In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
In recent years, with the online shopping, live broadcast, Internet of things, sharing economy, artificial intelligence and so on continue to penetrate into our lives, the Internet industry has made rapid development. According to the latest 40th issue of the Statistical report on Internet Development in China, as of June 2017, the number of Internet users in China had reached 751 million, accounting for 5% of the global Internet users. As a result, there are more and more related hijacking problems.
In the operation of the website, using IIS7 website monitoring can find out whether the website has been hijacked in advance, including dns pollution and other problems, once found in the first time, it is much more convenient to remedy.
The impact of hijacking
From the characteristics of the two kinds of operator cache, both of them guide users to access the server of content cache by obtaining the data flow of users. The difference lies in the way to guide the user. DNS forced resolution is to force all requests under the domain name to be directed to the hijacked server by modifying the domain name resolution record. This way is simple and rough, and it is easy to cause a lot of problems. For example, dynamic content under the domain name will also be cached. This will cause problems with the serial number of the login. The cached content is not updated in time, and the old content is accessed. This is also unacceptable to many users. The cache of some unpopular resources will result in a waste of storage. The way of traffic hijacking requires mirroring user traffic for analysis and judgment. Caching some hot content that the system determines can be cached. DNS forced parsing is mainly aimed at pictures, while 302jump is mainly aimed at downloading files, audio and video and other large files.
The benefits that operators' application hijacking system can bring are:
Reduce the access of cross-network transmission and reduce the settlement of inter-network charges between operators. Domestic regions and operators operate independently, and the traffic generated by daily interconnection needs to be settled. And this fee is actually a huge expense, and it needs to be settled continuously.
The network exits between most operators range from tens to hundreds of gigabytes. Content caching system can effectively reduce the pressure of network peak exit bandwidth, which can not only reduce the expansion of interworking networks. Reduce the cost of network construction.
As the cache system can support localization services, to a certain extent, it can also achieve the purpose of speeding up network access and enhance user experience.
Since it is impossible for the personnel of the operation and maintenance system to get the update of the hijacked content in time, or to do anything else with the hijacked content, the disadvantages are:
Often access out-of-date content, files update slowly. As a result, you can't get the information you want.
Jump to another website page or be inserted into a psoriasis ad.
In order to reduce the impact of operator caching and hijacking, many enterprises are starting to use HTTPS. Including Apple's previous requirement that all domain names must be HTTPS, can HTTPS fundamentally solve this kind of problem? Through the above analysis, it is obvious that it can not be solved effectively. Https uses encryption and decryption means to ensure that the possibility of content tampering is reduced, but from the principle of operator hijacking, it can not effectively reduce the possibility of being hijacked.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.