessed or Access is false network address, therefore the anti-abduction of DNS is just at a focus on research direction of network security.
At present for TCP (the Transmission Control that the main method of the anti-abduction of DNS includes using DNS Protocol, transmission control protocol) form, DNS request and response are encrypted etc. using the mode of encryption.But both The all different degrees of speed for reducing DNS request of method, second method are even more to need VPS (Virtual Private Server, Virtual Private Server), cost is excessive.And in these methods, once domain name is held as a hostage, without effective method Support reconnection, the operation for leaving user for relatively more.
The protection that the prior art kidnaps DNS is protected in the dns resolution stage mostly, but domain name still have it is certainly possible It is held as a hostage.But after kidnapping user can only manual reconnection, user experience is simultaneously bad.And in intelligent sound box chip all In the presence of the system file finished writing, in the case where considering load balancing, each corresponding IP of the domain name for needing to connect, if often It is secondary that all domain name is parsed, it will affect the load balancing of server in extreme circumstances.Therefore needing one can effectively solve State the anti-abduction method of DNS of problem.
Summary of the invention
(1) technical problems to be solved
It is set forth above at least partly to solve present disclose provides a kind of anti-abduction method, apparatus of DNS and electronic equipment The technical issues of.
(2) technical solution
According to one aspect of the disclosure, a kind of anti-abduction method of DNS is provided, comprising:
IP address is obtained, is attached according to the IP address of acquisition, judges whether connection succeeds;
Such as successful connection, judge whether to parse using local dns according to scene setting, DNS if it is is arranged may be It is no for being held as a hostage, if otherwise directly carrying out next step;
Data packet is sent to obtain response;
Judge whether response is normal, it is corresponding to be arranged whether DNS be held as a hostage according to judging result.
In some embodiments of the present disclosure, the acquisition IP address is attached according to the IP address of acquisition, judges to connect It connects and whether succeeds, comprising:
Such as connection failure, judge whether local dns are held as a hostage according to scene setting;
After carrying out dns resolution if being held as a hostage, is initiated the connection according to the IP that this dns resolution obtains, rejudge IP Whether connection succeeds;
It is yes for local dns are arranged if not being held as a hostage may being held as a hostage, and rejudges whether connection succeeds.
It is described to judge whether response is normal, and according to judging result, DNS is accordingly arranged in some embodiments of the present disclosure Whether may be held as a hostage, comprising:
Judge whether response is normal, then judges whether to parse using local dns if YES;
If it is determined that whether resolved to using local dns is, then it is no that DNS, which is arranged, to be held as a hostage.
It is described to judge whether response is normal, and according to judging result, DNS is accordingly arranged in some embodiments of the present disclosure Whether may be held as a hostage, comprising:
Judge whether response is normal, then judges whether to parse using local dns if YES;
If it is determined that whether being resolved to using local dns no, then terminate.
It is described to judge whether response is normal, and according to judging result, DNS is accordingly arranged in some embodiments of the present disclosure Whether may be held as a hostage, comprising:
Judge whether response is normal, if it is otherwise judging whether to parse using local dns;
It is yes that DNS is then arranged if YES to be held as a hostage;
Acquisition IP address is disconnected and be back to, is attached according to the IP address of reacquisition, whether judges connection Success.
It is described to judge whether response is normal, and according to judging result, DNS is accordingly arranged in some embodiments of the present disclosure Whether may be held as a hostage, comprising:
Judge whether response is normal, if it is otherwise judging whether to parse using local dns;
If it is otherwise disconnecting and being back to acquisition IP address, it is attached, is sentenced according to the IP address of reacquisition Whether connection breaking succeeds.
In some embodiments of the present disclosure, the scene setting includes: the state that setting may be held as a hostage and setting is It is no using one of local dns parsing or a variety of.
In some embodiments of the present disclosure, IP address is obtained, is attached according to the IP address of acquisition, judges that connection is In no success, the IP address obtained for the first time is the IP address in local file.
A kind of DNS antihijacking device another aspect of the present disclosure provides, comprising:
First processing module, for judging whether the corresponding IP connection of domain name succeeds in system file;
Second processing module judges whether to parse using local dns after successful connection, and judges whether response is normal;
First execution module decides whether to execute dns resolution according to first processing module;
Second execution module decides whether that executing disconnection IP connects and carry out according to the judging result of Second processing module It reconnects.
A kind of electronic equipment another aspect of the present disclosure provides, including memory, processor and network interface Controller is stored with the computer program that can be run in the processing in the memory, wherein the memory is for depositing At least one executable instruction is put, for network interface controller for allowing network communication, the executable instruction makes the processing Device executes the corresponding operation of the foregoing anti-abduction method of DNS.
(3) beneficial effect
It can be seen from the above technical proposal that the anti-abduction method, apparatus of disclosure DNS and electronic equipment at least have it is following One of beneficial effect or in which a part:
The disclosure can protect DNS and perceive DNS upon connection and be held as a hostage and restore access in resolving, Conducive to taking into account good anti-abduction ability while guaranteeing performance.
Detailed description of the invention
Fig. 1 is the schematic diagram of the anti-abduction method of disclosure DNS.
Fig. 2 is the schematic diagram of the anti-abduction method of an embodiment of the present disclosure DNS.
Fig. 3 is the schematic diagram of the anti-abduction method of another embodiment of disclosure DNS.
Specific embodiment
Present disclose provides a kind of anti-abduction method, apparatus of DNS and electronic equipment, the anti-abduction methods of DNS, comprising: sentence Whether the corresponding IP connection of domain name succeeds in disconnected system file;Such as successful connection, judged whether according to scene setting using local Dns resolution, DNS is if it is set may be held as a hostage be it is no after retransmit data packet to obtain response, if otherwise straight Data packet is received and sent to obtain response;Judge whether response is normal, it is corresponding DNS to be arranged whether be according to judging result It is held as a hostage.The disclosure can protect DNS and perceive DNS upon connection and be held as a hostage and restore access in resolving, benefit In taking into account good anti-abduction ability while guaranteeing performance.
Before describing solution to the problem, first defines some specific vocabulary and be helpful.
Dns resolution, also known as domain name mapping are that domain name is directed toward web space IP, allow people can be with by the domain name of registration A kind of service of website is easily accessed.IP address is that the numeric address of website is identified on network, remembers for convenience, uses Domain name come replace IP address identify site address.Domain name mapping is exactly conversion process of the domain name to IP address.
DNS is kidnapped, also known as Domain Hijacking, refers to that attacker using other attack means, has distorted the parsing knot of certain domain name Fruit causes to be held as a hostage to the access of corresponding web site unreachable to another so that the IP for being directed toward the domain name becomes another IP Perhaps personation network address thus realize illegally steal user information or destroy proper network service purpose.
For the purposes, technical schemes and advantages of the disclosure are more clearly understood, below in conjunction with specific embodiment, and reference The disclosure is further described in attached drawing.
Disclosure some embodiments will be done referring to appended attached drawing in rear and more comprehensively describe to property, some of but not complete The embodiment in portion will be shown.In fact, the various embodiments of the disclosure can be realized in many different forms, and should not be construed To be limited to this several illustrated embodiment;Relatively, these embodiments are provided so that the disclosure meets applicable legal requirement.
In an exemplary embodiment of the disclosure, a kind of anti-abduction method of DNS is provided.Fig. 1 is anti-for disclosure DNS The schematic diagram of abduction method.As shown in Figure 1, it includes: to judge domain name pair in system file that the anti-abduction method of disclosure DNS, which includes:, Whether the IP connection answered succeeds;Such as successful connection, judges whether to parse using local dns according to scene setting, if it is set It is no for setting DNS and may being held as a hostage, if sending data packet otherwise to obtain response;Judge whether response is normal, according to sentencing Break as a result, accordingly whether setting DNS may be held as a hostage.
Wherein, in judging in system file whether the corresponding IP connection of domain name is successful, such as connection failure, according to scene setting Judge whether local dns are held as a hostage;After carrying out dns resolution if being held as a hostage, initiated according to the IP that this dns resolution obtains Connection, rejudges whether connection succeeds;It is yes for local dns are arranged if not being held as a hostage may being held as a hostage, and is sentenced again Whether connection breaking succeeds.It is to be or whether no, setting uses this that wherein scene setting, which includes: the state that may be held as a hostage of setting, The state of ground dns resolution is, and setting may be held as a hostage simultaneously state and whether uses local dns parsing State is respectively to be or not no 4 kinds of combinations: (being yes) (being, no) (no, yes) (no, no).Furthermore those skilled in the art's energy The common scene setting enough understood may be selected, and no longer enumerate here.Also it should be further noted that the judgement is During whether the corresponding IP connection of domain name succeeds in system file, the corresponding IP of domain name may be different in system file.It is specific as follows to state, The IP address obtained for the first time is the IP address in local file, i.e. local dns parse address.After obtaining for the first time with obtaining IP every time Location is the dynamic IP addressing for requesting dns resolution to obtain to dns server, is needed exist in view of exception, if local dns It is not held as a hostage, then the IP address obtained every time after obtaining for the first time is still the IP address in local file.
Judge whether response normal, according to judging result, it is corresponding be arranged DNS whether may be held as a hostage in respectively include Following situation:
Situation one, home domain name parsing is normal if response is normal, while being parsed using local dns, then modifies local Domain name mapping is reliable.
Situation two, home domain name parsing is normal if response is normal, and local dns parsing is not used, then not to local Domain name reliability is modified.
Situation three, if response is abnormal, and is parsed using local dns, then modify home domain name resolve to it is unreliable, break Open connection and reconnection.
Situation four disconnects simultaneously reconnection if response is abnormal, and is not used local dns parsing.
As shown in Fig. 2, the anti-abduction method of the DNS provided in the present embodiment includes:
Step S10: carrying out scene setting, and any of local dns parsing may be held as a hostage and use by being set as DNS A kind of state.
Step S12 ': judge whether local dns are held as a hostage according to scene setting.
Step S12 ' 1: if be held as a hostage, local dns has been set using and have resolved to no, progress dns resolution, according to this The IP that secondary dns resolution obtains enters next step S11.
Step S12 ' 2: if be not held as a hostage, it is yes for DNS is arranged may being held as a hostage, into next step S101.
Step S101: it inquires to obtain IP address by local file.
Step S11: obtaining IP address, be attached according to the IP address of acquisition, judges whether connection succeeds.
Step S111: if connection is unsuccessful, return step S12 '.
Step S112: if successful connection, step S12 is performed the next step.
Step S12: such as successful connection, judge whether to parse using local dns.
Step S121: it is no that DNS, which is if it is arranged, to be held as a hostage.
Step S122: if otherwise continuing step S13.
Step S13: data packet is sent to obtain response.
Step S14: judge whether response is normal.
Step S141: if response is normal, judge whether to parse using local dns.
Step S1411: if it is determined that whether resolved to using local dns is, then it is no that DNS, which is arranged, to be held as a hostage After terminate process.
Step S1412: if it is determined that whether resolving to using local dns no, then directly terminate process.
Step S141 ': if response is abnormal, judge whether to parse using local dns.
Step S141 ' 1: if YES, then it is yes for DNS is arranged may being held as a hostage, and is disconnected, return step S12’。
Step S141 ' 2: if NO, then directly disconnecting, return step S12 '.
In addition one specific implementation process is provided again, as shown in figure 3,
Step S10: it sets DNS for scene setting and may be held as a hostage to be no, having used local dns to resolve to is.
Step S101 inquires to obtain IP address by local file.
Step S11: obtaining IP address, be attached according to the IP address of acquisition, judges whether connection succeeds.
Step S12 ': such as connection failure, judge whether local dns are held as a hostage according to scene setting.
Step S12 ' 1: if be held as a hostage, local dns has been set using and have resolved to no, progress dns resolution, according to this The IP that secondary dns resolution obtains returns to step S11, rejudges whether IP connection succeeds.
Step S12 ' 2: if be not held as a hostage, it is yes for DNS is arranged may being held as a hostage, and returns to step S11.
Step S12: such as successful connection, judge whether to parse using local dns.
Step S121: it is no that DNS, which is if it is arranged, to be held as a hostage.
Step S122: if otherwise continuing step S13.
Step S13: data packet is sent to obtain response.
Step S14: judge whether response is normal.
Step S141: if response is normal, judge whether to parse using local dns.
Step S1411: if it is determined that whether resolved to using local dns is, then it is no that DNS, which is arranged, to be held as a hostage After terminate process.
Step S1412: if it is determined that whether resolving to using local dns no, then directly terminate process.
Step S141 ': if response is abnormal, judge whether to parse using local dns.
Step S141 ' 1: if YES, then it is yes for DNS is arranged may being held as a hostage, and is disconnected, return step S11.
Step S141 ' 2: if NO, then directly disconnecting, return step S11.
Respond it is abnormal be attached to be held as a hostage domain name in the case where, client turns off connection, then to DNS Server does DNS request, obtains the IP that dns resolution obtains, then reconnects, the load for enhancing server as far as possible is equal Weighing apparatus.
In the embodiment that the disclosure provides, after each successful connection, the result of response is detected, if testing result Correctly to connect, the interaction of client and server-side is carried out, re-starts domain name solution if testing result is incorrect connection It analyses and connects, with the risk of the reduction Domain Hijacking of maximum possible, ensure user security.
In an exemplary embodiment of the disclosure, a kind of DNS antihijacking device is additionally provided, comprising: the first processing Module, Second processing module, the first execution module and the second execution module.First processing module is for judging domain in system file Whether the corresponding IP connection of name succeeds.Second processing module judges whether to parse using local dns after being used for successful connection, and sentences Whether disconnected response is normal.First execution module decides whether to execute dns resolution according to first processing module.Second execution module According to the judging result of Second processing module, decide whether that executing disconnection IP connects and reconnected.
In an exemplary embodiment of the disclosure, a kind of electronic equipment is additionally provided, wherein including memory, place Device and network interface controller are managed, is stored with the computer program that can be run in the processing in the memory, wherein institute State memory for store at least one executable instruction, network interface controller be used for allow network communication, the processor The anti-abduction method of DNS as described above is executed according to the executable instruction.
So far, attached drawing is had been combined the embodiment of the present disclosure is described in detail.It should be noted that in attached drawing or saying In bright book text, the implementation for not being painted or describing is form known to a person of ordinary skill in the art in technical field, and It is not described in detail.In addition, the above-mentioned definition to each element and method be not limited in mentioning in embodiment it is various specific Structure, shape or mode, those of ordinary skill in the art simply can be changed or be replaced to it.
According to above description, those skilled in the art should abduction method, apparatus anti-to disclosure DNS and electronic equipment have Clear understanding.
In conclusion the disclosure, which provides one kind, can protect DNS in resolving and perceive DNS quilt upon connection It kidnaps and restores access, conducive to the anti-abduction method, apparatus of DNS for taking into account good anti-abduction ability while guaranteeing performance And electronic equipment.
It should also be noted that, word "comprising" does not exclude the presence of element or step not listed in the claims.It is located at Word "a" or "an" before element does not exclude the presence of multiple such elements.
The word of ordinal number such as " first ", " second ", " third " etc. used in specification and claim, with modification Corresponding element, itself is not meant to that the element has any ordinal number, does not also represent the suitable of a certain element and another element Sequence in sequence or manufacturing method, the use of those ordinal numbers are only used to enable an element and another tool with certain name Clear differentiation can be made by having the element of identical name.
In addition, unless specifically described or the step of must sequentially occur, there is no restriction in the above institute for the sequence of above-mentioned steps Column, and can change or rearrange according to required design.And above-described embodiment can be based on the considerations of design and reliability, that This mix and match is used using or with other embodiments mix and match, i.e., the technical characteristic in different embodiments can be freely combined Form more embodiments.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of each open aspect, In Above in the description of the exemplary embodiment of the disclosure, each feature of the disclosure is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect The disclosure of shield requires features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, open aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as the separate embodiments of the disclosure.
Particular embodiments described above has carried out further in detail the purpose of the disclosure, technical scheme and beneficial effects Describe in detail it is bright, it is all it should be understood that be not limited to the disclosure the foregoing is merely the specific embodiment of the disclosure Within the spirit and principle of the disclosure, any modification, equivalent substitution, improvement and etc. done should be included in the guarantor of the disclosure Within the scope of shield.

Claims (10)

1. a kind of anti-abduction method of DNS, comprising:
IP address is obtained, is attached according to the IP address of acquisition, judges whether connection succeeds;
Such as successful connection, judge whether to parse using local dns according to scene setting, if it is be arranged DNS may by Abduction is no, if otherwise directly carrying out next step;
Data packet is sent to obtain response;
Judge whether response is normal, it is corresponding to be arranged whether DNS be held as a hostage according to judging result.
2. the anti-abduction method of DNS according to claim 1, wherein the acquisition IP address, according to the IP address of acquisition into Row connection, judges whether connection succeeds, comprising:
Such as connection failure, judge whether local dns are held as a hostage according to scene setting;
Dns resolution is carried out if being held as a hostage, and is initiated the connection according to the IP that this dns resolution obtains, rejudging IP connection is No success;
It is yes for local dns are arranged if not being held as a hostage may being held as a hostage, and rejudges whether connection succeeds.
3. the anti-abduction method of DNS according to claim 1, wherein it is described to judge whether response is normal, it is tied according to judgement Fruit, it is corresponding to be arranged whether DNS be held as a hostage, comprising:
Judge whether response is normal, then judges whether to parse using local dns if YES;
If it is determined that whether resolved to using local dns is, then it is no that DNS, which is arranged, to be held as a hostage.
4. the anti-abduction method of DNS according to claim 1, wherein it is described to judge whether response is normal, it is tied according to judgement Fruit, it is corresponding to be arranged whether DNS be held as a hostage, comprising:
Judge whether response is normal, then judges whether to parse using local dns if YES;
If it is determined that whether being resolved to using local dns no, then terminate.
5. the anti-abduction method of DNS according to claim 1, wherein it is described to judge whether response is normal, it is tied according to judgement Fruit, it is corresponding to be arranged whether DNS be held as a hostage, comprising:
Judge whether response is normal, if it is otherwise judging whether to parse using local dns;
It is yes that DNS is then arranged if YES to be held as a hostage;
Acquisition IP address is disconnected and be back to, is attached according to the IP address of reacquisition, judges whether connection succeeds.
6. the anti-abduction method of DNS according to claim 1, wherein it is described to judge whether response is normal, it is tied according to judgement Fruit, it is corresponding to be arranged whether DNS be held as a hostage, comprising:
Judge whether response is normal, if it is otherwise judging whether to parse using local dns;
If it is otherwise disconnecting and being back to acquisition IP address, it is attached according to the IP address of reacquisition, judges to connect It connects and whether succeeds.
7. the anti-abduction method of DNS according to any one of claim 1 to 6, wherein the scene setting includes: setting Whether the state that may be held as a hostage and setting use one of local dns parsing or a variety of.
8. the anti-abduction method of DNS according to claim 1, wherein
IP address is obtained, is attached according to the IP address of acquisition, judges whether connection is successful, the IP address obtained for the first time is IP address in local file.
9. a kind of DNS antihijacking device, wherein include:
First processing module, for judging whether the corresponding IP connection of domain name succeeds in system file;
Second processing module judges whether to parse using local dns after successful connection, and judges whether response is normal;
First execution module decides whether to execute dns resolution according to first processing module;
Second execution module decides whether that executing disconnection IP connects and carry out again according to the judging result of Second processing module Connection.
10. a kind of electronic equipment, wherein including memory, processor and network interface controller, be stored in the memory The computer program that can be run in the processing, wherein the memory is for storing at least one executable instruction, network For allowing network communication, the processor is executed according to the executable instruction as appointed in claim 1-8 interface controller The anti-abduction method of DNS described in one.
CN201910752532.3A 2019-08-14 2019-08-14 DNS anti-hijacking method and device and electronic equipment Active CN110445798B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910752532.3A CN110445798B (en) 2019-08-14 2019-08-14 DNS anti-hijacking method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910752532.3A CN110445798B (en) 2019-08-14 2019-08-14 DNS anti-hijacking method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN110445798A true CN110445798A (en) 2019-11-12
CN110445798B CN110445798B (en) 2021-09-17

Family

ID=68435599

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910752532.3A Active CN110445798B (en) 2019-08-14 2019-08-14 DNS anti-hijacking method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN110445798B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610867A (en) * 2016-03-01 2016-05-25 阿继琛 DNS (Domain Name System) hijack prevention method and apparatus
CN106330849A (en) * 2015-07-07 2017-01-11 安恒通(北京)科技有限公司 Method and device for preventing domain name hijack
CN106790083A (en) * 2016-12-22 2017-05-31 掌阅科技股份有限公司 Detection method, device and mobile terminal that DNS is kidnapped

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330849A (en) * 2015-07-07 2017-01-11 安恒通(北京)科技有限公司 Method and device for preventing domain name hijack
CN105610867A (en) * 2016-03-01 2016-05-25 阿继琛 DNS (Domain Name System) hijack prevention method and apparatus
CN106790083A (en) * 2016-12-22 2017-05-31 掌阅科技股份有限公司 Detection method, device and mobile terminal that DNS is kidnapped

Also Published As

Publication number Publication date
CN110445798B (en) 2021-09-17

Similar Documents

Publication Publication Date Title
US7287083B1 (en) Computing environment failover in a branch office environment
JP5693576B2 (en) Managing instant messaging sessions
CN109547458B (en) Login verification method and device, computer equipment and storage medium
CN101232375B (en) Single sign-on system, information terminal device, single sign-on server, single sign-on utilization method
CN101252584B (en) Authentication method, system and equipment for bidirectional forwarding detection protocol conversation
US8990573B2 (en) System and method for using variable security tag location in network communications
US20090217353A1 (en) Method, system and device for network access control supporting quarantine mode
CN101640679A (en) Domain name resolution agent method and device therefor
JP5309496B2 (en) Authentication system and authentication method
US8522336B2 (en) Gateway device and method for using the same to prevent phishing attacks
CN101669347A (en) Method and apparatus for detecting port scans with fake source address
US7496949B2 (en) Network system, proxy server, session management method, and program
WO2017008047A1 (en) Authentication method, apparatus, and system
JPWO2008026288A1 (en) Network connection terminal authentication method, network connection terminal authentication program, and network connection terminal authentication apparatus
CN111049946B (en) Portal authentication method, portal authentication system, electronic equipment and storage medium
CN104168339A (en) Method and device for preventing domain name from being intercepted
US20140041012A1 (en) System for the management of access points
CN101621527B (en) Method, system and device for realizing safety certificate based on Portal in VPN
CN106453349B (en) Account login method and device
CN112596874A (en) Information processing method and electronic equipment
CN105812481A (en) Hypertext transfer protocol request identification system and hypertext transfer protocol request identification method
CN108540552A (en) Apparatus interconnection method, apparatus, system, equipment and storage medium
CN114938288A (en) Data access method, device, equipment and storage medium
CN110445798A (en) The anti-abduction method, apparatus of DNS and electronic equipment
CN109818912B (en) Method and device for preventing flooding attack, load balancing equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant