CN110519289B - Weak password detection method and device based on industrial control system - Google Patents
Weak password detection method and device based on industrial control system Download PDFInfo
- Publication number
- CN110519289B CN110519289B CN201910825035.1A CN201910825035A CN110519289B CN 110519289 B CN110519289 B CN 110519289B CN 201910825035 A CN201910825035 A CN 201910825035A CN 110519289 B CN110519289 B CN 110519289B
- Authority
- CN
- China
- Prior art keywords
- weak password
- port
- scanning
- control system
- industrial control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a weak password detection method and a weak password detection device based on an industrial control system, which are applied to the industrial control system and comprise the following steps: acquiring a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, a weak password scanning script corresponding to each IP port and a weak password library corresponding to each weak password scanning script; scanning to an IP port from a message queue; searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port; searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script; judging whether a weak password exists in a weak password library or not; if not, the IP port is in a safe state; if the password exists, the login information in the modified weak password library is obtained, whether the industrial control system is attacked or not can be detected through a weak password scanning method suitable for the industrial control system, the industrial control system can be scanned aiming at multiple protocols simultaneously, and the safety of the industrial control system is improved.
Description
Technical Field
The invention relates to the technical field of industrial internet security, in particular to a weak password detection method and device based on an industrial control system.
Background
In order to improve the production efficiency, more and more industrial control systems are applied to production, and once the industrial control systems are attacked, great loss can be generated. Whether the industrial control system is attacked can be detected through weak password scanning, but the existing weak password scanning aims at web pages and is not suitable for the industrial control system. In addition, the weak password scanning only can scan for a single protocol, and cannot simultaneously scan multiple protocols, for example, weak password scanning can be performed for a single http protocol, and protocols such as mysql and ftp cannot be simultaneously scanned.
Therefore, the scanning method of the weak password is not suitable for the industrial control system and cannot detect whether the industrial control system is attacked or not.
Disclosure of Invention
In view of this, the present invention provides a weak password detection method and apparatus based on an industrial control system, which can detect whether the industrial control system is attacked by a weak password scanning method suitable for the industrial control system, and can scan multiple protocols simultaneously, thereby improving the security of the industrial control system.
In a first aspect, an embodiment of the present invention provides a weak password detection method based on an industrial control system, which is applied to the industrial control system, and the method includes:
acquiring a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, weak password scanning scripts corresponding to the IP ports and weak password libraries corresponding to the weak password scanning scripts;
scanning to the IP port from a message queue;
searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port;
searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script;
judging whether a weak password exists in the weak password library or not;
if not, the IP port is in a safe state;
and if so, acquiring the modified login information in the weak password library.
Further, the message queue is obtained by:
scanning each IP port to obtain communicated IP ports;
acquiring an open IP port from the communicated IP ports;
and forming the message queue according to the opened IP port.
Further, after acquiring the modified login information in the weak password library, the method further includes:
acquiring the matching times of the login information in the weak password library;
and updating the weight value corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times.
Further, the scanning from the message queue to the IP port includes:
extracting, by a thread, the IP port scanned by a port scanner from the message queue.
In a second aspect, an embodiment of the present invention provides a weak password detection apparatus based on an industrial control system, which is applied to the industrial control system, and the apparatus includes:
the system comprises an acquisition unit, a priority queue and a control unit, wherein the acquisition unit is used for acquiring the priority queue, and the priority queue comprises a plurality of Internet Protocol (IP) ports, weak password scanning scripts corresponding to the IP ports and a weak password library corresponding to the weak password scanning scripts;
the scanning unit is used for scanning the IP port from the message queue;
the first searching unit is used for searching the weak password scanning script corresponding to the IP port from the priority queue according to the IP port;
the second searching unit is used for searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script;
the judging unit is used for judging whether a weak password exists in the weak password library or not; if not, the IP port is in a safe state; and if so, acquiring the modified login information in the weak password library.
Further, the message queue is obtained by:
scanning each IP port to obtain communicated IP ports;
acquiring an open IP port from the communicated IP ports;
and forming the message queue according to the opened IP port.
Further, the apparatus further comprises:
a matching frequency acquiring unit for acquiring the matching frequency of the login information in the weak password library;
and the updating unit is used for updating the weight value corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times.
Further, the scanning unit is specifically configured to:
extracting, by a thread, the IP port scanned by a port scanner from the message queue.
In a third aspect, an embodiment of the present invention provides an electronic device, including a memory and a processor, where the memory stores a computer program operable on the processor, and the processor implements the steps of the method when executing the computer program.
In a fourth aspect, embodiments of the invention provide a computer readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the method as described above.
The embodiment of the invention provides a weak password detection method and a device based on an industrial control system, which are applied to the industrial control system and comprise the following steps: acquiring a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, a weak password scanning script corresponding to each IP port and a weak password library corresponding to each weak password scanning script; scanning to an IP port from a message queue; searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port; searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script; judging whether a weak password exists in a weak password library or not; if not, the IP port is in a safe state; if the password exists, the login information in the modified weak password library is obtained, whether the industrial control system is attacked or not can be detected through a weak password scanning method suitable for the industrial control system, the industrial control system can be scanned aiming at multiple protocols simultaneously, and the safety of the industrial control system is improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of a weak password detection method based on an industrial control system according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a weak password detection device based on an industrial control system according to a second embodiment of the present invention.
Icon:
1-an acquisition unit; 2-a scanning unit; 3-a first lookup unit; 4-a second lookup unit; 5-a judging unit.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
For the understanding of the present embodiment, the following detailed description will be given of the embodiment of the present invention.
The first embodiment is as follows:
fig. 1 is a flowchart of a weak password detection method based on an industrial control system according to an embodiment of the present invention.
Referring to fig. 1, the method is applied to an industrial control system, and comprises the following steps:
step S1, obtaining a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, weak password scanning scripts corresponding to the IP ports and weak password libraries corresponding to the weak password scanning scripts;
specifically, different weak password scanning scripts are defined according to different IP ports, and a key and value relationship exists between the IP ports and the weak password scanning scripts, wherein the key is a keyword, and the value is a weight, so that the IP ports are keywords, and the weak password scanning scripts are weights. Each IP port corresponds to a weak password scanning script, and a weak password library corresponding to each weak password scanning script is stored in a priority queue. When the weak port libraries in the priority queue are scanned, the weak port libraries are scanned according to the magnitude sequence of the weight values.
Step S2, scanning the IP port from the message queue;
here, the message queue includes different IP ports, different IP ports can be scanned simultaneously, and when one of the IP ports is scanned, whether a weak password exists is determined according to a correspondence relationship in the priority queue.
Step S3, according to the IP port, finding the weak password scanning script corresponding to the IP port from the priority queue;
step S4, searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script;
step S5, judging whether a weak password exists in the weak password library; if not, go to step S6; if so, go to step S7;
step S6, the IP port is in a safe state;
step S7, obtaining the login information in the modified weak password library.
Here, a weak password is generally a password that is easily guessed by others or broken by a hacking tool, such as a combination of simple numbers or letters such as "123", "abc", etc.
Specifically, after scanning starts, a thread continuously extracts an IP port scanned by a port scanner from a message queue, searches a weak password scanning script corresponding to the IP port from a priority queue according to a corresponding relation, searches a corresponding weak password library according to the weak password scanning script, traverses all combination information formed by user names and passwords from the weak password library, judges whether a weak password exists or not, and if the weak password does not exist, indicates that the IP port is in a safe state and is not cracked; if the weak password exists, the corresponding user name and password can log in the industrial control system, and prompt information for modifying the user name and the password is displayed at the moment, so that the user name and the password are modified. Meanwhile, the weights of the user name and the password in the priority queue are increased, and the common weak password is preferentially scanned through continuous scanning, so that the scanning speed is increased. The port scanner includes, but is not limited to, a massscan.
Further, the message queue is obtained by the following method:
scanning each IP port to obtain a communicated IP port;
acquiring an open IP port from the communicated IP ports;
and forming a message queue according to the opened IP ports.
Specifically, when scanning starts, it is first determined whether the IP port is connectable, that is, whether the IP port is alive, and if the IP port is alive, it indicates that the IP port is connectable for communication, that is, in a connected state; and then judging which ports in the connected IP ports are in an open state, namely acquiring the open IP ports and storing the open IP ports in a message queue. When scanning the IP ports in the message queue, scanning according to the first-in first-out principle.
Further, after step S7, the method further includes the steps of:
step S11, obtaining the matching times of the login information in the weak password library;
and step S12, updating the weight value corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times.
Specifically, when the weak password exists in the weak password library, the login information in the weak password library is modified, wherein the login information is a combination of a user name and a password. Initially, the weight of the weak password scanning script corresponding to the weak password library is 0, and the matching frequency of the login information in the weak password library is also 0. When the weak password is searched from the weak password library, the weak password is the login information. And if the login information is matched for multiple times, updating the weight corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times. For example, initially, the weight is 0, and when the login information is matched once, the weight becomes 0+ 1; when the login information is matched twice, the weight is 1+ 2.
Further, step S2 includes:
and extracting the IP port scanned by the port scanner from the message queue through the thread.
The embodiment of the invention provides a weak password detection method based on an industrial control system, which is applied to the industrial control system and comprises the following steps: acquiring a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, a weak password scanning script corresponding to each IP port and a weak password library corresponding to each weak password scanning script; scanning to an IP port from a message queue; searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port; searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script; judging whether a weak password exists in a weak password library or not; if not, the IP port is in a safe state; if the password exists, the login information in the modified weak password library is obtained, whether the industrial control system is attacked or not can be detected through a weak password scanning method suitable for the industrial control system, the industrial control system can be scanned aiming at multiple protocols simultaneously, and the safety of the industrial control system is improved.
Example two:
fig. 2 is a schematic diagram of a weak password detection device based on an industrial control system according to a second embodiment of the present invention.
Referring to fig. 2, applied to an industrial control system, the device includes:
the system comprises an acquisition unit 1, a priority queue and a control unit, wherein the acquisition unit 1 is used for acquiring the priority queue, and the priority queue comprises a plurality of Internet Protocol (IP) ports, weak password scanning scripts corresponding to the IP ports and weak password libraries corresponding to the weak password scanning scripts;
the scanning unit 2 is used for scanning the IP port from the message queue;
the first searching unit 3 is used for searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port;
the second searching unit 4 is used for searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script;
a judging unit 5 for judging whether a weak password exists in the weak password library; if not, the IP port is in a safe state; if so, the login information in the modified weak password library is obtained.
Further, the message queue is obtained by the following method:
scanning each IP port to obtain a communicated IP port;
acquiring an open IP port from the communicated IP ports;
and forming a message queue according to the opened IP ports.
Further, the apparatus further comprises:
a matching number acquisition unit (not shown) for acquiring the number of matching of the login information in the weak password library;
and the updating unit (not shown) is used for updating the weight value corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times.
Further, the scanning unit 2 is specifically configured to:
and extracting the IP port scanned by the port scanner from the message queue through the thread.
The embodiment of the invention provides a weak password detection device based on an industrial control system, which is applied to the industrial control system and comprises the following components: acquiring a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, a weak password scanning script corresponding to each IP port and a weak password library corresponding to each weak password scanning script; scanning to an IP port from a message queue; searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port; searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script; judging whether a weak password exists in a weak password library or not; if not, the IP port is in a safe state; if the password exists, the login information in the modified weak password library is obtained, whether the industrial control system is attacked or not can be detected through a weak password scanning method suitable for the industrial control system, the industrial control system can be scanned aiming at multiple protocols simultaneously, and the safety of the industrial control system is improved.
The embodiment of the invention also provides electronic equipment, which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the steps of the industrial control system-based weak password detection method provided by the embodiment when executing the computer program.
The embodiment of the present invention further provides a computer readable medium having a non-volatile program code executable by a processor, where the computer readable medium stores a computer program, and the computer program is executed by the processor to perform the steps of the industrial control system-based weak password detection method according to the above embodiment.
The computer program product provided in the embodiment of the present invention includes a computer-readable storage medium storing a program code, where instructions included in the program code may be used to execute the method described in the foregoing method embodiment, and specific implementation may refer to the method embodiment, which is not described herein again.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the apparatus described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In addition, in the description of the embodiments of the present invention, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (8)
1. A weak password detection method based on an industrial control system is characterized by being applied to the industrial control system and comprising the following steps:
acquiring a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, weak password scanning scripts corresponding to the IP ports and weak password libraries corresponding to the weak password scanning scripts;
scanning to the IP port from a message queue;
searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port;
searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script;
judging whether a weak password exists in the weak password library or not;
if not, the IP port is in a safe state;
if yes, obtaining the modified login information in the weak password library;
after obtaining the modified login information in the weak password library, the method further comprises:
acquiring the matching times of the login information in the weak password library;
and updating the weight value corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times.
2. The industrial control system-based weak password detection method according to claim 1, wherein the message queue is obtained by:
scanning each IP port to obtain communicated IP ports;
acquiring an open IP port from the communicated IP ports;
and forming the message queue according to the opened IP port.
3. The industrial control system-based weak password detection method according to claim 1, wherein the scanning from the message queue to the IP port comprises:
extracting, by a thread, the IP port scanned by a port scanner from the message queue.
4. The weak password detection device based on the industrial control system is characterized by being applied to the industrial control system and comprising:
the system comprises an acquisition unit, a priority queue and a control unit, wherein the acquisition unit is used for acquiring the priority queue, and the priority queue comprises a plurality of Internet Protocol (IP) ports, weak password scanning scripts corresponding to the IP ports and a weak password library corresponding to the weak password scanning scripts;
the scanning unit is used for scanning the IP port from the message queue;
the first searching unit is used for searching the weak password scanning script corresponding to the IP port from the priority queue according to the IP port;
the second searching unit is used for searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script;
the judging unit is used for judging whether a weak password exists in the weak password library or not; if not, the IP port is in a safe state; if yes, obtaining the modified login information in the weak password library; the device further comprises:
a matching frequency acquiring unit for acquiring the matching frequency of the login information in the weak password library;
and the updating unit is used for updating the weight value corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times.
5. The industrial control system-based weak password detection device according to claim 4, wherein the message queue is obtained by:
scanning each IP port to obtain communicated IP ports;
acquiring an open IP port from the communicated IP ports;
and forming the message queue according to the opened IP port.
6. The industrial control system-based weak password detection apparatus according to claim 4, wherein the scanning unit is specifically configured to:
extracting, by a thread, the IP port scanned by a port scanner from the message queue.
7. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method of any of claims 1 to 3 when executing the computer program.
8. A computer-readable medium having non-volatile program code executable by a processor, wherein the program code causes the processor to perform the method of any of claims 1 to 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910825035.1A CN110519289B (en) | 2019-09-02 | 2019-09-02 | Weak password detection method and device based on industrial control system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910825035.1A CN110519289B (en) | 2019-09-02 | 2019-09-02 | Weak password detection method and device based on industrial control system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110519289A CN110519289A (en) | 2019-11-29 |
CN110519289B true CN110519289B (en) | 2022-03-11 |
Family
ID=68629546
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910825035.1A Active CN110519289B (en) | 2019-09-02 | 2019-09-02 | Weak password detection method and device based on industrial control system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110519289B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105721472A (en) * | 2016-02-23 | 2016-06-29 | 北京皮尔布莱尼软件有限公司 | Port security check method, device and system |
CN106685954A (en) * | 2016-12-27 | 2017-05-17 | 北京神州绿盟信息安全科技股份有限公司 | Method and device for scanning plug-in and determining rule scheduling sequence in plug-in |
CN106934274A (en) * | 2015-12-31 | 2017-07-07 | 中国移动通信集团黑龙江有限公司 | A kind of weak passwurd detection method, apparatus and system |
CN107707553A (en) * | 2017-10-18 | 2018-02-16 | 北京启明星辰信息安全技术有限公司 | Weak passwurd scan method, device and computer-readable storage medium |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105095737B (en) * | 2014-04-16 | 2019-03-01 | 阿里巴巴集团控股有限公司 | The method and apparatus for detecting weak password |
CN106713284A (en) * | 2016-12-02 | 2017-05-24 | 国网浙江省电力公司电力科学研究院 | Industrial control security testing system, and industrial control system |
CN106973071A (en) * | 2017-05-24 | 2017-07-21 | 北京匡恩网络科技有限责任公司 | A kind of vulnerability scanning method and apparatus |
-
2019
- 2019-09-02 CN CN201910825035.1A patent/CN110519289B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106934274A (en) * | 2015-12-31 | 2017-07-07 | 中国移动通信集团黑龙江有限公司 | A kind of weak passwurd detection method, apparatus and system |
CN105721472A (en) * | 2016-02-23 | 2016-06-29 | 北京皮尔布莱尼软件有限公司 | Port security check method, device and system |
CN106685954A (en) * | 2016-12-27 | 2017-05-17 | 北京神州绿盟信息安全科技股份有限公司 | Method and device for scanning plug-in and determining rule scheduling sequence in plug-in |
CN107707553A (en) * | 2017-10-18 | 2018-02-16 | 北京启明星辰信息安全技术有限公司 | Weak passwurd scan method, device and computer-readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110519289A (en) | 2019-11-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111147504B (en) | Threat detection method, apparatus, device and storage medium | |
US7152244B2 (en) | Techniques for detecting and preventing unintentional disclosures of sensitive data | |
CN110730175B (en) | Botnet detection method and detection system based on threat information | |
CN110581827B (en) | Detection method and device for brute force cracking | |
Wu et al. | MobiFish: A lightweight anti-phishing scheme for mobile phones | |
US9363286B2 (en) | System and methods for detection of fraudulent online transactions | |
Vetterl et al. | Bitter harvest: Systematically fingerprinting low-and medium-interaction honeypots at internet scale | |
US9602525B2 (en) | Classification of malware generated domain names | |
Althobaiti et al. | A review of human-and computer-facing url phishing features | |
CN109167781B (en) | Network attack chain identification method and device based on dynamic correlation analysis | |
WO2018076697A1 (en) | Method and apparatus for detecting zombie feature | |
CN108154031B (en) | Method, device, storage medium and electronic device for identifying disguised application | |
CN107070845B (en) | System and method for detecting phishing scripts | |
Zaimi et al. | Survey paper: Taxonomy of website anti-phishing solutions | |
JP2012037948A (en) | Method for changing device setting | |
CN105939314A (en) | Network protection method and device | |
CN110519289B (en) | Weak password detection method and device based on industrial control system | |
CN112351002B (en) | Message detection method, device and equipment | |
CN110865774A (en) | Information security detection method and device for printing equipment | |
CN103096321A (en) | Method for detecting malicious server and device for the same | |
CN112333180A (en) | APT attack detection method and system based on data mining | |
US20230275912A1 (en) | Graph-based analysis of security incidents | |
CN113852625B (en) | Weak password monitoring method, device, equipment and storage medium | |
CN109660499A (en) | It attacks hold-up interception method and device, calculate equipment and storage medium | |
CN110830518B (en) | Traceability analysis method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |