CN109194615A - A kind of method, apparatus and computer equipment of detection device vulnerability information - Google Patents
A kind of method, apparatus and computer equipment of detection device vulnerability information Download PDFInfo
- Publication number
- CN109194615A CN109194615A CN201810862315.5A CN201810862315A CN109194615A CN 109194615 A CN109194615 A CN 109194615A CN 201810862315 A CN201810862315 A CN 201810862315A CN 109194615 A CN109194615 A CN 109194615A
- Authority
- CN
- China
- Prior art keywords
- information
- equipment
- vulnerability
- hole detection
- detection rule
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 294
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000004590 computer program Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 claims description 3
- 238000012360 testing method Methods 0.000 description 7
- 230000008901 benefit Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 238000013507 mapping Methods 0.000 description 4
- 238000000151 deposition Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000007689 inspection Methods 0.000 description 3
- 230000002159 abnormal effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 2
- 230000002146 bilateral effect Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000005055 memory storage Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000010408 sweeping Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Abstract
The embodiment of the present application provides the method, apparatus and computer equipment of a kind of detection device vulnerability information, which comprises obtains the essential information of all devices in current local area network;Hole Detection is carried out based on essential information of the preset vulnerability detection rule to the equipment, obtains and shows Hole Detection result information;In this way, can detect to the vulnerability information of all devices in current local area network, and the Hole Detection result information of each equipment is showed into user, safe early warning can be carried out to user, realize the purpose of security protection.
Description
Technical field
The present invention relates to the method, apparatus of technical field of network security more particularly to a kind of detection device vulnerability information and
Computer equipment.
Background technique
With the continuous development of science and technology, electronic technology has also obtained development at full speed, Internet of Things (IOT, Internet
Of Things) equipment ever more popular, but safety problem also can not be ignored, once start a leak be likely to result in information be stolen,
Property is lost, equipment is steered, even life is monitored, therefore needs to carry out user safe early warning at present to realize safety
Protection.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind
State the method, apparatus and computer equipment of the detection device vulnerability information of problem.
The first aspect of the present invention provides a kind of method of detection device vulnerability information, which comprises
Obtain the essential information of all devices in current local area network;
Hole Detection is carried out based on essential information of the preset vulnerability detection rule to the equipment, obtains and shows loophole
Testing result information.
Optionally, the essential information for obtaining all devices in current local area network, comprising:
The all devices in the current local area network are identified using network protocol, obtain the equipment mark of all devices
Know (ID, Identity);
Device id based on each equipment obtains the essential information of relevant device.
Optionally, the essential information of the equipment includes: device type, device name, device manufacturer, open end message
One of breath, firmware information, network address information, software version information for installing in equipment are a variety of.
Optionally, described that Hole Detection is carried out to relevant device based on the corresponding vulnerability detection rule, it obtains and opens up
Before showing Hole Detection result information, comprising:
Judged according to the essential information of the equipment with the presence or absence of vulnerability detection rule in local storage, if the local
Exist in memory, then continues to judge with the presence or absence of vulnerability detection rule in cloud server, if depositing in the cloud server
It is then obtaining loophole in the first version information and the cloud server of vulnerability detection rule in the local storage and is examining
The second edition information of gauge then;
Judge whether the first version information is higher than the second edition information, if so, determining the first version
The corresponding vulnerability detection rule of information is the preset vulnerability detection rule.
Optionally, described that Hole Detection, packet are carried out based on essential information of the preset vulnerability detection rule to the equipment
It includes:
The device type of the equipment is determined according to the essential information of the equipment;
Obtain the corresponding vulnerability detection rule of the device type;
Hole Detection is carried out using essential information of the corresponding vulnerability detection rule of the device type to the equipment.
Optionally, described that Hole Detection, packet are carried out based on essential information of the preset vulnerability detection rule to the equipment
It includes:
Obtain the title of the software to be detected of the equipment;
Title based on the software to be detected is obtained to the software version number that the equipment sends the software to be detected
Request is taken, to obtain the current software version number of the software to be detected;
Title based on the software to be detected obtains described to be detected soft from the network server of publication vulnerability information
The recent software version number of part;
Judge whether the current software version number of the software to be detected is less than the recent software version of the software to be detected
This number, if being less than, Hole Detection is carried out to the software to be detected based on the recent software version number, determines vulnerability information
Version number.
Optionally, after the acquisition Hole Detection result information, comprising:
The Hole Detection result information of all devices in current local area network is classified, determines every Hole Detection result
The loophole type of information;
Corresponding loophole ID is distributed for every Hole Detection result information;
Obtain the corresponding loophole title of every Hole Detection result information, Vulnerability Description abstract, to patching bugs
It is recommended that;
The corresponding loophole type of every Hole Detection result information, loophole title, Vulnerability Description are made a summary, to reparation
The suggestion of loophole and loophole ID are stored into preset vulnerability information library.
Optionally, the displaying Hole Detection result information, comprising:
List display interface or icon display interface are generated according to the Hole Detection result information;
Show the list display interface or icon display interface.
Optionally, the corresponding appliance icon of each equipment, device type and equipment are shown on the icon display interface
Title, the appliance icon are associated with corresponding Hole Detection result information.
Optionally, further includes:
When cursor hovers in the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment
Show frame;Alternatively,
When the cursor streaks the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment
Show frame.
The second aspect of the present invention, provides a kind of device of detection device vulnerability information, and described device includes:
Acquiring unit, for obtaining the essential information of all devices in current local area network;
Detection unit, for carrying out Hole Detection based on essential information of the preset vulnerability detection rule to the equipment;
Display unit, for obtaining and showing Hole Detection result information.
Optionally, the acquiring unit is specifically used for:
The all devices in the current local area network are identified using network protocol, obtain the equipment mark of all devices
Know ID;
Device id based on each equipment obtains the essential information of relevant device.
Optionally, the essential information of the equipment includes: device type, device name, device manufacturer, port information, consolidates
One of part information, network address information, software version number for installing in equipment are a variety of.
Optionally, described device further include: judging unit is used for:
Judged according to the essential information of the equipment with the presence or absence of vulnerability detection rule in local storage, if the local
Exist in memory, then continues to judge with the presence or absence of vulnerability detection rule in cloud server, if depositing in the cloud server
It is then obtaining loophole in the first version information and the cloud server of vulnerability detection rule in the local storage and is examining
The second edition information of gauge then;
Judge whether the first version information is higher than the second edition information, if so, determining the first version
The corresponding vulnerability detection rule of information is the preset vulnerability detection rule.
Optionally, the detection unit is specifically used for:
The device type of the equipment is determined according to the essential information of the equipment;
Obtain the corresponding vulnerability detection rule of the device type;
Hole Detection is carried out to the equipment using the device type corresponding vulnerability detection rule.
Optionally, the detection unit is specifically used for:
Obtain the title of the software to be detected of the equipment;
Title based on the software to be detected is obtained to the software version number that the equipment sends the software to be detected
Request is taken, to obtain the software version number of the software to be detected;
The newest of the software to be detected is obtained from the network server of publication vulnerability information based on the dbase
Software version number;
Judge whether the software version number of the software to be detected is less than recent software version number, if being less than, is based on institute
It states recent software version number and Hole Detection is carried out to the software to be detected, determine the version number of vulnerability information.
Optionally, described device further include: storage unit is used for:
The Hole Detection result information of all devices in current local area network is classified, determines every Hole Detection result
The loophole type of information;
Corresponding loophole ID is distributed for every Hole Detection result information;
Obtain the corresponding loophole title of every Hole Detection result information, Vulnerability Description abstract, to patching bugs
It is recommended that;
The corresponding loophole type of every Hole Detection result information, loophole title, Vulnerability Description are made a summary, to reparation
The suggestion of loophole and loophole ID are stored into preset vulnerability information library.
Optionally, the display unit is specifically used for:
List display interface or icon display interface are generated according to the Hole Detection result information;
Show the list display interface or icon display interface.
Optionally, the corresponding appliance icon of each equipment, device type and equipment are shown on the icon display interface
Title, the appliance icon are associated with corresponding Hole Detection result information.
Optionally, the display unit is used for:
When cursor hovers in the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment
Show frame;Alternatively,
When the cursor streaks the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment
Show frame.
The third aspect of the present invention provides a kind of computer readable storage medium, is stored thereon with computer program,
The step of being characterized in that, any of the above-described the method realized when which is executed by processor.
The fourth aspect of the present invention provides a kind of for accessing the computer equipment of website, comprising:
At least one processor;And
At least one processor being connect with the processor communication, wherein the memory is stored with can be by the place
The program instruction that device executes is managed, the processor calls described program instruction to be able to carry out the step such as any of the above-described the method
Suddenly.
The technical solution provided in the embodiment of the present application, has at least the following technical effects or advantages:
The embodiment of the present application provides the method, apparatus and computer equipment of a kind of detection device vulnerability information, the method
It include: the essential information for obtaining all devices in current local area network;Based on preset vulnerability detection rule to the base of the equipment
This information carries out Hole Detection, obtains and shows Hole Detection result information;In this way, can be set to all in current local area network
Standby vulnerability information is detected, and the Hole Detection result information of each equipment is showed user, can be carried out to user
Safe early warning realizes the purpose of security protection.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the method flow schematic diagram of detection device vulnerability information according to an embodiment of the invention;
Fig. 2 shows the apparatus structure schematic diagrams of detection device vulnerability information according to an embodiment of the invention.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
The embodiment of the invention provides the method, apparatus and computer equipment of a kind of detection device vulnerability information, to solve
Certainly the prior art due to cannot to user show current local area network in all devices vulnerability information, cause cannot to user into
The technical issues of row safe early warning.
Embodiment one
The present embodiment provides a kind of methods of detection device vulnerability information, as shown in Figure 1, method includes:
S110 obtains the essential information of all devices in current local area network;
Current local area network in the present embodiment mainly includes family lan, since the smart machine in home network is more next
More, there are security risks for some equipment, in order to which security protection may be implemented, it is therefore desirable to get all devices in the network
Hole Detection is carried out, then firstly the need of the essential information for getting each equipment.Wherein, equipment may include: mobile phone, calculate
Machine, IPAD, router, camera, sweeping robot and children's wrist-watch etc..
As a kind of optional embodiment, since the network protocol that each equipment uses may be different, obtain
The essential information of all devices in current local area network, comprising: all in current local area network are set using the network protocol of standard
It is standby to be identified, obtain the device identification ID of all devices;Device id based on each equipment obtains the base of relevant device
This information.
Wherein, network protocol may include: Simple Network Management Protocol (SNMP, Simple Network Management
Protocol), remote terminal protocol Telnet etc..Essential information may include: device type, device name, device manufacturer, open
Put one of port information, firmware information, network address information, software version number for installing in equipment or a variety of.Open end
Message breath includes: port numbers, transport protocol and service type;Network address information includes: Internet protocol (IP, Internet
Protocol) address and the address media access control (MAC, Media Access Control).
As a kind of optional embodiment, the essential information of all devices in current local area network is obtained, can also include: logical
The essential information that pre-set configuration file obtains all devices in current local area network is crossed, includes each set in configuration file
Standby essential information.
S111 carries out Hole Detection based on essential information of the preset vulnerability detection rule to the equipment, obtains and open up
Show Hole Detection result information.
After the essential information for obtaining each equipment, can based on preset vulnerability detection rule to the essential information of equipment into
Row Hole Detection obtains the Hole Detection result information of each equipment.
As a kind of optional embodiment, vulnerability detection rule can store in server beyond the clouds, also can store
In local storage.Before carrying out Hole Detection based on essential information of the preset vulnerability detection rule to the equipment, packet
It includes: being judged according to the essential information of equipment with the presence or absence of vulnerability detection rule in local storage, if existing in local storage,
Then continue to judge with the presence or absence of vulnerability detection rule in cloud server, if existing in cloud server, acquisition is locally stored
In device in the first version information of vulnerability detection rule and cloud server vulnerability detection rule second edition information;Judgement
Whether the first version information is higher than the second edition information, if so, determining the corresponding leakage of first version information
Hole detected rule is preset vulnerability detection rule, carries out Hole Detection using the vulnerability detection rule being locally stored.If first
Version information is lower than second edition information, it is determined that the corresponding vulnerability detection rule of second edition information is preset Hole Detection
Rule carries out Hole Detection using the vulnerability detection rule of cloud storage.
If directly utilizing the vulnerability detection rule of cloud storage but without storage vulnerability detection rule in local storage
Carry out Hole Detection;If cloud does not store vulnerability detection rule, directly advised using the Hole Detection of local memory storage
Then carry out Hole Detection.
Here, due to the equipment in local area network may include it is a variety of, then can be according to the first priority of equipment to setting
Standby progress Hole Detection, such as: if the preferential level of the highest priority of mobile phone, computer is high, the priority of camera is minimum,
So when carrying out Hole Detection to equipment, need successively to detect according to the sequence of mobile phone, computer, camera.
As a kind of optional embodiment, since the facility information that certain equipment includes may also include a variety of, then
When carrying out Hole Detection to facility information, Hole Detection can also be carried out according to the second priority of facility information.Such as: certain sets
Standby facility information includes: device manufacturer, port information and firmware information, if the highest priority of port information, firmware information
It is secondary it is high, the priority of device manufacturer is minimum, then need according to sequence as port information, firmware information, device manufacturer according to
Secondary carry out Hole Detection.
Also, different types of equipment needs the vulnerability information detected to be also different, then described be based on preset leakage
Hole detected rule carries out Hole Detection to the essential information of the equipment, comprising:
The device type of equipment is determined according to the essential information of equipment;
Obtain the corresponding vulnerability detection rule of the device type;
Hole Detection is carried out using essential information of the corresponding vulnerability detection rule of device type to equipment.
For example, smart machine is mobile phone or IPAD, corresponding service is provided by some open port, then corresponding
Vulnerability detection rule can be with are as follows: the open port information of direct detection device.Such as 21 ports, it can check FTP weak passwurd;
23 ports can check telnet weak passwurd.
As a kind of optional embodiment, when needing to carry out Hole Detection to the software installed in equipment, based on default
Vulnerability detection rule Hole Detection is carried out to the essential information of the equipment, comprising:
Obtain the title of the software to be detected of equipment;
Title based on software to be detected sends the software version number of software to be detected to the port that the equipment opens
Acquisition request, to obtain the current software version number of software to be detected;
Title based on software to be detected obtains the recent software version number of software to be detected from network server;
Judge whether the current software version number of software to be detected is less than recent software version number, if being less than, based on most
The new corresponding software version information of software version number treats inspection software and carries out Hole Detection, determines the version number of vulnerability information.
It, can be with when treating inspection software based on the corresponding software version information of recent software version number and carrying out Hole Detection
Include: obtain corresponding first software version information of recent software version number and software under testing version number it is corresponding second soft
Part version information compares the first software version information and the second software version information, determines the version number of vulnerability information.
Alternatively, when smart machine is camera, then corresponding vulnerability detection rule can be with are as follows: detect the back door of the equipment
Permission etc..
It is available to arrive Hole Detection result information after carrying out Hole Detection to the essential information of equipment, get loophole
After testing result information, comprising:
The Hole Detection result information of all devices in current local area network is classified, determines every Hole Detection result
The loophole type of information;
Corresponding loophole, which is distributed, for every Hole Detection result information identifies ID;
Obtain loophole title, the Vulnerability Description abstract, the suggestion to patching bugs of every Hole Detection result information;
By the corresponding loophole title of every Hole Detection result information, Vulnerability Description abstract, to the suggestions of patching bugs and
Corresponding loophole ID is stored into the mapping table in preset vulnerability information library.Here, if there are corresponding loopholes for vulnerability information
Version number then directly sets loophole ID for loophole version number;If it does not exist, then can be corresponding for the distribution of this vulnerability information
Loophole ID.Mapping table can be as shown in table 1.
Table 1
By the loophole title of Hole Detection result information, Vulnerability Description abstract, suggestion and corresponding leakage to patching bugs
Hole ID is stored to preset vulnerability information library, can find Hole Detection based on loophole title, loophole type and loophole ID
Result information.
For example, loophole type is 1 if the loophole of Hole Detection result information entitled FTP weak passwurd, loophole ID is 100
When, Hole Detection result information can be searched by following code:
After getting Hole Detection result information, Hole Detection result information is showed into user, comprising: according to the leakage
Hole testing result information generates list display interface or icon display interface;Show that list display interface or icon show boundary
Face.
Here, list display interface includes two layers, and first layer display interface includes the device name of all devices, equipment drawing
Mark and simple prompt information (not finding that safety problem or this equipment have security risk than such equipment);It is leaky existing
Equipment is preferably displaying in list display interface.When the user clicks when corresponding appliance icon, second layer display interface is shown, the
Two layers of display interface include Hole Detection result information and facility information, illustrate Vulnerability Description in detail in second layer display interface
Abstract and the suggestion to patching bugs.
And the corresponding appliance icon of each equipment, device type and device name are shown on icon display interface, it is described
Appliance icon is associated with corresponding Hole Detection result information.Divide in icon display interface two layers and arranged around middle button,
Innermost layer at most shows that 6 icons, outer layer at most show 4 icons, and bilateral symmetry is distributed.Again more appliance icons just with " more
More equipment " icon representation, appliance icon at this time are not responding to any click action.
It should be noted that if the type of equipment is it is found that directly display device type;If the type of equipment is unknown, show
Show " equipment " two word.User can also be with self-defining device title.
When Hole Detection result information is risky, risk identification is shown in corresponding appliance icon, when cursor is in institute
It states when hovering in appliance icon, pop-up shows the prompting frame for having the Hole Detection result information of equipment;Alternatively, when the cursor is drawn
When crossing the appliance icon, pop-up shows the prompting frame for having the Hole Detection result information of equipment.It is shown in detail in the prompting frame
Vulnerability Description abstract and suggestion to patching bugs.
As a kind of optional embodiment, if when Hole Detection function and physical examination function conflict or offline condition, appearance
When unknown error, missing documents or too low version, the pop-up of abnormal conditions is popped up.
As a kind of optional embodiment, when recognizing in current local area network has new equipment access, pop-up has new equipment
The prompt information of access, and the Hole Detection entrance of the equipment is provided, Hole Detection can be carried out to the equipment.And when user is true
When the fixed equipment is not belonging to the equipment of home network, which can be kicked out of to the equipment.
Based on identical inventive concept, a kind of device of detection device vulnerability information is also provided herein, is detailed in
Embodiment two.
Embodiment two
The present embodiment provides a kind of device of detection device vulnerability information, as shown in Fig. 2, device include: acquiring unit 21,
Detection unit 22 and display unit 23;
Acquiring unit 21 obtains the essential information of all devices in current local area network.Current local host in the present embodiment
It to include family lan, since the smart machine in home network is more and more, some equipment are there are security risk, in order to can
To realize security protection, it is therefore desirable to get all devices in the network and carry out Hole Detection, then acquiring unit 21 is first
Need to get the essential information of each equipment.Wherein, equipment may include: mobile phone, computer, IPAD, router, camera shooting
Head, sweeping robot and children's wrist-watch etc..
As a kind of optional embodiment, since the network protocol that each equipment uses may be different, obtain
Unit 21 obtains the essential information of all devices in current local area network, specifically includes: using the network protocol of standard to current office
All devices in the net of domain are identified, the device identification ID of all devices is obtained;Device id based on each equipment obtains
Take the essential information of relevant device.
Wherein, network protocol may include: Simple Network Management Protocol (SNMP, Simple Network Management
Protocol), remote terminal protocol Telnet etc..Essential information may include: device type, device name, device manufacturer, open
Put one of port information, firmware information, network address information, software version number for installing in equipment or a variety of.Open end
Message breath includes: port numbers, transport protocol and service type;Network address information includes: IP address and MAC Address.
As a kind of optional embodiment, acquiring unit 21 obtains the essential information of all devices in current local area network, also
It may include: the essential information that all devices in current local area network are obtained by pre-set configuration file, in configuration file
It include the essential information of each equipment.
After the essential information for obtaining each equipment, detection unit 22 can be based on preset vulnerability detection rule to equipment
Essential information carries out Hole Detection, obtains the Hole Detection result information of each equipment.
As a kind of optional embodiment, vulnerability detection rule can store in server beyond the clouds, also can store
In local storage.Here, referring to fig. 2, device further include: judging unit 24, for being based on preset vulnerability detection rule
Before carrying out Hole Detection to the essential information of the equipment, judged according to the essential information of the equipment be in local storage
No there are vulnerability detection rules, if existing in the local storage, continue to judge in cloud server with the presence or absence of loophole
Detected rule obtains the first version of vulnerability detection rule in the local storage if existing in the cloud server
The second edition information of vulnerability detection rule in information and the cloud server;Judge whether the first version information is high
In the second edition information, if so, determining that the corresponding vulnerability detection rule of the first version information is described pre-
If vulnerability detection rule, utilize the vulnerability detection rule that is locally stored to carry out Hole Detection.If first version information is lower than the
Two version informations, it is determined that the corresponding vulnerability detection rule of the second edition information is the preset Hole Detection rule
Then, Hole Detection is carried out using the vulnerability detection rule of cloud storage.
If directly utilizing the vulnerability detection rule of cloud storage but without storage vulnerability detection rule in local storage
Carry out Hole Detection;If cloud does not store vulnerability detection rule, directly advised using the Hole Detection of local memory storage
Then carry out Hole Detection.
Here, due to the equipment in local area network may include it is a variety of, then can be according to the first priority of equipment to setting
Standby progress Hole Detection, such as: if the preferential level of the highest priority of mobile phone, computer is high, the priority of camera is minimum,
So detection unit 22 needs successively to examine according to the sequence of mobile phone, computer, camera when carrying out Hole Detection to equipment
It surveys.
As a kind of optional embodiment, since the facility information that certain equipment includes may also be including a variety of, then examining
Unit 22 is surveyed when carrying out Hole Detection to facility information, loophole inspection can also be carried out according to the second priority of facility information
It surveys.Such as: the facility information of certain equipment includes: device manufacturer, port information and firmware information, if the priority of port information is most
High, firmware information time is high, the priority of device manufacturer is minimum, then need according to port information, firmware information, device manufacturer this
The sequence of sample successively carries out Hole Detection.
Also, different types of equipment needs the vulnerability information detected to be also different, and detection unit 22 is specifically used for:
The device type of equipment is determined according to the essential information of equipment;
Obtain the corresponding vulnerability detection rule of device type;
Hole Detection is carried out using essential information of the corresponding vulnerability detection rule of device type to equipment.
For example, smart machine is mobile phone or IPAD, corresponding service is provided by some open port, then corresponding
Vulnerability detection rule can be with are as follows: the open port information of direct detection device.Such as 21 ports, it can check FTP weak passwurd;
23 ports can check telnet weak passwurd.
As a kind of optional embodiment, when needing to carry out Hole Detection to the software installed in equipment, based on default
Vulnerability detection rule Hole Detection is carried out to the essential information of the equipment, comprising:
Obtain the title of the software to be detected of the equipment;
Title based on the software to be detected sends the software of the software to be detected to the port that the equipment opens
The acquisition request of version number, to obtain the current software version number of software to be detected;
Title based on the software to be detected obtains the recent software version number of software to be detected from network server;
Judge whether the current software version number of software to be detected is less than the recent software version number of the software to be detected,
If being less than, inspection software is treated based on the corresponding software version information of recent software version number and carries out Hole Detection, determines leakage
The version number of hole information.
It, can be with when treating inspection software based on the corresponding software version information of recent software version number and carrying out Hole Detection
Include: obtain corresponding first software version information of recent software version number and software under testing version number it is corresponding second soft
Part version information compares the first software version information and the second software version information, determines the version number of vulnerability information.
Alternatively, when smart machine is camera, then corresponding vulnerability detection rule can be with are as follows: detect the back door of the equipment
Permission etc..
, here, referring to fig. 2, device further include: storage unit 25, after carrying out Hole Detection to the essential information of equipment, inspection
Survey unit 22 is available to arrive Hole Detection result information, and storage unit 25 is specifically used for:
The Hole Detection result information of all devices in current local area network is classified, determines every Hole Detection result
The loophole type of information;
Corresponding loophole, which is distributed, for every Hole Detection result information identifies ID;
Obtain loophole title, the Vulnerability Description abstract, the suggestion to patching bugs of every Hole Detection result information;
By the corresponding loophole title of every Hole Detection result information, Vulnerability Description abstract, to the suggestions of patching bugs and
Corresponding loophole ID is stored into the mapping table in preset vulnerability information library.Here, if there are corresponding loopholes for vulnerability information
Version number then directly sets loophole ID for loophole version number;If it does not exist, then can be corresponding for the distribution of this vulnerability information
Loophole ID.Mapping table can be as shown in table 1.
Table 1
By the loophole title of Hole Detection result information, Vulnerability Description abstract, suggestion and corresponding leakage to patching bugs
Hole ID is stored to preset vulnerability information library, can find Hole Detection based on loophole title, loophole type and loophole ID
Result information.
For example, loophole type is 1 if the loophole of Hole Detection result information entitled FTP weak passwurd, loophole ID is 100
When, Hole Detection result information can be searched by following code:
After getting Hole Detection result information, display unit 23 is used to Hole Detection result information showing user,
Display unit 23 is specifically used for: generating list display interface or icon display interface according to the Hole Detection result information;
Show list display interface or icon display interface.
Here, list display interface includes two layers, and first layer display interface includes the device name of all devices, equipment drawing
Mark and simple prompt information (not finding that safety problem or this equipment have security risk than such equipment);It is leaky existing
Equipment is preferably displaying in list display interface.When the user clicks when corresponding appliance icon, second layer display interface is shown, the
Two layers of display interface include Hole Detection result information and facility information, illustrate Vulnerability Description in detail in second layer display interface
Abstract and the suggestion to patching bugs.
And the corresponding appliance icon of each equipment, device type and device name are shown on icon display interface, it is described
Appliance icon is associated with corresponding Hole Detection result information.Divide in icon display interface two layers and arranged around middle button,
Innermost layer at most shows that 6 icons, outer layer at most show 4 icons, and bilateral symmetry is distributed.Again more appliance icons just with " more
More equipment " icon representation, appliance icon at this time are not responding to any click action.
It should be noted that if the type of equipment is it is found that directly display device type;If the type of equipment is unknown, show
Show " equipment " two word.User can also be with self-defining device title.
When Hole Detection result information is risky, display unit 23 shows risk identification in corresponding appliance icon,
When cursor hovers in the appliance icon, pop-up shows the prompting frame for having the Hole Detection result information of equipment;Alternatively, working as
When the cursor streaks the appliance icon, pop-up shows the prompting frame for having the Hole Detection result information of equipment.The prompting frame
In illustrate in detail Vulnerability Description abstract and the suggestion to patching bugs.
As a kind of optional embodiment, if when Hole Detection function and physical examination function conflict or offline condition, appearance
When unknown error, missing documents or too low version, display unit 23 pops up the pop-up of abnormal conditions, to prompt user's Hole Detection
It cannot continue.
As a kind of optional embodiment, when recognizing in current local area network has new equipment access, pop-up has new equipment
The prompt information of access, and the Hole Detection entrance of the equipment is provided, Hole Detection can be carried out to the equipment.And when user is true
When the fixed equipment is not belonging to the equipment of home network, then the equipment can be kicked out of to the equipment.
The technical solution provided in embodiment is originally provided, is had at least the following technical effects or advantages:
The embodiment of the present application provides the method, apparatus and computer equipment of a kind of detection device vulnerability information, the method
It include: the essential information for obtaining all devices in current local area network;Based on preset vulnerability detection rule to the base of the equipment
This information carries out Hole Detection, obtains and shows Hole Detection result information;In this way, can be set to all in current local area network
Standby vulnerability information is detected, and the Hole Detection result information of each equipment is showed user, can be carried out to user
Safe early warning realizes the purpose of security protection.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein.
Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system
Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various
Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments in this include institute in other embodiments
Including certain features rather than other feature, but the combination of the feature of different embodiment means in the scope of the present invention
Within and form different embodiments.For example, in the following claims, embodiment claimed it is any it
One can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
Microprocessor or digital signal processor (DSP) realize device according to an embodiment of the present invention and computer equipment, system
In some or all components some or all functions.The present invention is also implemented as described herein for executing
Some or all device or device programs (for example, computer program and computer program product) of method.In this way
Realization program of the invention can store on a computer-readable medium, or can have the shape of one or more signal
Formula.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other shape
Formula provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
The invention discloses A1, a kind of method of detection device vulnerability information, which comprises
Obtain the essential information of all devices in current local area network;
Hole Detection is carried out based on essential information of the preset vulnerability detection rule to the equipment, obtains and shows loophole
Testing result information.
A2, method as described in a1, the essential information for obtaining all devices in current local area network, comprising:
The all devices in the current local area network are identified using network protocol, obtain the equipment mark of all devices
Know ID;
Device id based on each equipment obtains the essential information of relevant device.
The described in any item methods of A3, such as A1-A2, the essential information of the equipment include: device type, device name,
One of device manufacturer, open port information, firmware information, network address information, the software version number installed in equipment or
It is a variety of.
A4, method as described in a1, it is described that loophole inspection is carried out to relevant device based on the corresponding vulnerability detection rule
It surveys, before obtaining and showing Hole Detection result information, comprising:
Judged according to the essential information of the equipment with the presence or absence of vulnerability detection rule in local storage, if the local
Exist in memory, then continues to judge with the presence or absence of vulnerability detection rule in cloud server, if depositing in the cloud server
It is then obtaining loophole in the first version information and the cloud server of vulnerability detection rule in the local storage and is examining
The second edition information of gauge then;
Judge whether the first version information is higher than the second edition information, if so, determining the first version
The corresponding vulnerability detection rule of information is the preset vulnerability detection rule.
A5, method as described in a1, it is described to be carried out based on essential information of the preset vulnerability detection rule to the equipment
Hole Detection, comprising:
The device type of the equipment is determined according to the essential information of the equipment;
Obtain the corresponding vulnerability detection rule of the device type;
Hole Detection is carried out using essential information of the corresponding vulnerability detection rule of the device type to the equipment.
A6, method as described in a1, it is described to be carried out based on essential information of the preset vulnerability detection rule to the equipment
Hole Detection, comprising:
Obtain the title of the software to be detected of the equipment;
Title based on the software to be detected is obtained to the software version number that the equipment sends the software to be detected
Request is taken, to obtain the current software version number of the software to be detected;
Title based on the software to be detected obtains the recent software version of the software to be detected from network server
This number;
Judge whether the current software version number of the software to be detected is less than the recent software version of the software to be detected
This number, if being less than, the software to be detected is leaked based on the corresponding software version information of the recent software version number
Hole detection, determines the version number of vulnerability information.
A7, method as described in a1, after the acquisition Hole Detection result information, comprising:
The Hole Detection result information of all devices in current local area network is classified, determines every Hole Detection result
The loophole type of information;
Corresponding loophole ID is distributed for every Hole Detection result information;
Obtain the corresponding loophole title of every Hole Detection result information, Vulnerability Description abstract, to patching bugs
It is recommended that;
The corresponding loophole type of every Hole Detection result information, loophole title, Vulnerability Description are made a summary, to reparation
The suggestion of loophole and loophole ID are stored into preset vulnerability information library.
A8, method as described in a1, the displaying Hole Detection result information, comprising:
List display interface or icon display interface are generated according to the Hole Detection result information;
Show the list display interface or icon display interface.
A9, the method as described in A8 show the corresponding appliance icon of each equipment, equipment on the icon display interface
Type and device name, the appliance icon are associated with corresponding Hole Detection result information.
A10, the method as described in A9, further includes:
When cursor hovers in the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment
Show frame;Alternatively,
When the cursor streaks the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment
Show frame.
B11, a kind of device of detection device vulnerability information, described device include:
Acquiring unit, for obtaining the essential information of all devices in current local area network;
Detection unit, for carrying out Hole Detection based on essential information of the preset vulnerability detection rule to the equipment;
Display unit, for obtaining and showing Hole Detection result information.
B12, device as described in b11, the acquiring unit are specifically used for:
The all devices in the current local area network are identified using network protocol, obtain the equipment mark of all devices
Know ID;
Device id based on each equipment obtains the essential information of relevant device.
The described in any item devices of B13, such as B11-B12, the essential information of the equipment include: device type, implementor name
One of title, device manufacturer, port information, firmware information, network address information, the software version number installed in equipment are more
Kind.
B14, the device as described in B1, described device further include: judging unit is used for:
Hole Detection is being carried out based on essential information of the preset vulnerability detection rule to the equipment, is obtaining and shows leakage
Before the testing result information of hole, judge to advise in local storage with the presence or absence of Hole Detection according to the essential information of the equipment
Then, if existing in the local storage, continue to judge with the presence or absence of vulnerability detection rule in cloud server, if the cloud
Exist in the server of end, then obtains the first version information and cloud clothes of vulnerability detection rule in the local storage
The second edition information of vulnerability detection rule in business device;
Judge whether the first version information is higher than the second edition information, if so, determining the first version
The corresponding vulnerability detection rule of information is the preset vulnerability detection rule.
B15, device as described in b11, the detection unit are specifically used for:
The device type of the equipment is determined according to the essential information of the equipment;
Obtain the corresponding vulnerability detection rule of the device type;
Hole Detection is carried out using essential information of the corresponding vulnerability detection rule of the device type to the equipment.
B16, device as described in b11, the detection unit are specifically used for:
Obtain the title of the software to be detected of the equipment;
Title based on the software to be detected is obtained to the software version number that the equipment sends the software to be detected
Request is taken, to obtain the current software version number of the software to be detected;
Title based on the software to be detected obtains the recent software version of the software to be detected from network server
This number;
Judge whether the current software version number of the software to be detected is less than the recent software version of the software to be detected
This number, if being less than, the software to be detected is leaked based on the corresponding software version information of the recent software version number
Hole detection, determines the version number of vulnerability information.
B17, device as described in b11, described device further include: storage unit is used for:
The Hole Detection result information of all devices in current local area network is classified, determines every Hole Detection result
The loophole type of information;
Corresponding loophole ID is distributed for every Hole Detection result information;
Obtain the corresponding loophole title of every Hole Detection result information, Vulnerability Description abstract, to patching bugs
It is recommended that;
The corresponding loophole type of every Hole Detection result information, loophole title, Vulnerability Description are made a summary, to reparation
The suggestion of loophole and loophole ID are stored into preset vulnerability information library.
B18, device as described in b11, the display unit are specifically used for:
List display interface or icon display interface are generated according to the Hole Detection result information;
Show the list display interface or icon display interface.
B19, the device as described in B18 show the corresponding appliance icon of each equipment on the icon display interface, set
Standby type and device name, the appliance icon are associated with corresponding Hole Detection result information.
B20, the device as described in B19, the display unit are used for:
When cursor hovers in the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment
Show frame;Alternatively,
When the cursor streaks the appliance icon, pop-up shows mentioning for the Hole Detection result information for having the equipment
Show frame.
C21, a kind of computer readable storage medium, are stored thereon with computer program, when which is executed by processor
The step of realizing any one of A1 to A10 the method.
It is D22, a kind of for accessing the computer equipment of website, comprising:
At least one processor;And
At least one processor being connect with the processor communication, wherein the memory is stored with can be by the place
The program instruction that device executes is managed, the processor calls described program instruction to be able to carry out such as any one of A1 to A10 the method
The step of.
Claims (10)
1. a kind of method of detection device vulnerability information, which is characterized in that the described method includes:
Obtain the essential information of all devices in current local area network;
Hole Detection is carried out based on essential information of the preset vulnerability detection rule to the equipment, obtains and shows Hole Detection
Result information.
2. the method as described in claim 1, which is characterized in that the basic letter for obtaining all devices in current local area network
Breath, comprising:
The all devices in the current local area network are identified using network protocol, obtain the device identification of all devices
ID;
Device id based on each equipment obtains the essential information of relevant device.
3. the method according to claim 1, which is characterized in that the essential information of the equipment includes: equipment class
Type, device name, device manufacturer, open port information, firmware information, network address information, the software version installed in equipment
Number one of or it is a variety of.
4. the method as described in claim 1, which is characterized in that it is described based on preset vulnerability detection rule to the equipment
Essential information carries out Hole Detection, before obtaining and showing Hole Detection result information, comprising:
Judged according to the essential information of the equipment with the presence or absence of vulnerability detection rule in local storage, if described be locally stored
Exist in device, then continues to judge with the presence or absence of vulnerability detection rule in cloud server, if existing in the cloud server,
Hole Detection in the first version information and the cloud server of vulnerability detection rule in the local storage is obtained to advise
Second edition information then;
Judge whether the first version information is higher than the second edition information, if so, determining the first version information
The corresponding vulnerability detection rule is the preset vulnerability detection rule.
5. a kind of device of detection device vulnerability information, which is characterized in that described device includes:
Acquiring unit, for obtaining the essential information of all devices in current local area network;
Detection unit, for carrying out Hole Detection based on essential information of the preset vulnerability detection rule to the equipment;
Display unit, for obtaining and showing Hole Detection result information.
6. device as claimed in claim 5, which is characterized in that the acquiring unit is specifically used for:
The all devices in the current local area network are identified using network protocol, obtain the device identification of all devices
ID;
Device id based on each equipment obtains the essential information of relevant device.
7. such as the described in any item devices of claim 5-6, which is characterized in that the essential information of the equipment includes: equipment class
Type, device name, device manufacturer, open port information, firmware information, network address information, the software version installed in equipment
Number one of or it is a variety of.
8. device as claimed in claim 5, which is characterized in that described device further include: judging unit is used for:
Hole Detection is being carried out based on essential information of the preset vulnerability detection rule to the equipment, is obtaining and shows that loophole is examined
It surveys before result information, is judged according to the essential information of the equipment with the presence or absence of vulnerability detection rule in local storage, if
Exist in the local storage, then continues to judge with the presence or absence of vulnerability detection rule in cloud server, if the cloud takes
Business device in exist, then obtain vulnerability detection rule in the local storage first version information and the cloud server
The second edition information of middle vulnerability detection rule;
Judge whether the first version information is higher than the second edition information, if so, determining the first version information
The corresponding vulnerability detection rule is the preset vulnerability detection rule.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor
The step of any one of Claims 1-4 the method is realized when row.
10. a kind of for accessing the computer equipment of website characterized by comprising
At least one processor;And
At least one processor being connect with the processor communication, wherein the memory is stored with can be by the processor
The program instruction of execution, the processor call described program instruction to be able to carry out such as any one of Claims 1-4 the method
The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810862315.5A CN109194615A (en) | 2018-08-01 | 2018-08-01 | A kind of method, apparatus and computer equipment of detection device vulnerability information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810862315.5A CN109194615A (en) | 2018-08-01 | 2018-08-01 | A kind of method, apparatus and computer equipment of detection device vulnerability information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109194615A true CN109194615A (en) | 2019-01-11 |
Family
ID=64937711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810862315.5A Pending CN109194615A (en) | 2018-08-01 | 2018-08-01 | A kind of method, apparatus and computer equipment of detection device vulnerability information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109194615A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109992971A (en) * | 2019-04-03 | 2019-07-09 | 中电科技(北京)有限公司 | Computer batch firmware safety detection method and system in local area network |
CN110321708A (en) * | 2019-03-21 | 2019-10-11 | 北京天防安全科技有限公司 | A kind of quick vulnerability scanning method and system based on class of assets |
CN110572399A (en) * | 2019-09-10 | 2019-12-13 | 百度在线网络技术(北京)有限公司 | vulnerability detection processing method, device, equipment and storage medium |
CN110740125A (en) * | 2019-09-23 | 2020-01-31 | 公安部第一研究所 | method for implementing vulnerability library used for vulnerability detection of video monitoring equipment |
CN112087482A (en) * | 2020-07-23 | 2020-12-15 | 上海琥崧智能科技股份有限公司 | Method for managing multiple devices by using cloud system |
CN112152972A (en) * | 2019-06-28 | 2020-12-29 | 北京奇虎科技有限公司 | Method and device for detecting IOT equipment vulnerability and router |
CN115277198A (en) * | 2022-07-27 | 2022-11-01 | 西安热工研究院有限公司 | Vulnerability detection method and device for industrial control system network and storage medium |
CN115795484A (en) * | 2023-02-06 | 2023-03-14 | 北京长亭未来科技有限公司 | Vulnerability detection method and device for Internet of things equipment and equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105142150A (en) * | 2015-08-28 | 2015-12-09 | 广东电网有限责任公司信息中心 | Wireless device loophole scanning method and system based on BS mode |
US20160072671A1 (en) * | 2013-04-19 | 2016-03-10 | Zte Corporation | Network device detecting method and apparatus, and clound detection system |
JP2017068691A (en) * | 2015-09-30 | 2017-04-06 | 富士通株式会社 | Diagnostic program, diagnostic method and diagnostic apparatus |
CN106789902A (en) * | 2016-11-11 | 2017-05-31 | 北京匡恩网络科技有限责任公司 | A kind of industry control safety features detection method and device |
CN107194262A (en) * | 2017-05-19 | 2017-09-22 | 北京匡恩网络科技有限责任公司 | Method and device for scanning leak and generation vulnerability information storehouse |
CN107239705A (en) * | 2017-05-25 | 2017-10-10 | 中国东方电气集团有限公司 | A kind of contactless industrial control system or the static leakage location of equipment and detection method |
CN107563205A (en) * | 2017-09-20 | 2018-01-09 | 杭州安恒信息技术有限公司 | Typical smart machine leak detection method and permeability apparatus |
CN108200106A (en) * | 2018-04-02 | 2018-06-22 | 浙江九州量子信息技术股份有限公司 | A kind of Internet of Things safety detection means of defence |
-
2018
- 2018-08-01 CN CN201810862315.5A patent/CN109194615A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160072671A1 (en) * | 2013-04-19 | 2016-03-10 | Zte Corporation | Network device detecting method and apparatus, and clound detection system |
CN105142150A (en) * | 2015-08-28 | 2015-12-09 | 广东电网有限责任公司信息中心 | Wireless device loophole scanning method and system based on BS mode |
JP2017068691A (en) * | 2015-09-30 | 2017-04-06 | 富士通株式会社 | Diagnostic program, diagnostic method and diagnostic apparatus |
CN106789902A (en) * | 2016-11-11 | 2017-05-31 | 北京匡恩网络科技有限责任公司 | A kind of industry control safety features detection method and device |
CN107194262A (en) * | 2017-05-19 | 2017-09-22 | 北京匡恩网络科技有限责任公司 | Method and device for scanning leak and generation vulnerability information storehouse |
CN107239705A (en) * | 2017-05-25 | 2017-10-10 | 中国东方电气集团有限公司 | A kind of contactless industrial control system or the static leakage location of equipment and detection method |
CN107563205A (en) * | 2017-09-20 | 2018-01-09 | 杭州安恒信息技术有限公司 | Typical smart machine leak detection method and permeability apparatus |
CN108200106A (en) * | 2018-04-02 | 2018-06-22 | 浙江九州量子信息技术股份有限公司 | A kind of Internet of Things safety detection means of defence |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110321708A (en) * | 2019-03-21 | 2019-10-11 | 北京天防安全科技有限公司 | A kind of quick vulnerability scanning method and system based on class of assets |
CN110321708B (en) * | 2019-03-21 | 2021-04-23 | 北京天防安全科技有限公司 | Rapid vulnerability scanning method and system based on asset classes |
CN109992971A (en) * | 2019-04-03 | 2019-07-09 | 中电科技(北京)有限公司 | Computer batch firmware safety detection method and system in local area network |
CN109992971B (en) * | 2019-04-03 | 2023-05-02 | 昆仑太科(北京)技术股份有限公司 | Method and system for detecting batch firmware security of computer in local area network |
CN112152972A (en) * | 2019-06-28 | 2020-12-29 | 北京奇虎科技有限公司 | Method and device for detecting IOT equipment vulnerability and router |
CN110572399A (en) * | 2019-09-10 | 2019-12-13 | 百度在线网络技术(北京)有限公司 | vulnerability detection processing method, device, equipment and storage medium |
CN110740125A (en) * | 2019-09-23 | 2020-01-31 | 公安部第一研究所 | method for implementing vulnerability library used for vulnerability detection of video monitoring equipment |
CN112087482A (en) * | 2020-07-23 | 2020-12-15 | 上海琥崧智能科技股份有限公司 | Method for managing multiple devices by using cloud system |
CN112087482B (en) * | 2020-07-23 | 2021-06-29 | 上海琥崧智能科技股份有限公司 | Method for managing multiple devices by using cloud system |
CN115277198A (en) * | 2022-07-27 | 2022-11-01 | 西安热工研究院有限公司 | Vulnerability detection method and device for industrial control system network and storage medium |
CN115795484A (en) * | 2023-02-06 | 2023-03-14 | 北京长亭未来科技有限公司 | Vulnerability detection method and device for Internet of things equipment and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109194615A (en) | A kind of method, apparatus and computer equipment of detection device vulnerability information | |
CN103632096B (en) | A kind of method and apparatus that safety detection is carried out to equipment | |
CN109753806A (en) | Server protection method and device | |
ES2755780T3 (en) | Automated behavior and static analysis using an instrumented sandbox and machine learning classification for mobile security | |
CN104392175B (en) | Cloud application attack processing method, apparatus and system in a kind of cloud computing system | |
CN105429826A (en) | Fault detection method and device for database cluster | |
CN104268476B (en) | A kind of method for running application program | |
CN109074454A (en) | Malware is grouped automatically based on artefact | |
TWI677804B (en) | Computer device and method of identifying whether container behavior thereof is abnormal | |
CN105528251B (en) | Processing method, device and the mobile terminal of applicative notifications information | |
CN104573497B (en) | A kind for the treatment of method and apparatus of startup item | |
US20170374082A1 (en) | Dynamic packet inspection plan system | |
CN103975331B (en) | It is incorporated with the safe data center's infrastructure management system for being managed infrastructure equipment | |
CN103581185A (en) | Cloud searching and killing method, device and system for resisting anti-antivirus test | |
CN111343188A (en) | Vulnerability searching method, device, equipment and storage medium | |
CN106874086B (en) | A kind of processing method, device and the mobile terminal of application program self-starting | |
US20170193218A1 (en) | Reducing Unregulated Aggregation Of App Usage Behaviors | |
CN106027540A (en) | Page interception method and system and secure desktop | |
CN104579819B (en) | network security detection method and device | |
CN106209918A (en) | The method of a kind of internet security management and terminal | |
CN106454847A (en) | Method and device for detecting phishing risk of public WiFi | |
Zhou et al. | Demystifying diehard android apps | |
CN108898012A (en) | The method and apparatus for detecting illegal program | |
Ibrahim et al. | Aot-attack on things: A security analysis of iot firmware updates | |
CN105631332B (en) | A kind of method and device of processing rogue program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190111 |
|
RJ01 | Rejection of invention patent application after publication |