DNS Proxy Caching Method for False Invoice Detection
With the rapid development of web technology, web applications have grown rapidly, electronic invoices have become increasingly diversified, and false electronic invoices on the Internet have also increased dramatically. How to quickly and accurately detect false electronic invoices is a challenge. However, a large number of electronic invoice query requests may cause the false invoice detection service to be blocked, and the query results cannot be returned in time and accurately. To this end, this paper proposes a false invoice detection method based on DNS proxy cache. The method firstly designs a DNS cache storage and retrieval method based on the access characteristics of the domain name of the high-heat electronic invoice. At the same time, through a reasonable cache replacement method based on table entry probability, to ensure that the hot invoice domain name is replaced with a lower probability. Experiments show that this method reduces the average query delay of electronic invoice query and improves the stability of false invoice detection service.
KeywordsDomain name system Proxy caching False invoice detection
This work is supported by National Key R&D Program of China (No. 2017YFB0802700).
- 1.Ballani, H., Francis, P.: A simple approach to DNS DoS defense. In: Proceedings of HotNets (2006)Google Scholar
- 2.Pappas, V., Massey, D., Zhang, L.: Enhancing DNS resilience against denial of service attacks. In: Annual EEE/IFIP International Conference on Dependable Systems and Networks, pp. 450–459 (2007)Google Scholar
- 3.Yan, B., Fang, B., Li, B., Wang, Y.: Detection and defence of DNS spoofing attack. Comput. Eng. 32(21), 130–132 (2006)Google Scholar
- 4.Bellis, R.: DNS Proxy Implementation Guidelines (2009)Google Scholar
- 5.Stolikj, M., Verhoeven, R., Cuijpers, P.J.L., et al.: Proxy support for service discovery using mDNS/DNS-SD in low power networks. In: 15th International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 1–6 (2014)Google Scholar
- 7.Yuchi, X., Li, X., Yan, B., et al.: Internet usage measurements in DNS services. Comput. Eng. Appl. 45(34), 85–88 (2009)Google Scholar
- 8.Long, L.: A protection method and device against changing prefix domain name attacks. Chinese Patent: CN201110190540.7, 09 January 2013Google Scholar
- 9.Zou, D., Long, W.J., Ling, Z.: Winnowing-based similar text positioning method. In: International Conference on Internet Technology and Applications, pp. 1–5 (2010)Google Scholar
- 10.Klein, A., Shulman, H., Waidner, M.: Internet-wide study of DNS cache injections. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1–9 (2017)Google Scholar
- 11.Su, J., Li, Z., Grumbach, S., Salamatian, K., Han, C., Xie, G.: Toward accurate inference of web activities from passive DNS data. In: 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), pp. 1–6 (2018)Google Scholar
- 12.Felton, M., Tang, J., Baker, L., Edwards, C.: Evaluating DNS and cache coherence. J. Comput. Sci. Software Eng. 10(3) (2018)Google Scholar