CN110519289A - Weak passwurd detection method and device based on industrial control system - Google Patents

Weak passwurd detection method and device based on industrial control system Download PDF

Info

Publication number
CN110519289A
CN110519289A CN201910825035.1A CN201910825035A CN110519289A CN 110519289 A CN110519289 A CN 110519289A CN 201910825035 A CN201910825035 A CN 201910825035A CN 110519289 A CN110519289 A CN 110519289A
Authority
CN
China
Prior art keywords
weak passwurd
port
library
control system
industrial control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910825035.1A
Other languages
Chinese (zh)
Other versions
CN110519289B (en
Inventor
王宗三
范渊
黄进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
Hangzhou Dbappsecurity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dbappsecurity Technology Co Ltd filed Critical Hangzhou Dbappsecurity Technology Co Ltd
Priority to CN201910825035.1A priority Critical patent/CN110519289B/en
Publication of CN110519289A publication Critical patent/CN110519289A/en
Application granted granted Critical
Publication of CN110519289B publication Critical patent/CN110519289B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides weak passwurd detection methods and device based on industrial control system, applied to industrial control system, it include: to obtain priority query, priority query includes the corresponding weak passwurd scan script in the port multiple Internet protocol IP and each port IP and weak passwurd library corresponding with each weak passwurd scan script;It scans from message queue to the port IP;The corresponding weak passwurd scan script in the port IP is searched from priority query according to the port IP;The corresponding weak passwurd library of weak passwurd scan script is searched according to weak passwurd scan script;Judge in weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP is in a safe condition;If it is present obtaining the log-on message in the weak passwurd library of modification, it can detect whether industrial control system is attacked by being suitable for the scan method of the weak passwurd of industrial control system, can be scanned simultaneously for various protocols, improve the safety of industrial control system.

Description

Weak passwurd detection method and device based on industrial control system
Technical field
The present invention relates to industry internet security technology areas, more particularly, to the weak passwurd detection side based on industrial control system Method and device.
Background technique
In order to improve the production efficiency, more and more industrial control systems are applied among production, once industrial control system is attacked It hits, it will generate heavy losses.It can detect whether industrial control system is attacked by weak passwurd scanning, still, current is weak Password scanning is scanned for web page, is not particularly suited for industrial control system.In addition, weak passwurd scanning can only be for single One agreement is scanned, and cannot be scanned simultaneously to various protocols simultaneously, for example, can carry out to single http agreement weak Password scanning cannot simultaneously be scanned the agreements such as mysql and ftp simultaneously.
Therefore, the scan method of above-mentioned weak passwurd is not particularly suited for industrial control system, can not detect industrial control system whether by Attack.
Summary of the invention
It, can be in view of this, the purpose of the present invention is to provide weak passwurd detection method and device based on industrial control system Scan method by being suitable for the weak passwurd of industrial control system detects whether industrial control system is attacked, and can be directed to various protocols It is scanned simultaneously, improves the safety of industrial control system.
In a first aspect, being applied to industry control system the embodiment of the invention provides the weak passwurd detection method based on industrial control system System, which comprises
Priority query is obtained, the priority query includes the port multiple Internet protocol IP and each port IP Corresponding weak passwurd scan script and weak passwurd library corresponding with each weak passwurd scan script;
It scans from message queue to the port IP;
The corresponding weak passwurd scan script in the port IP is searched from the priority query according to the port IP;
The corresponding weak passwurd library of the weak passwurd scan script is searched according to the weak passwurd scan script;
Judge in the weak passwurd library with the presence or absence of weak passwurd;
If it does not exist, then the port IP is in a safe condition;
If it is present obtaining the log-on message in the weak passwurd library of modification.
Further, the message queue obtains in the following manner:
Each port IP is scanned, the port IP being connected to;
The open port IP is obtained from the port IP of the connection;
The message queue is constituted according to the port IP of the opening.
Further, after the log-on message in the weak passwurd library for obtaining modification, the method also includes:
Obtain the matching times of the log-on message in the weak passwurd library;
According to the corresponding weak passwurd scan script in the weak passwurd library and the matching times, the weak passwurd is updated The corresponding weight of scan script.
It is further, described to be scanned from message queue to the port IP, comprising:
The port IP that port scanner scans is extracted from the message queue by thread.
Second aspect, the embodiment of the invention provides the weak passwurd detection devices based on industrial control system, are applied to industry control system System, described device include:
Acquiring unit, for obtaining priority query, the priority query include the port multiple Internet protocol IP, with it is every The corresponding weak passwurd scan script in a port IP and weak passwurd library corresponding with each weak passwurd scan script;
Scanning element, for scanning from message queue to the port IP;
First searching unit, it is corresponding for searching the port IP from the priority query according to the port IP Weak passwurd scan script;
Second searching unit, it is corresponding weak for searching the weak passwurd scan script according to the weak passwurd scan script Password library;
Judging unit, for judging in the weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP It is in a safe condition;If it is present obtaining the log-on message in the weak passwurd library of modification.
Further, the message queue obtains in the following manner:
Each port IP is scanned, the port IP being connected to;
The open port IP is obtained from the port IP of the connection;
The message queue is constituted according to the port IP of the opening.
Further, described device further include:
Matching times acquiring unit, for obtaining the matching times of the log-on message in the weak passwurd library;
Updating unit is used for according to the corresponding weak passwurd scan script in the weak passwurd library and the matching times, Update the corresponding weight of the weak passwurd scan script.
Further, the scanning element is specifically used for:
The port IP that port scanner scans is extracted from the message queue by thread.
The third aspect is deposited on the memory the embodiment of the invention provides electronic equipment, including memory, processor The computer program that can be run on the processor is contained, the processor realizes institute as above when executing the computer program The step of method stated.
Fourth aspect, the embodiment of the invention provides the computers for the non-volatile program code that can be performed with processor Readable medium, said program code make the processor execute method as described above.
The embodiment of the invention provides weak passwurd detection methods and device based on industrial control system, are applied to industrial control system, It include: to obtain priority query, priority query includes the port multiple Internet protocol IP, weak passwurd corresponding with each port IP Scan script and weak passwurd library corresponding with each weak passwurd scan script;It scans from message queue to the port IP;According to IP The corresponding weak passwurd scan script in the port IP is searched from priority query in port;Weak passwurd is searched according to weak passwurd scan script The corresponding weak passwurd library of scan script;Judge in weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP is in peace Total state;If it is present obtaining the log-on message in the weak passwurd library of modification, the weak mouth suitable for industrial control system can be passed through Whether the scan method detection industrial control system of order is attacked, and can be scanned simultaneously for various protocols, improve industry control system The safety of system.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention are in specification, claims And specifically noted structure is achieved and obtained in attached drawing.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the weak passwurd detection method flow chart based on industrial control system that the embodiment of the present invention one provides;
Fig. 2 is the weak passwurd detection device schematic diagram provided by Embodiment 2 of the present invention based on industrial control system.
Icon:
1- acquiring unit;2- scanning element;The first searching unit of 3-;The second searching unit of 4-;5- judging unit.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Under every other embodiment obtained, shall fall within the protection scope of the present invention.
To be described in detail to the embodiment of the present invention below convenient for understanding the present embodiment.
Embodiment one:
Fig. 1 is the weak passwurd detection method flow chart based on industrial control system that the embodiment of the present invention one provides.
Referring to Fig.1, it is applied to industrial control system, method includes the following steps:
Step S1, obtains priority query, and priority query includes the port multiple Internet protocol IP and each port pair IP The weak passwurd scan script answered and weak passwurd library corresponding with each weak passwurd scan script;
Specifically, the weak passwurd scan script different according to different IP port definitions, the port IP and weak passwurd scan foot It is the relationship of key and value between this, wherein key is keyword, and value is weight, then, the port IP is keyword, Weak passwurd scan script is weight.Each port IP corresponds to weak passwurd scan script, and each weak passwurd scan script is corresponding Weak passwurd library is stored in priority query.It, can be according to weight when being scanned to the weak mouth library in priority query Size order is scanned.
Step S2 is scanned from message queue to the port IP;
Here, include the different ports IP in message queue, the different ports IP can be scanned simultaneously, work as scanning When to one of port IP, weak passwurd is determined whether there is according to the corresponding relationship in priority query.
Step S3 searches the corresponding weak passwurd scan script in the port IP according to the port IP from priority query;
Step S4 searches the corresponding weak passwurd library of weak passwurd scan script according to weak passwurd scan script;
Step S5 judges in weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then executing step S6;If it does, Then follow the steps S7;
The port step S6, IP is in a safe condition;
Step S7 obtains the log-on message in the weak passwurd library of modification.
Here, weak passwurd is usually the password being easy by others guesses or the tool of being cracked cracks, such as " 123 ", " abc " Etc. simple digitals or letter combination.
Specifically, after scanning starts, thread constantly extracts the end IP that port scanner scans from message queue Mouthful, the corresponding weak passwurd scan script in the port IP is searched from priority query according to corresponding relationship, foot is scanned according to weak passwurd The corresponding weak passwurd library of this lookup, traverses the combined information that all username and passwords are constituted from weak passwurd library, and judgement is No there are weak passwurds, if there is no weak passwurd, then illustrate that the port IP is in a safe condition, are not cracked;If there is Weak passwurd, then corresponding username and password can log in industrial control system, can show the prompt of modification username and password at this time Information, to modify to username and password.Meanwhile weight of the username and password in priority query is increased, By constantly scanning, it will priority scan is to common weak passwurd, so as to improve scanning speed.Wherein, port scanner packet It includes but is not limited to masscan.
Further, message queue obtains in the following manner:
Each port IP is scanned, the port IP being connected to;
The open port IP is obtained from the port IP of connection;
Message queue is constituted according to the open port IP.
Specifically, it when scanning beginning, first has to judge whether the port IP can be connected to, i.e., whether the port IP survives, such as The survival of the port fruit IP, then illustrate that the port IP can connect communication, that is, is in connected state;Then judge connection the port IP in which A little ports are to obtain the open port IP in open state, the open port IP is stored in message queue.It is offseting When the port IP in breath queue is scanned, it is scanned according to the principle of first in first out.
Further, after step S7, this method is further comprising the steps of:
Step S11 obtains the matching times of the log-on message in weak passwurd library;
Step S12 updates weak passwurd scan script according to the corresponding weak passwurd scan script in weak passwurd library and matching times Corresponding weight.
Specifically, when determining in weak passwurd library there are when weak passwurd, the log-on message in weak passwurd library is modified, wherein step on Record the combination that information is username and password.When initial, the weight of the corresponding weak passwurd scan script in weak passwurd library is 0, weak mouth The matching times for enabling log-on message in library are also 0.When being searched whether from weak passwurd library there are when weak passwurd, weak passwurd at this time As log-on message.If being repeatedly matched to the log-on message, according to the corresponding weak passwurd scan script in weak passwurd library and With number, the corresponding weight of weak passwurd scan script is updated.For example, when initial, weight 0, when log-on message is matched to once When, weight becomes 0+1;When log-on message is matched to twice, weight 1+2.
Further, step S2 includes:
The port IP that port scanner scans is extracted from message queue by thread.
The embodiment of the invention provides the weak passwurd detection methods based on industrial control system, are applied to industrial control system, comprising: obtain Priority query is taken, priority query includes the port multiple Internet protocol IP, weak passwurd corresponding with each port IP scanning foot Sheet and weak passwurd library corresponding with each weak passwurd scan script;It scans from message queue to the port IP;According to the port IP from The corresponding weak passwurd scan script in the port IP is searched in priority query;Weak passwurd, which is searched, according to weak passwurd scan script scans foot This corresponding weak passwurd library;Judge in weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP is in safe shape State;If it is present obtaining the log-on message in the weak passwurd library of modification, the weak passwurd suitable for industrial control system can be passed through Whether scan method detection industrial control system is attacked, and can be scanned simultaneously for various protocols, improve industrial control system Safety.
Embodiment two:
Fig. 2 is the weak passwurd detection device schematic diagram provided by Embodiment 2 of the present invention based on industrial control system.
Referring to Fig. 2, it is applied to industrial control system, which includes:
Acquiring unit 1, for obtaining priority query, priority query include the port multiple Internet protocol IP, with it is each The corresponding weak passwurd scan script in the port IP and weak passwurd library corresponding with each weak passwurd scan script;
Scanning element 2, for scanning from message queue to the port IP;
First searching unit 3, for searching the corresponding weak passwurd scanning in the port IP from priority query according to the port IP Script;
Second searching unit 4, for searching the corresponding weak passwurd library of weak passwurd scan script according to weak passwurd scan script;
Judging unit 5, for judging in weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP is in peace Total state;If it is present obtaining the log-on message in the weak passwurd library of modification.
Further, message queue obtains in the following manner:
Each port IP is scanned, the port IP being connected to;
The open port IP is obtained from the port IP of connection;
Message queue is constituted according to the open port IP.
Further, the device further include:
Matching times acquiring unit (not shown), for obtaining the matching times of the log-on message in weak passwurd library;
Updating unit (not shown), for updating according to the corresponding weak passwurd scan script in weak passwurd library and matching times The corresponding weight of weak passwurd scan script.
Further, scanning element 2 is specifically used for:
The port IP that port scanner scans is extracted from message queue by thread.
The embodiment of the invention provides the weak passwurd detection devices based on industrial control system, are applied to industrial control system, comprising: obtain Priority query is taken, priority query includes the port multiple Internet protocol IP, weak passwurd corresponding with each port IP scanning foot Sheet and weak passwurd library corresponding with each weak passwurd scan script;It scans from message queue to the port IP;According to the port IP from The corresponding weak passwurd scan script in the port IP is searched in priority query;Weak passwurd, which is searched, according to weak passwurd scan script scans foot This corresponding weak passwurd library;Judge in weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP is in safe shape State;If it is present obtaining the log-on message in the weak passwurd library of modification, the weak passwurd suitable for industrial control system can be passed through Whether scan method detection industrial control system is attacked, and can be scanned simultaneously for various protocols, improve industrial control system Safety.
The embodiment of the present invention also provides a kind of electronic equipment, including memory, processor and storage are on a memory and can The computer program run on a processor, processor are realized provided by the above embodiment based on industry control when executing computer program The step of weak passwurd detection method of system.
The embodiment of the present invention also provide it is a kind of with processor can be performed non-volatile program code it is computer-readable Medium is stored with computer program on computer-readable medium, above-described embodiment is executed when computer program is run by processor The weak passwurd detection method based on industrial control system the step of.
Computer program product provided by the embodiment of the present invention, the computer-readable storage including storing program code Medium, the instruction that said program code includes can be used for executing previous methods method as described in the examples, and specific implementation can be joined See embodiment of the method, details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In addition, in the description of the embodiment of the present invention unless specifically defined or limited otherwise, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition Concrete meaning in invention.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical", The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation, It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ", " third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
Finally, it should be noted that embodiment described above, only a specific embodiment of the invention, to illustrate the present invention Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, those skilled in the art should understand that: anyone skilled in the art In the technical scope disclosed by the present invention, it can still modify to technical solution documented by previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover in protection of the invention Within the scope of.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (10)

1. a kind of weak passwurd detection method based on industrial control system, which is characterized in that be applied to industrial control system, the method packet It includes:
Priority query is obtained, the priority query includes the port multiple Internet protocol IP, corresponding with each port IP Weak passwurd scan script and weak passwurd library corresponding with each weak passwurd scan script;
It scans from message queue to the port IP;
The corresponding weak passwurd scan script in the port IP is searched from the priority query according to the port IP;
The corresponding weak passwurd library of the weak passwurd scan script is searched according to the weak passwurd scan script;
Judge in the weak passwurd library with the presence or absence of weak passwurd;
If it does not exist, then the port IP is in a safe condition;
If it is present obtaining the log-on message in the weak passwurd library of modification.
2. the weak passwurd detection method according to claim 1 based on industrial control system, which is characterized in that the message queue It obtains in the following manner:
Each port IP is scanned, the port IP being connected to;
The open port IP is obtained from the port IP of the connection;
The message queue is constituted according to the port IP of the opening.
3. the weak passwurd detection method according to claim 1 based on industrial control system, which is characterized in that the acquisition modification The weak passwurd library in log-on message after, the method also includes:
Obtain the matching times of the log-on message in the weak passwurd library;
According to the corresponding weak passwurd scan script in the weak passwurd library and the matching times, the weak passwurd scanning is updated The corresponding weight of script.
4. the weak passwurd detection method according to claim 1 based on industrial control system, which is characterized in that described from message team The port IP is arrived in scanning in column, comprising:
The port IP that port scanner scans is extracted from the message queue by thread.
5. a kind of weak passwurd detection device based on industrial control system, which is characterized in that be applied to industrial control system, described device packet It includes:
Acquiring unit, for obtaining priority query, the priority query includes the port multiple Internet protocol IP and each institute State the corresponding weak passwurd scan script in the port IP and weak passwurd library corresponding with each weak passwurd scan script;
Scanning element, for scanning from message queue to the port IP;
First searching unit, for searching the corresponding weak mouth in the port IP from the priority query according to the port IP Enable scan script;
Second searching unit, for searching the corresponding weak passwurd of the weak passwurd scan script according to the weak passwurd scan script Library;
Judging unit, for judging in the weak passwurd library with the presence or absence of weak passwurd;If it does not exist, then the port IP is in Safe condition;If it is present obtaining the log-on message in the weak passwurd library of modification.
6. the weak passwurd detection device according to claim 5 based on industrial control system, which is characterized in that the message queue It obtains in the following manner:
Each port IP is scanned, the port IP being connected to;
The open port IP is obtained from the port IP of the connection;
The message queue is constituted according to the port IP of the opening.
7. the weak passwurd detection device according to claim 5 based on industrial control system, which is characterized in that described device is also wrapped It includes:
Matching times acquiring unit, for obtaining the matching times of the log-on message in the weak passwurd library;
Updating unit, for updating according to the corresponding weak passwurd scan script in the weak passwurd library and the matching times The corresponding weight of the weak passwurd scan script.
8. the weak passwurd detection device according to claim 5 based on industrial control system, which is characterized in that the scanning element It is specifically used for:
The port IP that port scanner scans is extracted from the message queue by thread.
9. a kind of electronic equipment, including memory, processor, be stored on the memory to run on the processor Computer program, which is characterized in that the processor realizes that the claims 1 to 4 are any when executing the computer program The step of method described in item.
10. a kind of computer-readable medium for the non-volatile program code that can be performed with processor, which is characterized in that described Program code makes the processor execute the described in any item methods of Claims 1-4.
CN201910825035.1A 2019-09-02 2019-09-02 Weak password detection method and device based on industrial control system Active CN110519289B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910825035.1A CN110519289B (en) 2019-09-02 2019-09-02 Weak password detection method and device based on industrial control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910825035.1A CN110519289B (en) 2019-09-02 2019-09-02 Weak password detection method and device based on industrial control system

Publications (2)

Publication Number Publication Date
CN110519289A true CN110519289A (en) 2019-11-29
CN110519289B CN110519289B (en) 2022-03-11

Family

ID=68629546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910825035.1A Active CN110519289B (en) 2019-09-02 2019-09-02 Weak password detection method and device based on industrial control system

Country Status (1)

Country Link
CN (1) CN110519289B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150304302A1 (en) * 2014-04-16 2015-10-22 Alibaba Group Holding Limited Method and apparatus of detecting weak password
CN105721472A (en) * 2016-02-23 2016-06-29 北京皮尔布莱尼软件有限公司 Port security check method, device and system
CN106685954A (en) * 2016-12-27 2017-05-17 北京神州绿盟信息安全科技股份有限公司 Method and device for scanning plug-in and determining rule scheduling sequence in plug-in
CN106713284A (en) * 2016-12-02 2017-05-24 国网浙江省电力公司电力科学研究院 Industrial control security testing system, and industrial control system
CN106934274A (en) * 2015-12-31 2017-07-07 中国移动通信集团黑龙江有限公司 A kind of weak passwurd detection method, apparatus and system
CN106973071A (en) * 2017-05-24 2017-07-21 北京匡恩网络科技有限责任公司 A kind of vulnerability scanning method and apparatus
CN107707553A (en) * 2017-10-18 2018-02-16 北京启明星辰信息安全技术有限公司 Weak passwurd scan method, device and computer-readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150304302A1 (en) * 2014-04-16 2015-10-22 Alibaba Group Holding Limited Method and apparatus of detecting weak password
CN106934274A (en) * 2015-12-31 2017-07-07 中国移动通信集团黑龙江有限公司 A kind of weak passwurd detection method, apparatus and system
CN105721472A (en) * 2016-02-23 2016-06-29 北京皮尔布莱尼软件有限公司 Port security check method, device and system
CN106713284A (en) * 2016-12-02 2017-05-24 国网浙江省电力公司电力科学研究院 Industrial control security testing system, and industrial control system
CN106685954A (en) * 2016-12-27 2017-05-17 北京神州绿盟信息安全科技股份有限公司 Method and device for scanning plug-in and determining rule scheduling sequence in plug-in
CN106973071A (en) * 2017-05-24 2017-07-21 北京匡恩网络科技有限责任公司 A kind of vulnerability scanning method and apparatus
CN107707553A (en) * 2017-10-18 2018-02-16 北京启明星辰信息安全技术有限公司 Weak passwurd scan method, device and computer-readable storage medium

Also Published As

Publication number Publication date
CN110519289B (en) 2022-03-11

Similar Documents

Publication Publication Date Title
JP4905395B2 (en) Communication monitoring device, communication monitoring program, and communication monitoring method
JP6173613B2 (en) Method, device, computer program and information storage means for classifying TCP connections carrying HTTP traffic
US9426166B2 (en) Method and apparatus for processing finite automata
CN107347076B (en) SSRF vulnerability detection method and device
US10277610B2 (en) Reassembly-free deep packet inspection on multi-core hardware
CN107040518B (en) Private cloud server login method and system
CN104008381B (en) A kind of personal identification method and device
CN108390864B (en) Trojan horse detection method and system based on attack chain behavior analysis
JPWO2015107861A1 (en) Information processing apparatus, fraudulent activity determination method and fraudulent activity determination program, information processing apparatus, activity determination method and activity determination program
WO2019095856A1 (en) Network identity authentication method and system, and user agent device used thereby
CN105302815B (en) The filter method and device of the uniform resource position mark URL of webpage
JP2003046533A (en) Network system, authentication method therefor and program thereof
CN102571812A (en) Tracking and identification method and apparatus for network threats
WO2017107804A1 (en) Method and device for ddos attack identification
CN104580197A (en) Code detection method and code detection system
CN108156165A (en) A kind of method and system for reporting detection by mistake
CN105227431B (en) The method and apparatus that good friend or group are fast added in instant messaging
CN104679798B (en) Page detection method and device
CN109495325A (en) Website IPv6 support appraisal procedure, device and equipment
CN106446068B (en) Directory database generation and query method and device
JP2012037948A (en) Method for changing device setting
JP2017117354A5 (en)
CN110519289A (en) Weak passwurd detection method and device based on industrial control system
CN109495471A (en) A kind of pair of WEB attack result determination method, device, equipment and readable storage medium storing program for executing
CN109344604A (en) A kind of method and system judging user password risk based on user's habit

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant