CN109194615A - A kind of method, apparatus and computer equipment of detection device vulnerability information - Google Patents

A kind of method, apparatus and computer equipment of detection device vulnerability information Download PDF

Info

Publication number
CN109194615A
CN109194615A CN201810862315.5A CN201810862315A CN109194615A CN 109194615 A CN109194615 A CN 109194615A CN 201810862315 A CN201810862315 A CN 201810862315A CN 109194615 A CN109194615 A CN 109194615A
Authority
CN
China
Prior art keywords
information
equipment
vulnerability
hole detection
detection rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810862315.5A
Other languages
Chinese (zh)
Inventor
孙诚
林慧敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201810862315.5A priority Critical patent/CN109194615A/en
Publication of CN109194615A publication Critical patent/CN109194615A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Abstract

The embodiment of the present application provides the method, apparatus and computer equipment of a kind of detection device vulnerability information, which comprises obtains the essential information of all devices in current local area network;Hole Detection is carried out based on essential information of the preset vulnerability detection rule to the equipment, obtains and shows Hole Detection result information;In this way, can detect to the vulnerability information of all devices in current local area network, and the Hole Detection result information of each equipment is showed into user, safe early warning can be carried out to user, realize the purpose of security protection.

Description

A kind of method, apparatus and computer equipment of detection device vulnerability information
Technical field
The present invention relates to the method, apparatus of technical field of network security more particularly to a kind of detection device vulnerability information and Computer equipment.
Background technique
With the continuous development of science and technology, electronic technology has also obtained development at full speed, Internet of Things (IOT, Internet Of Things) equipment ever more popular, but safety problem also can not be ignored, once start a leak be likely to result in information be stolen, Property is lost, equipment is steered, even life is monitored, therefore needs to carry out user safe early warning at present to realize safety Protection.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind State the method, apparatus and computer equipment of the detection device vulnerability information of problem.
The first aspect of the present invention provides a kind of method of detection device vulnerability information, which comprises
Obtain the essential information of all devices in current local area network;
Hole Detection is carried out based on essential information of the preset vulnerability detection rule to the equipment, obtains and shows loophole Testing result information.
Optionally, the essential information for obtaining all devices in current local area network, comprising:
The all devices in the current local area network are identified using network protocol, obtain the equipment mark of all devices Know (ID, Identity);
Device id based on each equipment obtains the essential information of relevant device.
Optionally, the essential information of the equipment includes: device type, device name, device manufacturer, open end message One of breath, firmware information, network address information, software version information for installing in equipment are a variety of.
Optionally, described that Hole Detection is carried out to relevant device based on the corresponding vulnerability detection rule, it obtains and opens up Before showing Hole Detection result information, comprising:
Judged according to the essential information of the equipment with the presence or absence of vulnerability detection rule in local storage, if the local Exist in memory, then continues to judge with the presence or absence of vulnerability detection rule in cloud server, if depositing in the cloud server It is then obtaining loophole in the first version information and the cloud server of vulnerability detection rule in the local storage and is examining The second edition information of gauge then;
Judge whether the first version information is higher than the second edition information, if so, determining the first version The corresponding vulnerability detection rule of information is the preset vulnerability detection rule.
Optionally, described that Hole Detection, packet are carried out based on essential information of the preset vulnerability detection rule to the equipment It includes:
The device type of the equipment is determined according to the essential information of the equipment;
Obtain the corresponding vulnerability detection rule of the device type;
Hole Detection is carried out using essential information of the corresponding vulnerability detection rule of the device type to the equipment.
Optionally, described that Hole Detection, packet are carried out based on essential information of the preset vulnerability detection rule to the equipment It includes:
Obtain the title of the software to be detected of the equipment;
Title based on the software to be detected is obtained to the software version number that the equipment sends the software to be detected Request is taken, to obtain the current software version number of the software to be detected;
Title based on the software to be detected obtains described to be detected soft from the network server of publication vulnerability information The recent software version number of part;
Judge whether the current software version number of the software to be detected is less than the recent software version of the software to be detected This number, if being less than, Hole Detection is carried out to the software to be detected based on the recent software version number, determines vulnerability information Version number.
Optionally, after the acquisition Hole Detection result information, comprising:
The Hole Detection result information of all devices in current local area network is classified, determines every Hole Detection result The loophole type of information;
Corresponding loophole ID is distributed for every Hole Detection result information;
Obtain the corresponding loophole title of every Hole Detection result information, Vulnerability Description abstract, to patching bugs It is recommended that;
The corresponding loophole type of every Hole Detection result information, loophole title, Vulnerability Description are made a summary, to reparation The suggestion of loophole and loophole ID are stored into preset vulnerability information library.
Optionally, the displaying Hole Detection result information, comprising:
List display interface or icon display interface are generated according to the Hole Detection result information;
Show the list display interface or icon display interface.
Optionally, the corresponding appliance icon of each equipment, device type and equipment are shown on the icon display interface Title, the appliance icon are associated with corresponding Hole Detection result information.
Optionally, further includes:
When cursor hovers in the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment Show frame;Alternatively,
When the cursor streaks the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment Show frame.
The second aspect of the present invention, provides a kind of device of detection device vulnerability information, and described device includes:
Acquiring unit, for obtaining the essential information of all devices in current local area network;
Detection unit, for carrying out Hole Detection based on essential information of the preset vulnerability detection rule to the equipment;
Display unit, for obtaining and showing Hole Detection result information.
Optionally, the acquiring unit is specifically used for:
The all devices in the current local area network are identified using network protocol, obtain the equipment mark of all devices Know ID;
Device id based on each equipment obtains the essential information of relevant device.
Optionally, the essential information of the equipment includes: device type, device name, device manufacturer, port information, consolidates One of part information, network address information, software version number for installing in equipment are a variety of.
Optionally, described device further include: judging unit is used for:
Judged according to the essential information of the equipment with the presence or absence of vulnerability detection rule in local storage, if the local Exist in memory, then continues to judge with the presence or absence of vulnerability detection rule in cloud server, if depositing in the cloud server It is then obtaining loophole in the first version information and the cloud server of vulnerability detection rule in the local storage and is examining The second edition information of gauge then;
Judge whether the first version information is higher than the second edition information, if so, determining the first version The corresponding vulnerability detection rule of information is the preset vulnerability detection rule.
Optionally, the detection unit is specifically used for:
The device type of the equipment is determined according to the essential information of the equipment;
Obtain the corresponding vulnerability detection rule of the device type;
Hole Detection is carried out to the equipment using the device type corresponding vulnerability detection rule.
Optionally, the detection unit is specifically used for:
Obtain the title of the software to be detected of the equipment;
Title based on the software to be detected is obtained to the software version number that the equipment sends the software to be detected Request is taken, to obtain the software version number of the software to be detected;
The newest of the software to be detected is obtained from the network server of publication vulnerability information based on the dbase Software version number;
Judge whether the software version number of the software to be detected is less than recent software version number, if being less than, is based on institute It states recent software version number and Hole Detection is carried out to the software to be detected, determine the version number of vulnerability information.
Optionally, described device further include: storage unit is used for:
The Hole Detection result information of all devices in current local area network is classified, determines every Hole Detection result The loophole type of information;
Corresponding loophole ID is distributed for every Hole Detection result information;
Obtain the corresponding loophole title of every Hole Detection result information, Vulnerability Description abstract, to patching bugs It is recommended that;
The corresponding loophole type of every Hole Detection result information, loophole title, Vulnerability Description are made a summary, to reparation The suggestion of loophole and loophole ID are stored into preset vulnerability information library.
Optionally, the display unit is specifically used for:
List display interface or icon display interface are generated according to the Hole Detection result information;
Show the list display interface or icon display interface.
Optionally, the corresponding appliance icon of each equipment, device type and equipment are shown on the icon display interface Title, the appliance icon are associated with corresponding Hole Detection result information.
Optionally, the display unit is used for:
When cursor hovers in the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment Show frame;Alternatively,
When the cursor streaks the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment Show frame.
The third aspect of the present invention provides a kind of computer readable storage medium, is stored thereon with computer program, The step of being characterized in that, any of the above-described the method realized when which is executed by processor.
The fourth aspect of the present invention provides a kind of for accessing the computer equipment of website, comprising:
At least one processor;And
At least one processor being connect with the processor communication, wherein the memory is stored with can be by the place The program instruction that device executes is managed, the processor calls described program instruction to be able to carry out the step such as any of the above-described the method Suddenly.
The technical solution provided in the embodiment of the present application, has at least the following technical effects or advantages:
The embodiment of the present application provides the method, apparatus and computer equipment of a kind of detection device vulnerability information, the method It include: the essential information for obtaining all devices in current local area network;Based on preset vulnerability detection rule to the base of the equipment This information carries out Hole Detection, obtains and shows Hole Detection result information;In this way, can be set to all in current local area network Standby vulnerability information is detected, and the Hole Detection result information of each equipment is showed user, can be carried out to user Safe early warning realizes the purpose of security protection.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the method flow schematic diagram of detection device vulnerability information according to an embodiment of the invention;
Fig. 2 shows the apparatus structure schematic diagrams of detection device vulnerability information according to an embodiment of the invention.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
The embodiment of the invention provides the method, apparatus and computer equipment of a kind of detection device vulnerability information, to solve Certainly the prior art due to cannot to user show current local area network in all devices vulnerability information, cause cannot to user into The technical issues of row safe early warning.
Embodiment one
The present embodiment provides a kind of methods of detection device vulnerability information, as shown in Figure 1, method includes:
S110 obtains the essential information of all devices in current local area network;
Current local area network in the present embodiment mainly includes family lan, since the smart machine in home network is more next More, there are security risks for some equipment, in order to which security protection may be implemented, it is therefore desirable to get all devices in the network Hole Detection is carried out, then firstly the need of the essential information for getting each equipment.Wherein, equipment may include: mobile phone, calculate Machine, IPAD, router, camera, sweeping robot and children's wrist-watch etc..
As a kind of optional embodiment, since the network protocol that each equipment uses may be different, obtain The essential information of all devices in current local area network, comprising: all in current local area network are set using the network protocol of standard It is standby to be identified, obtain the device identification ID of all devices;Device id based on each equipment obtains the base of relevant device This information.
Wherein, network protocol may include: Simple Network Management Protocol (SNMP, Simple Network Management Protocol), remote terminal protocol Telnet etc..Essential information may include: device type, device name, device manufacturer, open Put one of port information, firmware information, network address information, software version number for installing in equipment or a variety of.Open end Message breath includes: port numbers, transport protocol and service type;Network address information includes: Internet protocol (IP, Internet Protocol) address and the address media access control (MAC, Media Access Control).
As a kind of optional embodiment, the essential information of all devices in current local area network is obtained, can also include: logical The essential information that pre-set configuration file obtains all devices in current local area network is crossed, includes each set in configuration file Standby essential information.
S111 carries out Hole Detection based on essential information of the preset vulnerability detection rule to the equipment, obtains and open up Show Hole Detection result information.
After the essential information for obtaining each equipment, can based on preset vulnerability detection rule to the essential information of equipment into Row Hole Detection obtains the Hole Detection result information of each equipment.
As a kind of optional embodiment, vulnerability detection rule can store in server beyond the clouds, also can store In local storage.Before carrying out Hole Detection based on essential information of the preset vulnerability detection rule to the equipment, packet It includes: being judged according to the essential information of equipment with the presence or absence of vulnerability detection rule in local storage, if existing in local storage, Then continue to judge with the presence or absence of vulnerability detection rule in cloud server, if existing in cloud server, acquisition is locally stored In device in the first version information of vulnerability detection rule and cloud server vulnerability detection rule second edition information;Judgement Whether the first version information is higher than the second edition information, if so, determining the corresponding leakage of first version information Hole detected rule is preset vulnerability detection rule, carries out Hole Detection using the vulnerability detection rule being locally stored.If first Version information is lower than second edition information, it is determined that the corresponding vulnerability detection rule of second edition information is preset Hole Detection Rule carries out Hole Detection using the vulnerability detection rule of cloud storage.
If directly utilizing the vulnerability detection rule of cloud storage but without storage vulnerability detection rule in local storage Carry out Hole Detection;If cloud does not store vulnerability detection rule, directly advised using the Hole Detection of local memory storage Then carry out Hole Detection.
Here, due to the equipment in local area network may include it is a variety of, then can be according to the first priority of equipment to setting Standby progress Hole Detection, such as: if the preferential level of the highest priority of mobile phone, computer is high, the priority of camera is minimum, So when carrying out Hole Detection to equipment, need successively to detect according to the sequence of mobile phone, computer, camera.
As a kind of optional embodiment, since the facility information that certain equipment includes may also include a variety of, then When carrying out Hole Detection to facility information, Hole Detection can also be carried out according to the second priority of facility information.Such as: certain sets Standby facility information includes: device manufacturer, port information and firmware information, if the highest priority of port information, firmware information It is secondary it is high, the priority of device manufacturer is minimum, then need according to sequence as port information, firmware information, device manufacturer according to Secondary carry out Hole Detection.
Also, different types of equipment needs the vulnerability information detected to be also different, then described be based on preset leakage Hole detected rule carries out Hole Detection to the essential information of the equipment, comprising:
The device type of equipment is determined according to the essential information of equipment;
Obtain the corresponding vulnerability detection rule of the device type;
Hole Detection is carried out using essential information of the corresponding vulnerability detection rule of device type to equipment.
For example, smart machine is mobile phone or IPAD, corresponding service is provided by some open port, then corresponding Vulnerability detection rule can be with are as follows: the open port information of direct detection device.Such as 21 ports, it can check FTP weak passwurd; 23 ports can check telnet weak passwurd.
As a kind of optional embodiment, when needing to carry out Hole Detection to the software installed in equipment, based on default Vulnerability detection rule Hole Detection is carried out to the essential information of the equipment, comprising:
Obtain the title of the software to be detected of equipment;
Title based on software to be detected sends the software version number of software to be detected to the port that the equipment opens Acquisition request, to obtain the current software version number of software to be detected;
Title based on software to be detected obtains the recent software version number of software to be detected from network server;
Judge whether the current software version number of software to be detected is less than recent software version number, if being less than, based on most The new corresponding software version information of software version number treats inspection software and carries out Hole Detection, determines the version number of vulnerability information.
It, can be with when treating inspection software based on the corresponding software version information of recent software version number and carrying out Hole Detection Include: obtain corresponding first software version information of recent software version number and software under testing version number it is corresponding second soft Part version information compares the first software version information and the second software version information, determines the version number of vulnerability information.
Alternatively, when smart machine is camera, then corresponding vulnerability detection rule can be with are as follows: detect the back door of the equipment Permission etc..
It is available to arrive Hole Detection result information after carrying out Hole Detection to the essential information of equipment, get loophole After testing result information, comprising:
The Hole Detection result information of all devices in current local area network is classified, determines every Hole Detection result The loophole type of information;
Corresponding loophole, which is distributed, for every Hole Detection result information identifies ID;
Obtain loophole title, the Vulnerability Description abstract, the suggestion to patching bugs of every Hole Detection result information;
By the corresponding loophole title of every Hole Detection result information, Vulnerability Description abstract, to the suggestions of patching bugs and Corresponding loophole ID is stored into the mapping table in preset vulnerability information library.Here, if there are corresponding loopholes for vulnerability information Version number then directly sets loophole ID for loophole version number;If it does not exist, then can be corresponding for the distribution of this vulnerability information Loophole ID.Mapping table can be as shown in table 1.
Table 1
By the loophole title of Hole Detection result information, Vulnerability Description abstract, suggestion and corresponding leakage to patching bugs Hole ID is stored to preset vulnerability information library, can find Hole Detection based on loophole title, loophole type and loophole ID Result information.
For example, loophole type is 1 if the loophole of Hole Detection result information entitled FTP weak passwurd, loophole ID is 100 When, Hole Detection result information can be searched by following code:
After getting Hole Detection result information, Hole Detection result information is showed into user, comprising: according to the leakage Hole testing result information generates list display interface or icon display interface;Show that list display interface or icon show boundary Face.
Here, list display interface includes two layers, and first layer display interface includes the device name of all devices, equipment drawing Mark and simple prompt information (not finding that safety problem or this equipment have security risk than such equipment);It is leaky existing Equipment is preferably displaying in list display interface.When the user clicks when corresponding appliance icon, second layer display interface is shown, the Two layers of display interface include Hole Detection result information and facility information, illustrate Vulnerability Description in detail in second layer display interface Abstract and the suggestion to patching bugs.
And the corresponding appliance icon of each equipment, device type and device name are shown on icon display interface, it is described Appliance icon is associated with corresponding Hole Detection result information.Divide in icon display interface two layers and arranged around middle button, Innermost layer at most shows that 6 icons, outer layer at most show 4 icons, and bilateral symmetry is distributed.Again more appliance icons just with " more More equipment " icon representation, appliance icon at this time are not responding to any click action.
It should be noted that if the type of equipment is it is found that directly display device type;If the type of equipment is unknown, show Show " equipment " two word.User can also be with self-defining device title.
When Hole Detection result information is risky, risk identification is shown in corresponding appliance icon, when cursor is in institute It states when hovering in appliance icon, pop-up shows the prompting frame for having the Hole Detection result information of equipment;Alternatively, when the cursor is drawn When crossing the appliance icon, pop-up shows the prompting frame for having the Hole Detection result information of equipment.It is shown in detail in the prompting frame Vulnerability Description abstract and suggestion to patching bugs.
As a kind of optional embodiment, if when Hole Detection function and physical examination function conflict or offline condition, appearance When unknown error, missing documents or too low version, the pop-up of abnormal conditions is popped up.
As a kind of optional embodiment, when recognizing in current local area network has new equipment access, pop-up has new equipment The prompt information of access, and the Hole Detection entrance of the equipment is provided, Hole Detection can be carried out to the equipment.And when user is true When the fixed equipment is not belonging to the equipment of home network, which can be kicked out of to the equipment.
Based on identical inventive concept, a kind of device of detection device vulnerability information is also provided herein, is detailed in
Embodiment two.
Embodiment two
The present embodiment provides a kind of device of detection device vulnerability information, as shown in Fig. 2, device include: acquiring unit 21, Detection unit 22 and display unit 23;
Acquiring unit 21 obtains the essential information of all devices in current local area network.Current local host in the present embodiment It to include family lan, since the smart machine in home network is more and more, some equipment are there are security risk, in order to can To realize security protection, it is therefore desirable to get all devices in the network and carry out Hole Detection, then acquiring unit 21 is first Need to get the essential information of each equipment.Wherein, equipment may include: mobile phone, computer, IPAD, router, camera shooting Head, sweeping robot and children's wrist-watch etc..
As a kind of optional embodiment, since the network protocol that each equipment uses may be different, obtain Unit 21 obtains the essential information of all devices in current local area network, specifically includes: using the network protocol of standard to current office All devices in the net of domain are identified, the device identification ID of all devices is obtained;Device id based on each equipment obtains Take the essential information of relevant device.
Wherein, network protocol may include: Simple Network Management Protocol (SNMP, Simple Network Management Protocol), remote terminal protocol Telnet etc..Essential information may include: device type, device name, device manufacturer, open Put one of port information, firmware information, network address information, software version number for installing in equipment or a variety of.Open end Message breath includes: port numbers, transport protocol and service type;Network address information includes: IP address and MAC Address.
As a kind of optional embodiment, acquiring unit 21 obtains the essential information of all devices in current local area network, also It may include: the essential information that all devices in current local area network are obtained by pre-set configuration file, in configuration file It include the essential information of each equipment.
After the essential information for obtaining each equipment, detection unit 22 can be based on preset vulnerability detection rule to equipment Essential information carries out Hole Detection, obtains the Hole Detection result information of each equipment.
As a kind of optional embodiment, vulnerability detection rule can store in server beyond the clouds, also can store In local storage.Here, referring to fig. 2, device further include: judging unit 24, for being based on preset vulnerability detection rule Before carrying out Hole Detection to the essential information of the equipment, judged according to the essential information of the equipment be in local storage No there are vulnerability detection rules, if existing in the local storage, continue to judge in cloud server with the presence or absence of loophole Detected rule obtains the first version of vulnerability detection rule in the local storage if existing in the cloud server The second edition information of vulnerability detection rule in information and the cloud server;Judge whether the first version information is high In the second edition information, if so, determining that the corresponding vulnerability detection rule of the first version information is described pre- If vulnerability detection rule, utilize the vulnerability detection rule that is locally stored to carry out Hole Detection.If first version information is lower than the Two version informations, it is determined that the corresponding vulnerability detection rule of the second edition information is the preset Hole Detection rule Then, Hole Detection is carried out using the vulnerability detection rule of cloud storage.
If directly utilizing the vulnerability detection rule of cloud storage but without storage vulnerability detection rule in local storage Carry out Hole Detection;If cloud does not store vulnerability detection rule, directly advised using the Hole Detection of local memory storage Then carry out Hole Detection.
Here, due to the equipment in local area network may include it is a variety of, then can be according to the first priority of equipment to setting Standby progress Hole Detection, such as: if the preferential level of the highest priority of mobile phone, computer is high, the priority of camera is minimum, So detection unit 22 needs successively to examine according to the sequence of mobile phone, computer, camera when carrying out Hole Detection to equipment It surveys.
As a kind of optional embodiment, since the facility information that certain equipment includes may also be including a variety of, then examining Unit 22 is surveyed when carrying out Hole Detection to facility information, loophole inspection can also be carried out according to the second priority of facility information It surveys.Such as: the facility information of certain equipment includes: device manufacturer, port information and firmware information, if the priority of port information is most High, firmware information time is high, the priority of device manufacturer is minimum, then need according to port information, firmware information, device manufacturer this The sequence of sample successively carries out Hole Detection.
Also, different types of equipment needs the vulnerability information detected to be also different, and detection unit 22 is specifically used for:
The device type of equipment is determined according to the essential information of equipment;
Obtain the corresponding vulnerability detection rule of device type;
Hole Detection is carried out using essential information of the corresponding vulnerability detection rule of device type to equipment.
For example, smart machine is mobile phone or IPAD, corresponding service is provided by some open port, then corresponding Vulnerability detection rule can be with are as follows: the open port information of direct detection device.Such as 21 ports, it can check FTP weak passwurd; 23 ports can check telnet weak passwurd.
As a kind of optional embodiment, when needing to carry out Hole Detection to the software installed in equipment, based on default Vulnerability detection rule Hole Detection is carried out to the essential information of the equipment, comprising:
Obtain the title of the software to be detected of the equipment;
Title based on the software to be detected sends the software of the software to be detected to the port that the equipment opens The acquisition request of version number, to obtain the current software version number of software to be detected;
Title based on the software to be detected obtains the recent software version number of software to be detected from network server;
Judge whether the current software version number of software to be detected is less than the recent software version number of the software to be detected, If being less than, inspection software is treated based on the corresponding software version information of recent software version number and carries out Hole Detection, determines leakage The version number of hole information.
It, can be with when treating inspection software based on the corresponding software version information of recent software version number and carrying out Hole Detection Include: obtain corresponding first software version information of recent software version number and software under testing version number it is corresponding second soft Part version information compares the first software version information and the second software version information, determines the version number of vulnerability information.
Alternatively, when smart machine is camera, then corresponding vulnerability detection rule can be with are as follows: detect the back door of the equipment Permission etc..
, here, referring to fig. 2, device further include: storage unit 25, after carrying out Hole Detection to the essential information of equipment, inspection Survey unit 22 is available to arrive Hole Detection result information, and storage unit 25 is specifically used for:
The Hole Detection result information of all devices in current local area network is classified, determines every Hole Detection result The loophole type of information;
Corresponding loophole, which is distributed, for every Hole Detection result information identifies ID;
Obtain loophole title, the Vulnerability Description abstract, the suggestion to patching bugs of every Hole Detection result information;
By the corresponding loophole title of every Hole Detection result information, Vulnerability Description abstract, to the suggestions of patching bugs and Corresponding loophole ID is stored into the mapping table in preset vulnerability information library.Here, if there are corresponding loopholes for vulnerability information Version number then directly sets loophole ID for loophole version number;If it does not exist, then can be corresponding for the distribution of this vulnerability information Loophole ID.Mapping table can be as shown in table 1.
Table 1
By the loophole title of Hole Detection result information, Vulnerability Description abstract, suggestion and corresponding leakage to patching bugs Hole ID is stored to preset vulnerability information library, can find Hole Detection based on loophole title, loophole type and loophole ID Result information.
For example, loophole type is 1 if the loophole of Hole Detection result information entitled FTP weak passwurd, loophole ID is 100 When, Hole Detection result information can be searched by following code:
After getting Hole Detection result information, display unit 23 is used to Hole Detection result information showing user, Display unit 23 is specifically used for: generating list display interface or icon display interface according to the Hole Detection result information; Show list display interface or icon display interface.
Here, list display interface includes two layers, and first layer display interface includes the device name of all devices, equipment drawing Mark and simple prompt information (not finding that safety problem or this equipment have security risk than such equipment);It is leaky existing Equipment is preferably displaying in list display interface.When the user clicks when corresponding appliance icon, second layer display interface is shown, the Two layers of display interface include Hole Detection result information and facility information, illustrate Vulnerability Description in detail in second layer display interface Abstract and the suggestion to patching bugs.
And the corresponding appliance icon of each equipment, device type and device name are shown on icon display interface, it is described Appliance icon is associated with corresponding Hole Detection result information.Divide in icon display interface two layers and arranged around middle button, Innermost layer at most shows that 6 icons, outer layer at most show 4 icons, and bilateral symmetry is distributed.Again more appliance icons just with " more More equipment " icon representation, appliance icon at this time are not responding to any click action.
It should be noted that if the type of equipment is it is found that directly display device type;If the type of equipment is unknown, show Show " equipment " two word.User can also be with self-defining device title.
When Hole Detection result information is risky, display unit 23 shows risk identification in corresponding appliance icon, When cursor hovers in the appliance icon, pop-up shows the prompting frame for having the Hole Detection result information of equipment;Alternatively, working as When the cursor streaks the appliance icon, pop-up shows the prompting frame for having the Hole Detection result information of equipment.The prompting frame In illustrate in detail Vulnerability Description abstract and the suggestion to patching bugs.
As a kind of optional embodiment, if when Hole Detection function and physical examination function conflict or offline condition, appearance When unknown error, missing documents or too low version, display unit 23 pops up the pop-up of abnormal conditions, to prompt user's Hole Detection It cannot continue.
As a kind of optional embodiment, when recognizing in current local area network has new equipment access, pop-up has new equipment The prompt information of access, and the Hole Detection entrance of the equipment is provided, Hole Detection can be carried out to the equipment.And when user is true When the fixed equipment is not belonging to the equipment of home network, then the equipment can be kicked out of to the equipment.
The technical solution provided in embodiment is originally provided, is had at least the following technical effects or advantages:
The embodiment of the present application provides the method, apparatus and computer equipment of a kind of detection device vulnerability information, the method It include: the essential information for obtaining all devices in current local area network;Based on preset vulnerability detection rule to the base of the equipment This information carries out Hole Detection, obtains and shows Hole Detection result information;In this way, can be set to all in current local area network Standby vulnerability information is detected, and the Hole Detection result information of each equipment is showed user, can be carried out to user Safe early warning realizes the purpose of security protection.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein. Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments in this include institute in other embodiments Including certain features rather than other feature, but the combination of the feature of different embodiment means in the scope of the present invention Within and form different embodiments.For example, in the following claims, embodiment claimed it is any it One can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) realize device according to an embodiment of the present invention and computer equipment, system In some or all components some or all functions.The present invention is also implemented as described herein for executing Some or all device or device programs (for example, computer program and computer program product) of method.In this way Realization program of the invention can store on a computer-readable medium, or can have the shape of one or more signal Formula.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other shape Formula provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.
The invention discloses A1, a kind of method of detection device vulnerability information, which comprises
Obtain the essential information of all devices in current local area network;
Hole Detection is carried out based on essential information of the preset vulnerability detection rule to the equipment, obtains and shows loophole Testing result information.
A2, method as described in a1, the essential information for obtaining all devices in current local area network, comprising:
The all devices in the current local area network are identified using network protocol, obtain the equipment mark of all devices Know ID;
Device id based on each equipment obtains the essential information of relevant device.
The described in any item methods of A3, such as A1-A2, the essential information of the equipment include: device type, device name, One of device manufacturer, open port information, firmware information, network address information, the software version number installed in equipment or It is a variety of.
A4, method as described in a1, it is described that loophole inspection is carried out to relevant device based on the corresponding vulnerability detection rule It surveys, before obtaining and showing Hole Detection result information, comprising:
Judged according to the essential information of the equipment with the presence or absence of vulnerability detection rule in local storage, if the local Exist in memory, then continues to judge with the presence or absence of vulnerability detection rule in cloud server, if depositing in the cloud server It is then obtaining loophole in the first version information and the cloud server of vulnerability detection rule in the local storage and is examining The second edition information of gauge then;
Judge whether the first version information is higher than the second edition information, if so, determining the first version The corresponding vulnerability detection rule of information is the preset vulnerability detection rule.
A5, method as described in a1, it is described to be carried out based on essential information of the preset vulnerability detection rule to the equipment Hole Detection, comprising:
The device type of the equipment is determined according to the essential information of the equipment;
Obtain the corresponding vulnerability detection rule of the device type;
Hole Detection is carried out using essential information of the corresponding vulnerability detection rule of the device type to the equipment.
A6, method as described in a1, it is described to be carried out based on essential information of the preset vulnerability detection rule to the equipment Hole Detection, comprising:
Obtain the title of the software to be detected of the equipment;
Title based on the software to be detected is obtained to the software version number that the equipment sends the software to be detected Request is taken, to obtain the current software version number of the software to be detected;
Title based on the software to be detected obtains the recent software version of the software to be detected from network server This number;
Judge whether the current software version number of the software to be detected is less than the recent software version of the software to be detected This number, if being less than, the software to be detected is leaked based on the corresponding software version information of the recent software version number Hole detection, determines the version number of vulnerability information.
A7, method as described in a1, after the acquisition Hole Detection result information, comprising:
The Hole Detection result information of all devices in current local area network is classified, determines every Hole Detection result The loophole type of information;
Corresponding loophole ID is distributed for every Hole Detection result information;
Obtain the corresponding loophole title of every Hole Detection result information, Vulnerability Description abstract, to patching bugs It is recommended that;
The corresponding loophole type of every Hole Detection result information, loophole title, Vulnerability Description are made a summary, to reparation The suggestion of loophole and loophole ID are stored into preset vulnerability information library.
A8, method as described in a1, the displaying Hole Detection result information, comprising:
List display interface or icon display interface are generated according to the Hole Detection result information;
Show the list display interface or icon display interface.
A9, the method as described in A8 show the corresponding appliance icon of each equipment, equipment on the icon display interface Type and device name, the appliance icon are associated with corresponding Hole Detection result information.
A10, the method as described in A9, further includes:
When cursor hovers in the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment Show frame;Alternatively,
When the cursor streaks the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment Show frame.
B11, a kind of device of detection device vulnerability information, described device include:
Acquiring unit, for obtaining the essential information of all devices in current local area network;
Detection unit, for carrying out Hole Detection based on essential information of the preset vulnerability detection rule to the equipment;
Display unit, for obtaining and showing Hole Detection result information.
B12, device as described in b11, the acquiring unit are specifically used for:
The all devices in the current local area network are identified using network protocol, obtain the equipment mark of all devices Know ID;
Device id based on each equipment obtains the essential information of relevant device.
The described in any item devices of B13, such as B11-B12, the essential information of the equipment include: device type, implementor name One of title, device manufacturer, port information, firmware information, network address information, the software version number installed in equipment are more Kind.
B14, the device as described in B1, described device further include: judging unit is used for:
Hole Detection is being carried out based on essential information of the preset vulnerability detection rule to the equipment, is obtaining and shows leakage Before the testing result information of hole, judge to advise in local storage with the presence or absence of Hole Detection according to the essential information of the equipment Then, if existing in the local storage, continue to judge with the presence or absence of vulnerability detection rule in cloud server, if the cloud Exist in the server of end, then obtains the first version information and cloud clothes of vulnerability detection rule in the local storage The second edition information of vulnerability detection rule in business device;
Judge whether the first version information is higher than the second edition information, if so, determining the first version The corresponding vulnerability detection rule of information is the preset vulnerability detection rule.
B15, device as described in b11, the detection unit are specifically used for:
The device type of the equipment is determined according to the essential information of the equipment;
Obtain the corresponding vulnerability detection rule of the device type;
Hole Detection is carried out using essential information of the corresponding vulnerability detection rule of the device type to the equipment.
B16, device as described in b11, the detection unit are specifically used for:
Obtain the title of the software to be detected of the equipment;
Title based on the software to be detected is obtained to the software version number that the equipment sends the software to be detected Request is taken, to obtain the current software version number of the software to be detected;
Title based on the software to be detected obtains the recent software version of the software to be detected from network server This number;
Judge whether the current software version number of the software to be detected is less than the recent software version of the software to be detected This number, if being less than, the software to be detected is leaked based on the corresponding software version information of the recent software version number Hole detection, determines the version number of vulnerability information.
B17, device as described in b11, described device further include: storage unit is used for:
The Hole Detection result information of all devices in current local area network is classified, determines every Hole Detection result The loophole type of information;
Corresponding loophole ID is distributed for every Hole Detection result information;
Obtain the corresponding loophole title of every Hole Detection result information, Vulnerability Description abstract, to patching bugs It is recommended that;
The corresponding loophole type of every Hole Detection result information, loophole title, Vulnerability Description are made a summary, to reparation The suggestion of loophole and loophole ID are stored into preset vulnerability information library.
B18, device as described in b11, the display unit are specifically used for:
List display interface or icon display interface are generated according to the Hole Detection result information;
Show the list display interface or icon display interface.
B19, the device as described in B18 show the corresponding appliance icon of each equipment on the icon display interface, set Standby type and device name, the appliance icon are associated with corresponding Hole Detection result information.
B20, the device as described in B19, the display unit are used for:
When cursor hovers in the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment Show frame;Alternatively,
When the cursor streaks the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment Show frame.
C21, a kind of computer readable storage medium, are stored thereon with computer program, when which is executed by processor The step of realizing any one of A1 to A10 the method.
It is D22, a kind of for accessing the computer equipment of website, comprising:
At least one processor;And
At least one processor being connect with the processor communication, wherein the memory is stored with can be by the place The program instruction that device executes is managed, the processor calls described program instruction to be able to carry out such as any one of A1 to A10 the method The step of.

Claims (10)

1. a kind of method of detection device vulnerability information, which is characterized in that the described method includes:
Obtain the essential information of all devices in current local area network;
Hole Detection is carried out based on essential information of the preset vulnerability detection rule to the equipment, obtains and shows Hole Detection Result information.
2. the method as described in claim 1, which is characterized in that the basic letter for obtaining all devices in current local area network Breath, comprising:
The all devices in the current local area network are identified using network protocol, obtain the device identification of all devices ID;
Device id based on each equipment obtains the essential information of relevant device.
3. the method according to claim 1, which is characterized in that the essential information of the equipment includes: equipment class Type, device name, device manufacturer, open port information, firmware information, network address information, the software version installed in equipment Number one of or it is a variety of.
4. the method as described in claim 1, which is characterized in that it is described based on preset vulnerability detection rule to the equipment Essential information carries out Hole Detection, before obtaining and showing Hole Detection result information, comprising:
Judged according to the essential information of the equipment with the presence or absence of vulnerability detection rule in local storage, if described be locally stored Exist in device, then continues to judge with the presence or absence of vulnerability detection rule in cloud server, if existing in the cloud server, Hole Detection in the first version information and the cloud server of vulnerability detection rule in the local storage is obtained to advise Second edition information then;
Judge whether the first version information is higher than the second edition information, if so, determining the first version information The corresponding vulnerability detection rule is the preset vulnerability detection rule.
5. a kind of device of detection device vulnerability information, which is characterized in that described device includes:
Acquiring unit, for obtaining the essential information of all devices in current local area network;
Detection unit, for carrying out Hole Detection based on essential information of the preset vulnerability detection rule to the equipment;
Display unit, for obtaining and showing Hole Detection result information.
6. device as claimed in claim 5, which is characterized in that the acquiring unit is specifically used for:
The all devices in the current local area network are identified using network protocol, obtain the device identification of all devices ID;
Device id based on each equipment obtains the essential information of relevant device.
7. such as the described in any item devices of claim 5-6, which is characterized in that the essential information of the equipment includes: equipment class Type, device name, device manufacturer, open port information, firmware information, network address information, the software version installed in equipment Number one of or it is a variety of.
8. device as claimed in claim 5, which is characterized in that described device further include: judging unit is used for:
Hole Detection is being carried out based on essential information of the preset vulnerability detection rule to the equipment, is obtaining and shows that loophole is examined It surveys before result information, is judged according to the essential information of the equipment with the presence or absence of vulnerability detection rule in local storage, if Exist in the local storage, then continues to judge with the presence or absence of vulnerability detection rule in cloud server, if the cloud takes Business device in exist, then obtain vulnerability detection rule in the local storage first version information and the cloud server The second edition information of middle vulnerability detection rule;
Judge whether the first version information is higher than the second edition information, if so, determining the first version information The corresponding vulnerability detection rule is the preset vulnerability detection rule.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The step of any one of Claims 1-4 the method is realized when row.
10. a kind of for accessing the computer equipment of website characterized by comprising
At least one processor;And
At least one processor being connect with the processor communication, wherein the memory is stored with can be by the processor The program instruction of execution, the processor call described program instruction to be able to carry out such as any one of Claims 1-4 the method The step of.
CN201810862315.5A 2018-08-01 2018-08-01 A kind of method, apparatus and computer equipment of detection device vulnerability information Pending CN109194615A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810862315.5A CN109194615A (en) 2018-08-01 2018-08-01 A kind of method, apparatus and computer equipment of detection device vulnerability information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810862315.5A CN109194615A (en) 2018-08-01 2018-08-01 A kind of method, apparatus and computer equipment of detection device vulnerability information

Publications (1)

Publication Number Publication Date
CN109194615A true CN109194615A (en) 2019-01-11

Family

ID=64937711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810862315.5A Pending CN109194615A (en) 2018-08-01 2018-08-01 A kind of method, apparatus and computer equipment of detection device vulnerability information

Country Status (1)

Country Link
CN (1) CN109194615A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109992971A (en) * 2019-04-03 2019-07-09 中电科技(北京)有限公司 Computer batch firmware safety detection method and system in local area network
CN110321708A (en) * 2019-03-21 2019-10-11 北京天防安全科技有限公司 A kind of quick vulnerability scanning method and system based on class of assets
CN110572399A (en) * 2019-09-10 2019-12-13 百度在线网络技术(北京)有限公司 vulnerability detection processing method, device, equipment and storage medium
CN110740125A (en) * 2019-09-23 2020-01-31 公安部第一研究所 method for implementing vulnerability library used for vulnerability detection of video monitoring equipment
CN112087482A (en) * 2020-07-23 2020-12-15 上海琥崧智能科技股份有限公司 Method for managing multiple devices by using cloud system
CN112152972A (en) * 2019-06-28 2020-12-29 北京奇虎科技有限公司 Method and device for detecting IOT equipment vulnerability and router
CN115277198A (en) * 2022-07-27 2022-11-01 西安热工研究院有限公司 Vulnerability detection method and device for industrial control system network and storage medium
CN115795484A (en) * 2023-02-06 2023-03-14 北京长亭未来科技有限公司 Vulnerability detection method and device for Internet of things equipment and equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105142150A (en) * 2015-08-28 2015-12-09 广东电网有限责任公司信息中心 Wireless device loophole scanning method and system based on BS mode
US20160072671A1 (en) * 2013-04-19 2016-03-10 Zte Corporation Network device detecting method and apparatus, and clound detection system
JP2017068691A (en) * 2015-09-30 2017-04-06 富士通株式会社 Diagnostic program, diagnostic method and diagnostic apparatus
CN106789902A (en) * 2016-11-11 2017-05-31 北京匡恩网络科技有限责任公司 A kind of industry control safety features detection method and device
CN107194262A (en) * 2017-05-19 2017-09-22 北京匡恩网络科技有限责任公司 Method and device for scanning leak and generation vulnerability information storehouse
CN107239705A (en) * 2017-05-25 2017-10-10 中国东方电气集团有限公司 A kind of contactless industrial control system or the static leakage location of equipment and detection method
CN107563205A (en) * 2017-09-20 2018-01-09 杭州安恒信息技术有限公司 Typical smart machine leak detection method and permeability apparatus
CN108200106A (en) * 2018-04-02 2018-06-22 浙江九州量子信息技术股份有限公司 A kind of Internet of Things safety detection means of defence

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160072671A1 (en) * 2013-04-19 2016-03-10 Zte Corporation Network device detecting method and apparatus, and clound detection system
CN105142150A (en) * 2015-08-28 2015-12-09 广东电网有限责任公司信息中心 Wireless device loophole scanning method and system based on BS mode
JP2017068691A (en) * 2015-09-30 2017-04-06 富士通株式会社 Diagnostic program, diagnostic method and diagnostic apparatus
CN106789902A (en) * 2016-11-11 2017-05-31 北京匡恩网络科技有限责任公司 A kind of industry control safety features detection method and device
CN107194262A (en) * 2017-05-19 2017-09-22 北京匡恩网络科技有限责任公司 Method and device for scanning leak and generation vulnerability information storehouse
CN107239705A (en) * 2017-05-25 2017-10-10 中国东方电气集团有限公司 A kind of contactless industrial control system or the static leakage location of equipment and detection method
CN107563205A (en) * 2017-09-20 2018-01-09 杭州安恒信息技术有限公司 Typical smart machine leak detection method and permeability apparatus
CN108200106A (en) * 2018-04-02 2018-06-22 浙江九州量子信息技术股份有限公司 A kind of Internet of Things safety detection means of defence

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110321708A (en) * 2019-03-21 2019-10-11 北京天防安全科技有限公司 A kind of quick vulnerability scanning method and system based on class of assets
CN110321708B (en) * 2019-03-21 2021-04-23 北京天防安全科技有限公司 Rapid vulnerability scanning method and system based on asset classes
CN109992971A (en) * 2019-04-03 2019-07-09 中电科技(北京)有限公司 Computer batch firmware safety detection method and system in local area network
CN109992971B (en) * 2019-04-03 2023-05-02 昆仑太科(北京)技术股份有限公司 Method and system for detecting batch firmware security of computer in local area network
CN112152972A (en) * 2019-06-28 2020-12-29 北京奇虎科技有限公司 Method and device for detecting IOT equipment vulnerability and router
CN110572399A (en) * 2019-09-10 2019-12-13 百度在线网络技术(北京)有限公司 vulnerability detection processing method, device, equipment and storage medium
CN110740125A (en) * 2019-09-23 2020-01-31 公安部第一研究所 method for implementing vulnerability library used for vulnerability detection of video monitoring equipment
CN112087482A (en) * 2020-07-23 2020-12-15 上海琥崧智能科技股份有限公司 Method for managing multiple devices by using cloud system
CN112087482B (en) * 2020-07-23 2021-06-29 上海琥崧智能科技股份有限公司 Method for managing multiple devices by using cloud system
CN115277198A (en) * 2022-07-27 2022-11-01 西安热工研究院有限公司 Vulnerability detection method and device for industrial control system network and storage medium
CN115795484A (en) * 2023-02-06 2023-03-14 北京长亭未来科技有限公司 Vulnerability detection method and device for Internet of things equipment and equipment

Similar Documents

Publication Publication Date Title
CN109194615A (en) A kind of method, apparatus and computer equipment of detection device vulnerability information
CN103632096B (en) A kind of method and apparatus that safety detection is carried out to equipment
CN109753806A (en) Server protection method and device
ES2755780T3 (en) Automated behavior and static analysis using an instrumented sandbox and machine learning classification for mobile security
CN104392175B (en) Cloud application attack processing method, apparatus and system in a kind of cloud computing system
CN105429826A (en) Fault detection method and device for database cluster
CN104268476B (en) A kind of method for running application program
CN109074454A (en) Malware is grouped automatically based on artefact
TWI677804B (en) Computer device and method of identifying whether container behavior thereof is abnormal
CN105528251B (en) Processing method, device and the mobile terminal of applicative notifications information
CN104573497B (en) A kind for the treatment of method and apparatus of startup item
US20170374082A1 (en) Dynamic packet inspection plan system
CN103975331B (en) It is incorporated with the safe data center's infrastructure management system for being managed infrastructure equipment
CN103581185A (en) Cloud searching and killing method, device and system for resisting anti-antivirus test
CN111343188A (en) Vulnerability searching method, device, equipment and storage medium
CN106874086B (en) A kind of processing method, device and the mobile terminal of application program self-starting
US20170193218A1 (en) Reducing Unregulated Aggregation Of App Usage Behaviors
CN106027540A (en) Page interception method and system and secure desktop
CN104579819B (en) network security detection method and device
CN106209918A (en) The method of a kind of internet security management and terminal
CN106454847A (en) Method and device for detecting phishing risk of public WiFi
Zhou et al. Demystifying diehard android apps
CN108898012A (en) The method and apparatus for detecting illegal program
Ibrahim et al. Aot-attack on things: A security analysis of iot firmware updates
CN105631332B (en) A kind of method and device of processing rogue program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190111

RJ01 Rejection of invention patent application after publication