US 12,278,803 B2
DNS request obfuscation
Andrew Low, Stittsville (CA); Zachary Charles Beckett Pywell, Stamford (GB); James McConnell, Ottawa (CA); Nathan James Roane, Gatineau (CA); Troy E. Fisher, Phoenixville, PA (US); and Dusan Boskovic, Ottawa (CA)
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Dec. 20, 2022, as Appl. No. 18/068,764.
Prior Publication US 2024/0205194 A1, Jun. 20, 2024
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01); H04L 61/4511 (2022.01)
CPC H04L 63/0414 (2013.01) [H04L 61/4511 (2022.05); H04L 63/1491 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
generating decoy domain name system (DNS) requests for obfuscating DNS request activity being handled by a private DNS server for an organization, and sending the decoy DNS requests to one or more external DNS servers for resolution;
receiving, by the private DNS server, a DNS request seeking a DNS lookup for a client device;
obfuscating the DNS request by sending, to an external DNS server of the one or more external DNS servers, the DNS request interspersed with at least some of the generated decoy DNS requests sent to the external DNS server;
receiving, from the external DNS server, a DNS response to the sent DNS request; and
providing the DNS response to a source of the DNS request.