NOVEL DNS RECORD TYPE FOR NETWORK THREAT PREVENTION
20210392162 · 2021-12-16
Inventors
Cpc classification
H04L61/5014
ELECTRICITY
H04L63/1466
ELECTRICITY
H04L63/20
ELECTRICITY
International classification
Abstract
A method for identifying a source of network attack by proving an autonomous system number record (ASN record) that includes an IP address, a public autonomous system number (public ASN), and a private autonomous system number (private ASN). The public ASN and the private ASNs can be unique randomly generated combination of numbers. The IP address and the public ASN can be incorporated in the network packets for tracking a route of the network packets in a network.
Claims
1. A method for identifying a source of network attack, the method comprising the steps of: proving an autonomous system number record (ASN record) that includes an IP address, a public autonomous system number (public ASN), and a private autonomous system number (private ASN) in a host device; and incorporating the IP address and the public ASN in network packets transmitted by the host device.
2. The method according to claim 1, wherein the method further comprises the steps of: transmitting, by the host device, a DHCP request to a Dynamic Host Configuration Protocol server; and receiving, by the Dynamic Host Configuration Protocol server from an ASN generator, the public ASN and the private ASN.
3. The method according to claim 2, wherein the ASN generator is implemented within a system, the system comprises a processor and a memory, the memory includes the ASN generator and a registry, the method further comprises the steps of: recording the public ASN and the private ASN in the registry.
4. The method according to claim 1, wherein the method further comprises the steps of: tracking a route of the network packets in a network, transmitted by the host device to a client device, using the public ASN number and the private ASN number; and blocking the host device by the client device from receiving the network packets.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0021] The accompanying figures, which are incorporated herein, form part of the specification and illustrate embodiments of the present invention. Together with the description, the figures further explain the principles of the present invention and to enable a person skilled in the relevant arts to make and use the invention.
[0022]
[0023]
[0024]
DETAILED DESCRIPTION
[0025] Subject matter will now be described more fully hereinafter with reference to the accompanying drawings, which form a part hereof, and which show, by way of illustration, specific exemplary embodiments. Subject matter may, however, be embodied in a variety of different forms and, therefore, covered or claimed subject matter is intended to be construed as not being limited to any exemplary embodiments set forth herein; exemplary embodiments are provided merely to be illustrative. Likewise, a reasonably broad scope for claimed or covered subject matter is intended. Among other things, for example, the subject matter may be embodied as methods, devices, components, or systems. The following detailed description is, therefore, not intended to be taken in a limiting sense.
[0026] The word “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any embodiment described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments. Likewise, the term “embodiments of the present invention” does not require that all embodiments of the invention include the discussed feature, advantage, or mode of operation.
[0027] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of embodiments of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprise”, “comprising,”, “includes” and/or “including”, when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
[0028] The following detailed description includes the best currently contemplated mode or modes of carrying out exemplary embodiments of the invention. The description is not to be taken in a limiting sense but is made merely for the purpose of illustrating the general principles of the invention, since the scope of the invention will be best defined by the allowed claims of any resulting patent.
[0029] Disclosed is a DNS record type that can identify hosts in a network and can also track a route of network packets in a network to identify the real source of packets. Disclosed is a method to track the source of network packets and block the same, including the spoofed network packages having a spoofed IP address. Disclosed DNS record type can help to locate the source of DoS attacks, DDoS attacks, and other IP spoofing-based attacks by tracking the route of the spoofed network packets in the network.
[0030] Disclosed are autonomous system numbers (ASN) that can be configured in host devices, switches, and like devices in a network. Also disclosed is a novel DNS record type, referred herein as an ASN Record that contains an IP address, a private ASN, and a public ASN. The ASN record can help identify and confirm the source private and public ASNs of a network connection from outside the firewall. These records can also be used internally and be populated by a Dynamic Configuration Protocol extension that can essentially assign an IP Address as it typically does but have added steps of capturing both public and private ASNs from the internal infrastructure and routers.
[0031] Referring to
[0032] Referring to
[0033] Referring to
[0034] In one exemplary embodiment, disclosed is a DHCP extension that can capture the public facing ASN numbers and put them in a DNS record. The public ASN numbers can be tagged to the outgoing network packets which can be tracked to determine the route including origin of the network packets. The ASNs can be a combination of numerals of predetermined length generated randomly.
[0035] While the foregoing written description of the invention enables one of ordinary skill to make and use what is considered presently to be the best mode thereof, those of ordinary skill will understand and appreciate the existence of variations, combinations, and equivalents of the specific embodiment, method, and examples herein. The invention should therefore not be limited by the above-described embodiment, method, and examples, but by all embodiments and methods within the scope and spirit of the invention as claimed.