CN110519289A - Weak passwurd detection method and device based on industrial control system - Google Patents
Weak passwurd detection method and device based on industrial control system Download PDFInfo
- Publication number
- CN110519289A CN110519289A CN201910825035.1A CN201910825035A CN110519289A CN 110519289 A CN110519289 A CN 110519289A CN 201910825035 A CN201910825035 A CN 201910825035A CN 110519289 A CN110519289 A CN 110519289A
- Authority
- CN
- China
- Prior art keywords
- weak passwurd
- port
- library
- control system
- industrial control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention provides weak passwurd detection methods and device based on industrial control system, applied to industrial control system, it include: to obtain priority query, priority query includes the corresponding weak passwurd scan script in the port multiple Internet protocol IP and each port IP and weak passwurd library corresponding with each weak passwurd scan script;It scans from message queue to the port IP;The corresponding weak passwurd scan script in the port IP is searched from priority query according to the port IP;The corresponding weak passwurd library of weak passwurd scan script is searched according to weak passwurd scan script;Judge in weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP is in a safe condition;If it is present obtaining the log-on message in the weak passwurd library of modification, it can detect whether industrial control system is attacked by being suitable for the scan method of the weak passwurd of industrial control system, can be scanned simultaneously for various protocols, improve the safety of industrial control system.
Description
Technical field
The present invention relates to industry internet security technology areas, more particularly, to the weak passwurd detection side based on industrial control system
Method and device.
Background technique
In order to improve the production efficiency, more and more industrial control systems are applied among production, once industrial control system is attacked
It hits, it will generate heavy losses.It can detect whether industrial control system is attacked by weak passwurd scanning, still, current is weak
Password scanning is scanned for web page, is not particularly suited for industrial control system.In addition, weak passwurd scanning can only be for single
One agreement is scanned, and cannot be scanned simultaneously to various protocols simultaneously, for example, can carry out to single http agreement weak
Password scanning cannot simultaneously be scanned the agreements such as mysql and ftp simultaneously.
Therefore, the scan method of above-mentioned weak passwurd is not particularly suited for industrial control system, can not detect industrial control system whether by
Attack.
Summary of the invention
It, can be in view of this, the purpose of the present invention is to provide weak passwurd detection method and device based on industrial control system
Scan method by being suitable for the weak passwurd of industrial control system detects whether industrial control system is attacked, and can be directed to various protocols
It is scanned simultaneously, improves the safety of industrial control system.
In a first aspect, being applied to industry control system the embodiment of the invention provides the weak passwurd detection method based on industrial control system
System, which comprises
Priority query is obtained, the priority query includes the port multiple Internet protocol IP and each port IP
Corresponding weak passwurd scan script and weak passwurd library corresponding with each weak passwurd scan script;
It scans from message queue to the port IP;
The corresponding weak passwurd scan script in the port IP is searched from the priority query according to the port IP;
The corresponding weak passwurd library of the weak passwurd scan script is searched according to the weak passwurd scan script;
Judge in the weak passwurd library with the presence or absence of weak passwurd;
If it does not exist, then the port IP is in a safe condition;
If it is present obtaining the log-on message in the weak passwurd library of modification.
Further, the message queue obtains in the following manner:
Each port IP is scanned, the port IP being connected to;
The open port IP is obtained from the port IP of the connection;
The message queue is constituted according to the port IP of the opening.
Further, after the log-on message in the weak passwurd library for obtaining modification, the method also includes:
Obtain the matching times of the log-on message in the weak passwurd library;
According to the corresponding weak passwurd scan script in the weak passwurd library and the matching times, the weak passwurd is updated
The corresponding weight of scan script.
It is further, described to be scanned from message queue to the port IP, comprising:
The port IP that port scanner scans is extracted from the message queue by thread.
Second aspect, the embodiment of the invention provides the weak passwurd detection devices based on industrial control system, are applied to industry control system
System, described device include:
Acquiring unit, for obtaining priority query, the priority query include the port multiple Internet protocol IP, with it is every
The corresponding weak passwurd scan script in a port IP and weak passwurd library corresponding with each weak passwurd scan script;
Scanning element, for scanning from message queue to the port IP;
First searching unit, it is corresponding for searching the port IP from the priority query according to the port IP
Weak passwurd scan script;
Second searching unit, it is corresponding weak for searching the weak passwurd scan script according to the weak passwurd scan script
Password library;
Judging unit, for judging in the weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP
It is in a safe condition;If it is present obtaining the log-on message in the weak passwurd library of modification.
Further, the message queue obtains in the following manner:
Each port IP is scanned, the port IP being connected to;
The open port IP is obtained from the port IP of the connection;
The message queue is constituted according to the port IP of the opening.
Further, described device further include:
Matching times acquiring unit, for obtaining the matching times of the log-on message in the weak passwurd library;
Updating unit is used for according to the corresponding weak passwurd scan script in the weak passwurd library and the matching times,
Update the corresponding weight of the weak passwurd scan script.
Further, the scanning element is specifically used for:
The port IP that port scanner scans is extracted from the message queue by thread.
The third aspect is deposited on the memory the embodiment of the invention provides electronic equipment, including memory, processor
The computer program that can be run on the processor is contained, the processor realizes institute as above when executing the computer program
The step of method stated.
Fourth aspect, the embodiment of the invention provides the computers for the non-volatile program code that can be performed with processor
Readable medium, said program code make the processor execute method as described above.
The embodiment of the invention provides weak passwurd detection methods and device based on industrial control system, are applied to industrial control system,
It include: to obtain priority query, priority query includes the port multiple Internet protocol IP, weak passwurd corresponding with each port IP
Scan script and weak passwurd library corresponding with each weak passwurd scan script;It scans from message queue to the port IP;According to IP
The corresponding weak passwurd scan script in the port IP is searched from priority query in port;Weak passwurd is searched according to weak passwurd scan script
The corresponding weak passwurd library of scan script;Judge in weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP is in peace
Total state;If it is present obtaining the log-on message in the weak passwurd library of modification, the weak mouth suitable for industrial control system can be passed through
Whether the scan method detection industrial control system of order is attacked, and can be scanned simultaneously for various protocols, improve industry control system
The safety of system.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification
It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention are in specification, claims
And specifically noted structure is achieved and obtained in attached drawing.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art
Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below
Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor
It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the weak passwurd detection method flow chart based on industrial control system that the embodiment of the present invention one provides;
Fig. 2 is the weak passwurd detection device schematic diagram provided by Embodiment 2 of the present invention based on industrial control system.
Icon:
1- acquiring unit;2- scanning element;The first searching unit of 3-;The second searching unit of 4-;5- judging unit.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention
Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than
Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise
Under every other embodiment obtained, shall fall within the protection scope of the present invention.
To be described in detail to the embodiment of the present invention below convenient for understanding the present embodiment.
Embodiment one:
Fig. 1 is the weak passwurd detection method flow chart based on industrial control system that the embodiment of the present invention one provides.
Referring to Fig.1, it is applied to industrial control system, method includes the following steps:
Step S1, obtains priority query, and priority query includes the port multiple Internet protocol IP and each port pair IP
The weak passwurd scan script answered and weak passwurd library corresponding with each weak passwurd scan script;
Specifically, the weak passwurd scan script different according to different IP port definitions, the port IP and weak passwurd scan foot
It is the relationship of key and value between this, wherein key is keyword, and value is weight, then, the port IP is keyword,
Weak passwurd scan script is weight.Each port IP corresponds to weak passwurd scan script, and each weak passwurd scan script is corresponding
Weak passwurd library is stored in priority query.It, can be according to weight when being scanned to the weak mouth library in priority query
Size order is scanned.
Step S2 is scanned from message queue to the port IP;
Here, include the different ports IP in message queue, the different ports IP can be scanned simultaneously, work as scanning
When to one of port IP, weak passwurd is determined whether there is according to the corresponding relationship in priority query.
Step S3 searches the corresponding weak passwurd scan script in the port IP according to the port IP from priority query;
Step S4 searches the corresponding weak passwurd library of weak passwurd scan script according to weak passwurd scan script;
Step S5 judges in weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then executing step S6;If it does,
Then follow the steps S7;
The port step S6, IP is in a safe condition;
Step S7 obtains the log-on message in the weak passwurd library of modification.
Here, weak passwurd is usually the password being easy by others guesses or the tool of being cracked cracks, such as " 123 ", " abc "
Etc. simple digitals or letter combination.
Specifically, after scanning starts, thread constantly extracts the end IP that port scanner scans from message queue
Mouthful, the corresponding weak passwurd scan script in the port IP is searched from priority query according to corresponding relationship, foot is scanned according to weak passwurd
The corresponding weak passwurd library of this lookup, traverses the combined information that all username and passwords are constituted from weak passwurd library, and judgement is
No there are weak passwurds, if there is no weak passwurd, then illustrate that the port IP is in a safe condition, are not cracked;If there is
Weak passwurd, then corresponding username and password can log in industrial control system, can show the prompt of modification username and password at this time
Information, to modify to username and password.Meanwhile weight of the username and password in priority query is increased,
By constantly scanning, it will priority scan is to common weak passwurd, so as to improve scanning speed.Wherein, port scanner packet
It includes but is not limited to masscan.
Further, message queue obtains in the following manner:
Each port IP is scanned, the port IP being connected to;
The open port IP is obtained from the port IP of connection;
Message queue is constituted according to the open port IP.
Specifically, it when scanning beginning, first has to judge whether the port IP can be connected to, i.e., whether the port IP survives, such as
The survival of the port fruit IP, then illustrate that the port IP can connect communication, that is, is in connected state;Then judge connection the port IP in which
A little ports are to obtain the open port IP in open state, the open port IP is stored in message queue.It is offseting
When the port IP in breath queue is scanned, it is scanned according to the principle of first in first out.
Further, after step S7, this method is further comprising the steps of:
Step S11 obtains the matching times of the log-on message in weak passwurd library;
Step S12 updates weak passwurd scan script according to the corresponding weak passwurd scan script in weak passwurd library and matching times
Corresponding weight.
Specifically, when determining in weak passwurd library there are when weak passwurd, the log-on message in weak passwurd library is modified, wherein step on
Record the combination that information is username and password.When initial, the weight of the corresponding weak passwurd scan script in weak passwurd library is 0, weak mouth
The matching times for enabling log-on message in library are also 0.When being searched whether from weak passwurd library there are when weak passwurd, weak passwurd at this time
As log-on message.If being repeatedly matched to the log-on message, according to the corresponding weak passwurd scan script in weak passwurd library and
With number, the corresponding weight of weak passwurd scan script is updated.For example, when initial, weight 0, when log-on message is matched to once
When, weight becomes 0+1;When log-on message is matched to twice, weight 1+2.
Further, step S2 includes:
The port IP that port scanner scans is extracted from message queue by thread.
The embodiment of the invention provides the weak passwurd detection methods based on industrial control system, are applied to industrial control system, comprising: obtain
Priority query is taken, priority query includes the port multiple Internet protocol IP, weak passwurd corresponding with each port IP scanning foot
Sheet and weak passwurd library corresponding with each weak passwurd scan script;It scans from message queue to the port IP;According to the port IP from
The corresponding weak passwurd scan script in the port IP is searched in priority query;Weak passwurd, which is searched, according to weak passwurd scan script scans foot
This corresponding weak passwurd library;Judge in weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP is in safe shape
State;If it is present obtaining the log-on message in the weak passwurd library of modification, the weak passwurd suitable for industrial control system can be passed through
Whether scan method detection industrial control system is attacked, and can be scanned simultaneously for various protocols, improve industrial control system
Safety.
Embodiment two:
Fig. 2 is the weak passwurd detection device schematic diagram provided by Embodiment 2 of the present invention based on industrial control system.
Referring to Fig. 2, it is applied to industrial control system, which includes:
Acquiring unit 1, for obtaining priority query, priority query include the port multiple Internet protocol IP, with it is each
The corresponding weak passwurd scan script in the port IP and weak passwurd library corresponding with each weak passwurd scan script;
Scanning element 2, for scanning from message queue to the port IP;
First searching unit 3, for searching the corresponding weak passwurd scanning in the port IP from priority query according to the port IP
Script;
Second searching unit 4, for searching the corresponding weak passwurd library of weak passwurd scan script according to weak passwurd scan script;
Judging unit 5, for judging in weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP is in peace
Total state;If it is present obtaining the log-on message in the weak passwurd library of modification.
Further, message queue obtains in the following manner:
Each port IP is scanned, the port IP being connected to;
The open port IP is obtained from the port IP of connection;
Message queue is constituted according to the open port IP.
Further, the device further include:
Matching times acquiring unit (not shown), for obtaining the matching times of the log-on message in weak passwurd library;
Updating unit (not shown), for updating according to the corresponding weak passwurd scan script in weak passwurd library and matching times
The corresponding weight of weak passwurd scan script.
Further, scanning element 2 is specifically used for:
The port IP that port scanner scans is extracted from message queue by thread.
The embodiment of the invention provides the weak passwurd detection devices based on industrial control system, are applied to industrial control system, comprising: obtain
Priority query is taken, priority query includes the port multiple Internet protocol IP, weak passwurd corresponding with each port IP scanning foot
Sheet and weak passwurd library corresponding with each weak passwurd scan script;It scans from message queue to the port IP;According to the port IP from
The corresponding weak passwurd scan script in the port IP is searched in priority query;Weak passwurd, which is searched, according to weak passwurd scan script scans foot
This corresponding weak passwurd library;Judge in weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP is in safe shape
State;If it is present obtaining the log-on message in the weak passwurd library of modification, the weak passwurd suitable for industrial control system can be passed through
Whether scan method detection industrial control system is attacked, and can be scanned simultaneously for various protocols, improve industrial control system
Safety.
The embodiment of the present invention also provides a kind of electronic equipment, including memory, processor and storage are on a memory and can
The computer program run on a processor, processor are realized provided by the above embodiment based on industry control when executing computer program
The step of weak passwurd detection method of system.
The embodiment of the present invention also provide it is a kind of with processor can be performed non-volatile program code it is computer-readable
Medium is stored with computer program on computer-readable medium, above-described embodiment is executed when computer program is run by processor
The weak passwurd detection method based on industrial control system the step of.
Computer program product provided by the embodiment of the present invention, the computer-readable storage including storing program code
Medium, the instruction that said program code includes can be used for executing previous methods method as described in the examples, and specific implementation can be joined
See embodiment of the method, details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description
It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In addition, in the description of the embodiment of the present invention unless specifically defined or limited otherwise, term " installation ", " phase
Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can
To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary
Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition
Concrete meaning in invention.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical",
The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to
Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation,
It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ",
" third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
Finally, it should be noted that embodiment described above, only a specific embodiment of the invention, to illustrate the present invention
Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair
It is bright to be described in detail, those skilled in the art should understand that: anyone skilled in the art
In the technical scope disclosed by the present invention, it can still modify to technical solution documented by previous embodiment or can be light
It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make
The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover in protection of the invention
Within the scope of.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.
Claims (10)
1. a kind of weak passwurd detection method based on industrial control system, which is characterized in that be applied to industrial control system, the method packet
It includes:
Priority query is obtained, the priority query includes the port multiple Internet protocol IP, corresponding with each port IP
Weak passwurd scan script and weak passwurd library corresponding with each weak passwurd scan script;
It scans from message queue to the port IP;
The corresponding weak passwurd scan script in the port IP is searched from the priority query according to the port IP;
The corresponding weak passwurd library of the weak passwurd scan script is searched according to the weak passwurd scan script;
Judge in the weak passwurd library with the presence or absence of weak passwurd;
If it does not exist, then the port IP is in a safe condition;
If it is present obtaining the log-on message in the weak passwurd library of modification.
2. the weak passwurd detection method according to claim 1 based on industrial control system, which is characterized in that the message queue
It obtains in the following manner:
Each port IP is scanned, the port IP being connected to;
The open port IP is obtained from the port IP of the connection;
The message queue is constituted according to the port IP of the opening.
3. the weak passwurd detection method according to claim 1 based on industrial control system, which is characterized in that the acquisition modification
The weak passwurd library in log-on message after, the method also includes:
Obtain the matching times of the log-on message in the weak passwurd library;
According to the corresponding weak passwurd scan script in the weak passwurd library and the matching times, the weak passwurd scanning is updated
The corresponding weight of script.
4. the weak passwurd detection method according to claim 1 based on industrial control system, which is characterized in that described from message team
The port IP is arrived in scanning in column, comprising:
The port IP that port scanner scans is extracted from the message queue by thread.
5. a kind of weak passwurd detection device based on industrial control system, which is characterized in that be applied to industrial control system, described device packet
It includes:
Acquiring unit, for obtaining priority query, the priority query includes the port multiple Internet protocol IP and each institute
State the corresponding weak passwurd scan script in the port IP and weak passwurd library corresponding with each weak passwurd scan script;
Scanning element, for scanning from message queue to the port IP;
First searching unit, for searching the corresponding weak mouth in the port IP from the priority query according to the port IP
Enable scan script;
Second searching unit, for searching the corresponding weak passwurd of the weak passwurd scan script according to the weak passwurd scan script
Library;
Judging unit, for judging in the weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP is in
Safe condition;If it is present obtaining the log-on message in the weak passwurd library of modification.
6. the weak passwurd detection device according to claim 5 based on industrial control system, which is characterized in that the message queue
It obtains in the following manner:
Each port IP is scanned, the port IP being connected to;
The open port IP is obtained from the port IP of the connection;
The message queue is constituted according to the port IP of the opening.
7. the weak passwurd detection device according to claim 5 based on industrial control system, which is characterized in that described device is also wrapped
It includes:
Matching times acquiring unit, for obtaining the matching times of the log-on message in the weak passwurd library;
Updating unit, for updating according to the corresponding weak passwurd scan script in the weak passwurd library and the matching times
The corresponding weight of the weak passwurd scan script.
8. the weak passwurd detection device according to claim 5 based on industrial control system, which is characterized in that the scanning element
It is specifically used for:
The port IP that port scanner scans is extracted from the message queue by thread.
9. a kind of electronic equipment, including memory, processor, be stored on the memory to run on the processor
Computer program, which is characterized in that the processor realizes that the claims 1 to 4 are any when executing the computer program
The step of method described in item.
10. a kind of computer-readable medium for the non-volatile program code that can be performed with processor, which is characterized in that described
Program code makes the processor execute the described in any item methods of Claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910825035.1A CN110519289B (en) | 2019-09-02 | 2019-09-02 | Weak password detection method and device based on industrial control system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910825035.1A CN110519289B (en) | 2019-09-02 | 2019-09-02 | Weak password detection method and device based on industrial control system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110519289A true CN110519289A (en) | 2019-11-29 |
CN110519289B CN110519289B (en) | 2022-03-11 |
Family
ID=68629546
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910825035.1A Active CN110519289B (en) | 2019-09-02 | 2019-09-02 | Weak password detection method and device based on industrial control system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110519289B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150304302A1 (en) * | 2014-04-16 | 2015-10-22 | Alibaba Group Holding Limited | Method and apparatus of detecting weak password |
CN105721472A (en) * | 2016-02-23 | 2016-06-29 | 北京皮尔布莱尼软件有限公司 | Port security check method, device and system |
CN106685954A (en) * | 2016-12-27 | 2017-05-17 | 北京神州绿盟信息安全科技股份有限公司 | Method and device for scanning plug-in and determining rule scheduling sequence in plug-in |
CN106713284A (en) * | 2016-12-02 | 2017-05-24 | 国网浙江省电力公司电力科学研究院 | Industrial control security testing system, and industrial control system |
CN106934274A (en) * | 2015-12-31 | 2017-07-07 | 中国移动通信集团黑龙江有限公司 | A kind of weak passwurd detection method, apparatus and system |
CN106973071A (en) * | 2017-05-24 | 2017-07-21 | 北京匡恩网络科技有限责任公司 | A kind of vulnerability scanning method and apparatus |
CN107707553A (en) * | 2017-10-18 | 2018-02-16 | 北京启明星辰信息安全技术有限公司 | Weak passwurd scan method, device and computer-readable storage medium |
-
2019
- 2019-09-02 CN CN201910825035.1A patent/CN110519289B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150304302A1 (en) * | 2014-04-16 | 2015-10-22 | Alibaba Group Holding Limited | Method and apparatus of detecting weak password |
CN106934274A (en) * | 2015-12-31 | 2017-07-07 | 中国移动通信集团黑龙江有限公司 | A kind of weak passwurd detection method, apparatus and system |
CN105721472A (en) * | 2016-02-23 | 2016-06-29 | 北京皮尔布莱尼软件有限公司 | Port security check method, device and system |
CN106713284A (en) * | 2016-12-02 | 2017-05-24 | 国网浙江省电力公司电力科学研究院 | Industrial control security testing system, and industrial control system |
CN106685954A (en) * | 2016-12-27 | 2017-05-17 | 北京神州绿盟信息安全科技股份有限公司 | Method and device for scanning plug-in and determining rule scheduling sequence in plug-in |
CN106973071A (en) * | 2017-05-24 | 2017-07-21 | 北京匡恩网络科技有限责任公司 | A kind of vulnerability scanning method and apparatus |
CN107707553A (en) * | 2017-10-18 | 2018-02-16 | 北京启明星辰信息安全技术有限公司 | Weak passwurd scan method, device and computer-readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110519289B (en) | 2022-03-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4905395B2 (en) | Communication monitoring device, communication monitoring program, and communication monitoring method | |
JP6173613B2 (en) | Method, device, computer program and information storage means for classifying TCP connections carrying HTTP traffic | |
US9426166B2 (en) | Method and apparatus for processing finite automata | |
CN107347076B (en) | SSRF vulnerability detection method and device | |
US10277610B2 (en) | Reassembly-free deep packet inspection on multi-core hardware | |
CN107040518B (en) | Private cloud server login method and system | |
CN104008381B (en) | A kind of personal identification method and device | |
CN108390864B (en) | Trojan horse detection method and system based on attack chain behavior analysis | |
JPWO2015107861A1 (en) | Information processing apparatus, fraudulent activity determination method and fraudulent activity determination program, information processing apparatus, activity determination method and activity determination program | |
WO2019095856A1 (en) | Network identity authentication method and system, and user agent device used thereby | |
CN105302815B (en) | The filter method and device of the uniform resource position mark URL of webpage | |
JP2003046533A (en) | Network system, authentication method therefor and program thereof | |
CN102571812A (en) | Tracking and identification method and apparatus for network threats | |
WO2017107804A1 (en) | Method and device for ddos attack identification | |
CN104580197A (en) | Code detection method and code detection system | |
CN108156165A (en) | A kind of method and system for reporting detection by mistake | |
CN105227431B (en) | The method and apparatus that good friend or group are fast added in instant messaging | |
CN104679798B (en) | Page detection method and device | |
CN109495325A (en) | Website IPv6 support appraisal procedure, device and equipment | |
CN106446068B (en) | Directory database generation and query method and device | |
JP2012037948A (en) | Method for changing device setting | |
JP2017117354A5 (en) | ||
CN110519289A (en) | Weak passwurd detection method and device based on industrial control system | |
CN109495471A (en) | A kind of pair of WEB attack result determination method, device, equipment and readable storage medium storing program for executing | |
CN109344604A (en) | A kind of method and system judging user password risk based on user's habit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |