CN109104337B - Method, device and equipment for testing network access control tool - Google Patents

Method, device and equipment for testing network access control tool Download PDF

Info

Publication number
CN109104337B
CN109104337B CN201811295839.7A CN201811295839A CN109104337B CN 109104337 B CN109104337 B CN 109104337B CN 201811295839 A CN201811295839 A CN 201811295839A CN 109104337 B CN109104337 B CN 109104337B
Authority
CN
China
Prior art keywords
tested
tool
access
command
preset time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811295839.7A
Other languages
Chinese (zh)
Other versions
CN109104337A (en
Inventor
李岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201811295839.7A priority Critical patent/CN109104337B/en
Publication of CN109104337A publication Critical patent/CN109104337A/en
Application granted granted Critical
Publication of CN109104337B publication Critical patent/CN109104337B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Debugging And Monitoring (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method for testing a network access control tool, which comprises the steps of arranging a tool to be tested and an access rule in a system to be tested, enabling the system to be tested to complete the installation and the setting of the tool to be tested, sending an access command forbidden by the access rule to the system to be tested, checking whether the tool to be tested in the system to be tested can effectively execute the access rule, and intercepting the execution of the access command so as to verify whether the tool to be tested is effective to the system to be tested. The invention also discloses a device and equipment for testing the network access control tool, which have the beneficial effects.

Description

Method, device and equipment for testing network access control tool
Technical Field
The present invention relates to the field of software testing technologies, and in particular, to a method, an apparatus, and a device for testing a network access control tool.
Background
Nowadays, more and more means for launching attacks to target systems through networks are provided, and network access control tools are also developed, and the tools can protect the target systems by applying network access control rules to the target systems. However, when testing such a network access control tool, it is necessary to manually deploy the network access control product to each version of the operating system, then manually add network access control rules to each system, and then verify whether the network access control rules are valid in each system. Because the mainstream Windows system versions in the market are over 30, when a new network access control tool is tested, the systems need to be tested one by one, and test results are analyzed one by one, so that a large amount of cost is consumed.
How to improve the testing efficiency of the network access control tool and save the testing cost is a technical problem to be solved by technical personnel in the field.
Disclosure of Invention
The invention aims to provide a method, a device and equipment for testing a network access control tool, which are used for improving the testing efficiency of the network access control tool and saving the testing cost.
To solve the above technical problem, the present invention provides a method for testing a network access control tool, comprising:
deploying a tool to be tested and an access rule in a system to be tested so that the system to be tested completes installation and setting of the tool to be tested;
sending an access command to the system under test;
judging whether the tested system executes the access command within a preset time;
if so, the tool to be tested is invalid for the system to be tested;
if not, the tool to be tested is valid for the system to be tested;
wherein the access rule comprises an instruction to prohibit execution of the access command.
Optionally, the determining whether the system under test executes the access command within a preset time specifically includes:
checking a network access control log of the system under test;
judging whether the network access control violation logs include network access control violation logs within the preset time;
if not, the tested system does not execute the access command within the preset time.
Optionally, the access command is specifically a command for accessing a preset port of the drone aircraft;
correspondingly, the determining whether the system under test executes the access command within a preset time specifically includes:
judging whether the drone receives an access request of the system to be tested to the preset port within the preset time;
if yes, the system under test executes the access command within the preset time;
if not, the tested system does not execute the access command within the preset time.
Optionally, the tool to be tested and the access rule are deployed in the system under test, so that the system under test completes installation and setting of the tool to be tested, specifically:
and sending the installation package, the installation command and the setting command of the tool to be tested to the system to be tested so that the system to be tested installs the tool to be tested according to the installation command and completes the setting of the tool to be tested according to the setting command.
Optionally, after the determining whether the system under test executes the access command within the preset time is completed, the method further includes:
and generating a test report of the tool to be tested in the system to be tested.
In order to solve the above technical problem, the present invention further provides a device for testing a network access control tool, including:
the deployment unit is used for deploying the tool to be tested in the system to be tested;
the rule setting unit is used for sending an access rule to the tested system so as to enable the tested system to complete the setting of the tool to be tested;
the sending unit is used for sending an access command to the system to be tested;
the judging unit is used for judging whether the system to be tested executes the access command within preset time; if so, the tool to be tested is invalid for the system to be tested; if not, the tool to be tested is valid for the system to be tested;
wherein the access rule comprises an instruction to prohibit execution of the access command.
Optionally, the determining unit specifically includes:
the checking subunit is used for checking the network access control log of the system under test;
the first judgment subunit is configured to judge whether the network access control violation log is included in the network access control log within the preset time; if not, the tested system does not execute the access command within the preset time.
Optionally, the access command is specifically a command for accessing a preset port of the drone aircraft;
correspondingly, the judging unit specifically includes:
the second judging subunit is configured to judge whether the drone receives an access request of the system under test to the preset port within the preset time; if yes, the system under test executes the access command within the preset time; if not, the tested system does not execute the access command within the preset time.
Optionally, the method further includes:
and the report generating unit is used for generating a test report of the tool to be tested in the system to be tested after the judgment of whether the system to be tested executes the access command within the preset time is completed.
In order to solve the above technical problem, the present invention further provides an apparatus for testing a network access control tool, including:
a memory for storing instructions comprising the steps of any of the above described methods of testing a network access control tool;
a processor to execute the instructions.
The method for testing the network access control tool provided by the invention has the advantages that the tool to be tested and the access rule are deployed in the system to be tested, so that the system to be tested finishes the installation and the setting of the tool to be tested, then the access command forbidden by the access rule is sent to the system to be tested, whether the tool to be tested in the system to be tested can effectively execute the access rule is checked, and the execution of the access command is intercepted, so that whether the tool to be tested is effective to the system to be tested is verified. The invention also provides a device and equipment for testing the network access control tool, which have the beneficial effects and are not described herein again.
Drawings
In order to more clearly illustrate the embodiments or technical solutions of the present invention, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
Fig. 1 is a flowchart of a method for testing a network access control tool according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a specific implementation manner of step S12 in fig. 1 according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating another specific implementation manner of step S12 in fig. 1 according to an embodiment of the present invention;
FIG. 4 is a flow chart of another method for testing a network access control tool according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an apparatus for testing a network access control tool according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an apparatus for testing a network access control tool according to an embodiment of the present invention.
Detailed Description
The core of the invention is to provide a method, a device and equipment for testing a network access control tool, which are used for improving the testing efficiency of the network access control tool and saving the testing cost.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart of a method for testing a network access control tool according to an embodiment of the present invention. As shown in fig. 1, a method for testing a network access control tool according to an embodiment of the present invention includes:
s10: and deploying the tool to be tested and the access rule in the system to be tested so that the system to be tested completes the installation and the setting of the tool to be tested.
It should be noted that the "system under test" in the present application includes a Windows system, and a plurality of systems under test refer to different versions of the Windows system. In addition, the tested system should be preloaded with the TCP protocol.
In a specific implementation, the test script may be written based on python3.6, based on the test server executing a pre-written test script. Establishing communication connection with a server where a tested system is located, deploying a tool to be tested and an access rule in the tested system so that the tested system completes installation and setting of the tool to be tested, and specifically, the method may include:
and sending an installation package, an installation command and a setting command of the tool to be tested to the system to be tested so that the system to be tested installs the tool to be tested according to the installation command and completes the setting of the tool to be tested according to the setting command.
And sending an installation package, an installation command and a setting command of the tool to be tested to the system to be tested, namely sending the installation package, the installation command and the setting command to a server where the system to be tested is located, and analyzing by the system to be tested.
S11: and sending an access command to the system to be tested.
And sending an access command to the system to be tested, namely sending the access command to a server where the system to be tested is located, so that the system to be tested analyzes the access command to obtain an access address.
It should be noted that the access rule includes an instruction for prohibiting execution of the access command. Namely, the access rule comprises an instruction for forbidding the tested system to access the access address in the access command.
S12: judging whether the tested system executes the access command within the preset time; if so, go to step S13; if not, the flow proceeds to step S14.
And judging whether the tool to be tested executes the access rule within the preset time, namely judging whether the tool to be tested can prevent the system to be tested from accessing the access address in the access command within the preset time.
The preset time is preset by a tester or is set according to the system reaction time.
S13: the tool under test is not valid for the system under test.
S14: the tool under test is valid for the system under test.
If the tested system fails to access the command within the preset time, the setting of the access rule on the tool to be tested in the tested system is successfully carried out, the tool to be tested successfully executes the access rule, the tool to be tested is valid for the tested system, otherwise, the tool to be tested is invalid for the tested system.
The method for testing the network access control tool provided by the embodiment of the invention has the advantages that the tool to be tested and the access rule are deployed in the system to be tested, so that the system to be tested finishes the installation and the setting of the tool to be tested, then the access command forbidden by the access rule is sent to the system to be tested, whether the tool to be tested in the system to be tested can effectively execute the access rule is checked, and the execution of the access command is intercepted, so that whether the tool to be tested is effective to the system to be tested is verified.
Fig. 2 is a flowchart illustrating a specific implementation manner of step S12 in fig. 1 according to an embodiment of the present invention. As shown in fig. 2, on the basis of the foregoing embodiment, in another embodiment, the step S12 specifically includes:
s20: the network access control log of the system under test is checked.
S21: judging whether the network access control logs in the preset time include network access control violation logs or not; if so, the flow proceeds to step S22.
S22: the system under test does not execute the access command within a preset time.
After the tool under test is installed in the system under test, the execution condition of the tool under test is recorded in the network access control log of the system under test. The preset access rule includes an instruction for prohibiting the execution of the access command, that is, the tool under test intercepts the access requirement when the system under test executes the access command. Whether the access requirement of the tested system is intercepted by the tool to be tested can be checked by checking whether the network access control log of the tested system comprises the network access control violation log or not. When the network access control log does not include the network access control violation log within the preset time, it cannot be determined that the system under test must execute the access command, and the verification needs to be performed by other methods, such as checking whether the network record in the network access control log includes the access address in the access command.
In a specific implementation, a request for reading the network access control log may be sent to the system under test based on the server where the test script is located, and whether the network access control violation log is included may be checked according to the feedback of the system under test.
On the basis of the embodiment, whether the access rule is executed by the tool to be tested is judged by checking whether the network access control log of the system to be tested comprises the network access control violation log, and a specific implementation mode for effectively judging whether the tool to be tested is suitable for the system to be tested is provided.
Fig. 3 is a flowchart illustrating another specific implementation manner of step S12 in fig. 1 according to an embodiment of the present invention. As shown in fig. 3, on the basis of the above embodiment, in another embodiment, the access command is a command for accessing a preset port of the drone;
correspondingly, step S12 specifically includes:
s30: judging whether the target drone receives an access request of a tested system to a preset port within a preset time; if so, go to step S31; if not, the flow proceeds to step S32.
S31: and executing the access command by the tested system within the preset time.
S32: the system under test does not execute the access command within a preset time.
In a specific implementation, a TCP protocol is deployed in the drone in advance to enable the drone to receive external access.
And setting the access command as a command for accessing a preset port of the drone, wherein the corresponding access rule comprises an instruction for forbidding the tested system to access the preset port. Whether the tool to be tested is in effect or not can be known by checking whether the target drone receives an access request of the system to be tested to the preset port within the preset time.
Specifically, the accessed record of the drone aircraft can be obtained by calling the local log of the drone aircraft, so as to verify whether the drone aircraft receives the access request of the tested system within the preset time.
According to the method for testing the network access control tool, provided by the embodiment of the invention, on the basis of the embodiment, the access command is specifically a command for accessing the preset port of the target drone, whether the tool to be tested is effective or not is determined by judging whether the target drone receives the access request of the system to be tested within the preset time, when a plurality of systems to be tested are tested simultaneously, the working conditions of the tool to be tested in the plurality of systems to be tested can be checked and obtained at one time, and the testing efficiency is improved.
Fig. 4 is a flowchart of another method for testing a network access control tool according to an embodiment of the present invention. As shown in fig. 4, on the basis of the foregoing embodiment, in another embodiment, after the determination of step S12 is completed, the method for testing a network access control tool further includes:
s40: and generating a test report of the tool to be tested in the tested system.
And after determining whether the tool to be tested is effective to the system to be tested, generating a test report of the tool to be tested in the system to be tested. The test report may specifically include test initiation time, name and version of the tool to be tested, version of the system under test, test result, and the like.
The method for testing the network access control tool provided by the embodiment of the invention is convenient for a tester to check by generating the test report of the tool to be tested in the tested system on the basis of the embodiment.
On the basis of the above detailed description of the embodiments corresponding to the method for testing the network access control tool, the invention also discloses a device for testing the network access control tool corresponding to the above method.
Fig. 5 is a schematic structural diagram of an apparatus for testing a network access control tool according to an embodiment of the present invention. As shown in fig. 5, an apparatus for testing a network access control tool according to an embodiment of the present invention includes:
a deployment unit 501, configured to deploy a tool to be tested in a system under test;
a rule setting unit 502, configured to send the access rule to the system under test, so that the system under test completes setting of the tool under test;
a sending unit 503, configured to send an access command to the system under test;
a determining unit 504, configured to determine whether the system under test executes the access command within a preset time; if yes, the tool to be tested is invalid for the system to be tested; if not, the tool to be tested is effective to the system to be tested;
wherein the access rule includes an instruction to prohibit execution of the access command.
Optionally, the determining unit 504 specifically includes:
the checking subunit is used for checking the network access control log of the tested system;
the first judgment subunit is used for judging whether the network access control logs in the preset time include network access control violation logs or not; if not, the tested system does not execute the access command within the preset time.
Optionally, the access command is specifically a command for accessing a preset port of the drone aircraft;
correspondingly, the determining unit 504 specifically includes:
the second judgment subunit is used for judging whether the drone receives an access request of the tested system to the preset port within the preset time; if yes, the tested system executes the access command within the preset time; if not, the tested system does not execute the access command within the preset time.
Optionally, the apparatus for testing a network access control tool may further include:
and the report generating unit is used for generating a test report of the tool to be tested in the system to be tested after finishing judging whether the system to be tested executes the access command within the preset time.
Since the embodiments of the apparatus portion and the method portion correspond to each other, please refer to the description of the embodiments of the method portion for the embodiments of the apparatus portion, which is not repeated here.
Fig. 6 is a schematic structural diagram of an apparatus for testing a network access control tool according to an embodiment of the present invention. As shown in fig. 6, the devices of the test net access control tool may have relatively large differences due to different configurations or performances, and may include one or more processors (CPUs) 610 (e.g., one or more processors) and memory 620, one or more storage media 630 (e.g., one or more mass storage devices) storing applications 633 or data 632. Memory 620 and storage medium 630 may be, among other things, transient or persistent storage. The program stored on the storage medium 630 may include one or more modules (not shown), each of which may include a sequence of instructions operating on a computing device. Further, the processor 610 may be configured to communicate with the storage medium 630 to execute a series of instruction operations in the storage medium 630 on the device 600 for testing a network access control tool.
The apparatus 600 for testing a network access control tool may also include one or more power supplies 640, one or more wired or wireless network interfaces 650, one or more input-output interfaces 660, and/or one or more operating systems 631, such as a Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTMAnd so on.
The steps in the method for testing a net access control tool described in fig. 1 to 4 above are implemented by a device for testing a net access control tool based on the structure shown in fig. 6.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatus for testing a network access control tool and the computer-readable storage medium may refer to corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed method, apparatus, device and computer-readable storage medium may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of modules is merely a division of logical functions, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form. Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a function calling device, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The method, apparatus, device and computer readable storage medium for testing network access control tools provided by the present invention are described in detail above. The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (10)

1. A method of testing a network access control facility, comprising:
deploying a tool to be tested and an access rule in a system to be tested so that the system to be tested completes installation and setting of the tool to be tested;
sending an access command to the system under test;
judging whether the tested system executes the access command within a preset time;
if so, the tool to be tested is invalid for the system to be tested;
if not, the tool to be tested is valid for the system to be tested;
wherein the access rule comprises an instruction that prohibits execution of an access address in the access command.
2. The method according to claim 1, wherein the determining whether the system under test executes the access command within a preset time includes:
checking a network access control log of the system under test;
judging whether the network access control violation logs include network access control violation logs within the preset time;
if not, the tested system does not execute the access command within the preset time.
3. Method according to claim 1, characterized in that said access command is in particular a command to access a preset port of the drone;
correspondingly, the determining whether the system under test executes the access command within a preset time specifically includes:
judging whether the drone receives an access request of the system to be tested to the preset port within the preset time;
if yes, the system under test executes the access command within the preset time;
if not, the tested system does not execute the access command within the preset time.
4. The method according to claim 1, wherein the tool under test and the access rule are deployed in a system under test, so that the system under test completes installation and setting of the tool under test, specifically:
and sending the installation package, the installation command and the setting command of the tool to be tested to the system to be tested so that the system to be tested installs the tool to be tested according to the installation command and completes the setting of the tool to be tested according to the setting command.
5. The method of claim 1, further comprising, after the determining whether the access command is executed by the system under test within a preset time, the step of:
and generating a test report of the tool to be tested in the system to be tested.
6. An apparatus for testing a network access control tool, comprising:
the deployment unit is used for deploying the tool to be tested in the system to be tested;
the rule setting unit is used for sending an access rule to the tested system so as to enable the tested system to complete the setting of the tool to be tested;
the sending unit is used for sending an access command to the system to be tested;
the judging unit is used for judging whether the system to be tested executes the access command within preset time; if so, the tool to be tested is invalid for the system to be tested; if not, the tool to be tested is valid for the system to be tested;
wherein the access rule comprises an instruction that prohibits execution of an access address in the access command.
7. The apparatus according to claim 6, wherein the determining unit specifically includes:
the checking subunit is used for checking the network access control log of the system under test;
the first judgment subunit is configured to judge whether the network access control violation log is included in the network access control log within the preset time; if not, the tested system does not execute the access command within the preset time.
8. The device according to claim 6, characterized in that said access command is in particular a command to access a preset port of the drone;
correspondingly, the judging unit specifically includes:
the second judging subunit is configured to judge whether the drone receives an access request of the system under test to the preset port within the preset time; if yes, the system under test executes the access command within the preset time; if not, the tested system does not execute the access command within the preset time.
9. The apparatus of claim 6, further comprising:
and the report generating unit is used for generating a test report of the tool to be tested in the system to be tested after the judgment of whether the system to be tested executes the access command within the preset time is completed.
10. An apparatus for testing a network access control tool, comprising:
a memory for storing instructions comprising the steps of the method of testing a network access control tool of any one of claims 1 to 5;
a processor to execute the instructions.
CN201811295839.7A 2018-11-01 2018-11-01 Method, device and equipment for testing network access control tool Active CN109104337B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811295839.7A CN109104337B (en) 2018-11-01 2018-11-01 Method, device and equipment for testing network access control tool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811295839.7A CN109104337B (en) 2018-11-01 2018-11-01 Method, device and equipment for testing network access control tool

Publications (2)

Publication Number Publication Date
CN109104337A CN109104337A (en) 2018-12-28
CN109104337B true CN109104337B (en) 2022-02-18

Family

ID=64870149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811295839.7A Active CN109104337B (en) 2018-11-01 2018-11-01 Method, device and equipment for testing network access control tool

Country Status (1)

Country Link
CN (1) CN109104337B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011871A (en) * 2019-03-28 2019-07-12 杭州迪普科技股份有限公司 A kind of access test method, device, equipment and storage medium
CN111181808B (en) * 2019-12-28 2022-02-18 苏州浪潮智能科技有限公司 Method and system for testing BMC IP access control
CN112422371A (en) * 2020-11-28 2021-02-26 焦作师范高等专科学校 Big data-based computer network test system
CN113900877B (en) * 2021-12-09 2022-02-22 浙江齐安信息科技有限公司 Automatic change testing arrangement
CN114553750B (en) * 2022-02-24 2023-09-22 杭州迪普科技股份有限公司 Automatic test method and device based on network configuration protocol

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340440A (en) * 2008-08-11 2009-01-07 中兴通讯股份有限公司 Method and apparatus for defending network attack
CN102075381A (en) * 2010-12-14 2011-05-25 云海创想信息技术(北京)有限公司 Automatic test platform server and system applied to cloud storage
CN103023710A (en) * 2011-09-21 2013-04-03 阿里巴巴集团控股有限公司 Safety test system and method
CN104391788A (en) * 2014-11-07 2015-03-04 北京交控科技有限公司 State-model-based secure communication protocol testing method and system
CN108694121A (en) * 2017-04-12 2018-10-23 杭州海康威视数字技术股份有限公司 A kind of automated testing method, apparatus and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340440A (en) * 2008-08-11 2009-01-07 中兴通讯股份有限公司 Method and apparatus for defending network attack
CN102075381A (en) * 2010-12-14 2011-05-25 云海创想信息技术(北京)有限公司 Automatic test platform server and system applied to cloud storage
CN103023710A (en) * 2011-09-21 2013-04-03 阿里巴巴集团控股有限公司 Safety test system and method
CN104391788A (en) * 2014-11-07 2015-03-04 北京交控科技有限公司 State-model-based secure communication protocol testing method and system
CN108694121A (en) * 2017-04-12 2018-10-23 杭州海康威视数字技术股份有限公司 A kind of automated testing method, apparatus and system

Also Published As

Publication number Publication date
CN109104337A (en) 2018-12-28

Similar Documents

Publication Publication Date Title
CN109104337B (en) Method, device and equipment for testing network access control tool
US9977904B2 (en) Systems and methods for automated detection of application vulnerabilities
US10025674B2 (en) Framework for running untrusted code
US9229844B2 (en) System and method for monitoring web service
US20210326196A1 (en) A remediation system to prevent incompatible program module installation in an information processing system
CN109388569B (en) Method for remotely detecting environmental anomaly of client, test server and storage medium
CN103970650A (en) Distributed testing method and device
US10042744B2 (en) Adopting an existing automation script to a new framework
CN103530162A (en) Automatic online virtual machine software installing method and system
CN112395616A (en) Vulnerability processing method and device and computer equipment
Dunagan et al. Towards a self-managing software patching process using black-box persistent-state manifests
KR101649909B1 (en) Method and apparatus for virtual machine vulnerability analysis and recovery
CN111258591A (en) Program deployment task execution method and device, computer equipment and storage medium
CN110881059A (en) Application deployment system and method, release engine and computer equipment
CN115659343A (en) Container attack simulation method and detection method for simulating real attack, and terminal
CN111324519B (en) Compatibility testing method, system, device and readable storage medium
EP3321808B1 (en) Verification system and verification method
CN113485755A (en) Device driver verification method, device and storage medium
CN111683091A (en) Method, device, equipment and storage medium for accessing cloud host console
CN116049011A (en) Deployment method and device of test environment, electronic equipment and storage medium
CN115454856A (en) Multi-application security detection method, device, medium and electronic equipment
CN113467893A (en) Virtual machine automation test method and device, storage medium and processor
Grechko et al. Secure software developing recommendations
EP2685381B1 (en) Coordinated testing
CN108769074B (en) Web server security testing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant