CN110519289B - Weak password detection method and device based on industrial control system - Google Patents

Weak password detection method and device based on industrial control system Download PDF

Info

Publication number
CN110519289B
CN110519289B CN201910825035.1A CN201910825035A CN110519289B CN 110519289 B CN110519289 B CN 110519289B CN 201910825035 A CN201910825035 A CN 201910825035A CN 110519289 B CN110519289 B CN 110519289B
Authority
CN
China
Prior art keywords
weak password
port
scanning
control system
industrial control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910825035.1A
Other languages
Chinese (zh)
Other versions
CN110519289A (en
Inventor
王宗三
范渊
黄进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Original Assignee
DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DBAPPSecurity Co Ltd filed Critical DBAPPSecurity Co Ltd
Priority to CN201910825035.1A priority Critical patent/CN110519289B/en
Publication of CN110519289A publication Critical patent/CN110519289A/en
Application granted granted Critical
Publication of CN110519289B publication Critical patent/CN110519289B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a weak password detection method and a weak password detection device based on an industrial control system, which are applied to the industrial control system and comprise the following steps: acquiring a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, a weak password scanning script corresponding to each IP port and a weak password library corresponding to each weak password scanning script; scanning to an IP port from a message queue; searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port; searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script; judging whether a weak password exists in a weak password library or not; if not, the IP port is in a safe state; if the password exists, the login information in the modified weak password library is obtained, whether the industrial control system is attacked or not can be detected through a weak password scanning method suitable for the industrial control system, the industrial control system can be scanned aiming at multiple protocols simultaneously, and the safety of the industrial control system is improved.

Description

Weak password detection method and device based on industrial control system
Technical Field
The invention relates to the technical field of industrial internet security, in particular to a weak password detection method and device based on an industrial control system.
Background
In order to improve the production efficiency, more and more industrial control systems are applied to production, and once the industrial control systems are attacked, great loss can be generated. Whether the industrial control system is attacked can be detected through weak password scanning, but the existing weak password scanning aims at web pages and is not suitable for the industrial control system. In addition, the weak password scanning only can scan for a single protocol, and cannot simultaneously scan multiple protocols, for example, weak password scanning can be performed for a single http protocol, and protocols such as mysql and ftp cannot be simultaneously scanned.
Therefore, the scanning method of the weak password is not suitable for the industrial control system and cannot detect whether the industrial control system is attacked or not.
Disclosure of Invention
In view of this, the present invention provides a weak password detection method and apparatus based on an industrial control system, which can detect whether the industrial control system is attacked by a weak password scanning method suitable for the industrial control system, and can scan multiple protocols simultaneously, thereby improving the security of the industrial control system.
In a first aspect, an embodiment of the present invention provides a weak password detection method based on an industrial control system, which is applied to the industrial control system, and the method includes:
acquiring a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, weak password scanning scripts corresponding to the IP ports and weak password libraries corresponding to the weak password scanning scripts;
scanning to the IP port from a message queue;
searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port;
searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script;
judging whether a weak password exists in the weak password library or not;
if not, the IP port is in a safe state;
and if so, acquiring the modified login information in the weak password library.
Further, the message queue is obtained by:
scanning each IP port to obtain communicated IP ports;
acquiring an open IP port from the communicated IP ports;
and forming the message queue according to the opened IP port.
Further, after acquiring the modified login information in the weak password library, the method further includes:
acquiring the matching times of the login information in the weak password library;
and updating the weight value corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times.
Further, the scanning from the message queue to the IP port includes:
extracting, by a thread, the IP port scanned by a port scanner from the message queue.
In a second aspect, an embodiment of the present invention provides a weak password detection apparatus based on an industrial control system, which is applied to the industrial control system, and the apparatus includes:
the system comprises an acquisition unit, a priority queue and a control unit, wherein the acquisition unit is used for acquiring the priority queue, and the priority queue comprises a plurality of Internet Protocol (IP) ports, weak password scanning scripts corresponding to the IP ports and a weak password library corresponding to the weak password scanning scripts;
the scanning unit is used for scanning the IP port from the message queue;
the first searching unit is used for searching the weak password scanning script corresponding to the IP port from the priority queue according to the IP port;
the second searching unit is used for searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script;
the judging unit is used for judging whether a weak password exists in the weak password library or not; if not, the IP port is in a safe state; and if so, acquiring the modified login information in the weak password library.
Further, the message queue is obtained by:
scanning each IP port to obtain communicated IP ports;
acquiring an open IP port from the communicated IP ports;
and forming the message queue according to the opened IP port.
Further, the apparatus further comprises:
a matching frequency acquiring unit for acquiring the matching frequency of the login information in the weak password library;
and the updating unit is used for updating the weight value corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times.
Further, the scanning unit is specifically configured to:
extracting, by a thread, the IP port scanned by a port scanner from the message queue.
In a third aspect, an embodiment of the present invention provides an electronic device, including a memory and a processor, where the memory stores a computer program operable on the processor, and the processor implements the steps of the method when executing the computer program.
In a fourth aspect, embodiments of the invention provide a computer readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the method as described above.
The embodiment of the invention provides a weak password detection method and a device based on an industrial control system, which are applied to the industrial control system and comprise the following steps: acquiring a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, a weak password scanning script corresponding to each IP port and a weak password library corresponding to each weak password scanning script; scanning to an IP port from a message queue; searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port; searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script; judging whether a weak password exists in a weak password library or not; if not, the IP port is in a safe state; if the password exists, the login information in the modified weak password library is obtained, whether the industrial control system is attacked or not can be detected through a weak password scanning method suitable for the industrial control system, the industrial control system can be scanned aiming at multiple protocols simultaneously, and the safety of the industrial control system is improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of a weak password detection method based on an industrial control system according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a weak password detection device based on an industrial control system according to a second embodiment of the present invention.
Icon:
1-an acquisition unit; 2-a scanning unit; 3-a first lookup unit; 4-a second lookup unit; 5-a judging unit.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
For the understanding of the present embodiment, the following detailed description will be given of the embodiment of the present invention.
The first embodiment is as follows:
fig. 1 is a flowchart of a weak password detection method based on an industrial control system according to an embodiment of the present invention.
Referring to fig. 1, the method is applied to an industrial control system, and comprises the following steps:
step S1, obtaining a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, weak password scanning scripts corresponding to the IP ports and weak password libraries corresponding to the weak password scanning scripts;
specifically, different weak password scanning scripts are defined according to different IP ports, and a key and value relationship exists between the IP ports and the weak password scanning scripts, wherein the key is a keyword, and the value is a weight, so that the IP ports are keywords, and the weak password scanning scripts are weights. Each IP port corresponds to a weak password scanning script, and a weak password library corresponding to each weak password scanning script is stored in a priority queue. When the weak port libraries in the priority queue are scanned, the weak port libraries are scanned according to the magnitude sequence of the weight values.
Step S2, scanning the IP port from the message queue;
here, the message queue includes different IP ports, different IP ports can be scanned simultaneously, and when one of the IP ports is scanned, whether a weak password exists is determined according to a correspondence relationship in the priority queue.
Step S3, according to the IP port, finding the weak password scanning script corresponding to the IP port from the priority queue;
step S4, searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script;
step S5, judging whether a weak password exists in the weak password library; if not, go to step S6; if so, go to step S7;
step S6, the IP port is in a safe state;
step S7, obtaining the login information in the modified weak password library.
Here, a weak password is generally a password that is easily guessed by others or broken by a hacking tool, such as a combination of simple numbers or letters such as "123", "abc", etc.
Specifically, after scanning starts, a thread continuously extracts an IP port scanned by a port scanner from a message queue, searches a weak password scanning script corresponding to the IP port from a priority queue according to a corresponding relation, searches a corresponding weak password library according to the weak password scanning script, traverses all combination information formed by user names and passwords from the weak password library, judges whether a weak password exists or not, and if the weak password does not exist, indicates that the IP port is in a safe state and is not cracked; if the weak password exists, the corresponding user name and password can log in the industrial control system, and prompt information for modifying the user name and the password is displayed at the moment, so that the user name and the password are modified. Meanwhile, the weights of the user name and the password in the priority queue are increased, and the common weak password is preferentially scanned through continuous scanning, so that the scanning speed is increased. The port scanner includes, but is not limited to, a massscan.
Further, the message queue is obtained by the following method:
scanning each IP port to obtain a communicated IP port;
acquiring an open IP port from the communicated IP ports;
and forming a message queue according to the opened IP ports.
Specifically, when scanning starts, it is first determined whether the IP port is connectable, that is, whether the IP port is alive, and if the IP port is alive, it indicates that the IP port is connectable for communication, that is, in a connected state; and then judging which ports in the connected IP ports are in an open state, namely acquiring the open IP ports and storing the open IP ports in a message queue. When scanning the IP ports in the message queue, scanning according to the first-in first-out principle.
Further, after step S7, the method further includes the steps of:
step S11, obtaining the matching times of the login information in the weak password library;
and step S12, updating the weight value corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times.
Specifically, when the weak password exists in the weak password library, the login information in the weak password library is modified, wherein the login information is a combination of a user name and a password. Initially, the weight of the weak password scanning script corresponding to the weak password library is 0, and the matching frequency of the login information in the weak password library is also 0. When the weak password is searched from the weak password library, the weak password is the login information. And if the login information is matched for multiple times, updating the weight corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times. For example, initially, the weight is 0, and when the login information is matched once, the weight becomes 0+ 1; when the login information is matched twice, the weight is 1+ 2.
Further, step S2 includes:
and extracting the IP port scanned by the port scanner from the message queue through the thread.
The embodiment of the invention provides a weak password detection method based on an industrial control system, which is applied to the industrial control system and comprises the following steps: acquiring a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, a weak password scanning script corresponding to each IP port and a weak password library corresponding to each weak password scanning script; scanning to an IP port from a message queue; searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port; searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script; judging whether a weak password exists in a weak password library or not; if not, the IP port is in a safe state; if the password exists, the login information in the modified weak password library is obtained, whether the industrial control system is attacked or not can be detected through a weak password scanning method suitable for the industrial control system, the industrial control system can be scanned aiming at multiple protocols simultaneously, and the safety of the industrial control system is improved.
Example two:
fig. 2 is a schematic diagram of a weak password detection device based on an industrial control system according to a second embodiment of the present invention.
Referring to fig. 2, applied to an industrial control system, the device includes:
the system comprises an acquisition unit 1, a priority queue and a control unit, wherein the acquisition unit 1 is used for acquiring the priority queue, and the priority queue comprises a plurality of Internet Protocol (IP) ports, weak password scanning scripts corresponding to the IP ports and weak password libraries corresponding to the weak password scanning scripts;
the scanning unit 2 is used for scanning the IP port from the message queue;
the first searching unit 3 is used for searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port;
the second searching unit 4 is used for searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script;
a judging unit 5 for judging whether a weak password exists in the weak password library; if not, the IP port is in a safe state; if so, the login information in the modified weak password library is obtained.
Further, the message queue is obtained by the following method:
scanning each IP port to obtain a communicated IP port;
acquiring an open IP port from the communicated IP ports;
and forming a message queue according to the opened IP ports.
Further, the apparatus further comprises:
a matching number acquisition unit (not shown) for acquiring the number of matching of the login information in the weak password library;
and the updating unit (not shown) is used for updating the weight value corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times.
Further, the scanning unit 2 is specifically configured to:
and extracting the IP port scanned by the port scanner from the message queue through the thread.
The embodiment of the invention provides a weak password detection device based on an industrial control system, which is applied to the industrial control system and comprises the following components: acquiring a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, a weak password scanning script corresponding to each IP port and a weak password library corresponding to each weak password scanning script; scanning to an IP port from a message queue; searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port; searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script; judging whether a weak password exists in a weak password library or not; if not, the IP port is in a safe state; if the password exists, the login information in the modified weak password library is obtained, whether the industrial control system is attacked or not can be detected through a weak password scanning method suitable for the industrial control system, the industrial control system can be scanned aiming at multiple protocols simultaneously, and the safety of the industrial control system is improved.
The embodiment of the invention also provides electronic equipment, which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the steps of the industrial control system-based weak password detection method provided by the embodiment when executing the computer program.
The embodiment of the present invention further provides a computer readable medium having a non-volatile program code executable by a processor, where the computer readable medium stores a computer program, and the computer program is executed by the processor to perform the steps of the industrial control system-based weak password detection method according to the above embodiment.
The computer program product provided in the embodiment of the present invention includes a computer-readable storage medium storing a program code, where instructions included in the program code may be used to execute the method described in the foregoing method embodiment, and specific implementation may refer to the method embodiment, which is not described herein again.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the apparatus described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In addition, in the description of the embodiments of the present invention, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (8)

1. A weak password detection method based on an industrial control system is characterized by being applied to the industrial control system and comprising the following steps:
acquiring a priority queue, wherein the priority queue comprises a plurality of Internet Protocol (IP) ports, weak password scanning scripts corresponding to the IP ports and weak password libraries corresponding to the weak password scanning scripts;
scanning to the IP port from a message queue;
searching a weak password scanning script corresponding to the IP port from the priority queue according to the IP port;
searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script;
judging whether a weak password exists in the weak password library or not;
if not, the IP port is in a safe state;
if yes, obtaining the modified login information in the weak password library;
after obtaining the modified login information in the weak password library, the method further comprises:
acquiring the matching times of the login information in the weak password library;
and updating the weight value corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times.
2. The industrial control system-based weak password detection method according to claim 1, wherein the message queue is obtained by:
scanning each IP port to obtain communicated IP ports;
acquiring an open IP port from the communicated IP ports;
and forming the message queue according to the opened IP port.
3. The industrial control system-based weak password detection method according to claim 1, wherein the scanning from the message queue to the IP port comprises:
extracting, by a thread, the IP port scanned by a port scanner from the message queue.
4. The weak password detection device based on the industrial control system is characterized by being applied to the industrial control system and comprising:
the system comprises an acquisition unit, a priority queue and a control unit, wherein the acquisition unit is used for acquiring the priority queue, and the priority queue comprises a plurality of Internet Protocol (IP) ports, weak password scanning scripts corresponding to the IP ports and a weak password library corresponding to the weak password scanning scripts;
the scanning unit is used for scanning the IP port from the message queue;
the first searching unit is used for searching the weak password scanning script corresponding to the IP port from the priority queue according to the IP port;
the second searching unit is used for searching a weak password library corresponding to the weak password scanning script according to the weak password scanning script;
the judging unit is used for judging whether a weak password exists in the weak password library or not; if not, the IP port is in a safe state; if yes, obtaining the modified login information in the weak password library; the device further comprises:
a matching frequency acquiring unit for acquiring the matching frequency of the login information in the weak password library;
and the updating unit is used for updating the weight value corresponding to the weak password scanning script according to the weak password scanning script corresponding to the weak password library and the matching times.
5. The industrial control system-based weak password detection device according to claim 4, wherein the message queue is obtained by:
scanning each IP port to obtain communicated IP ports;
acquiring an open IP port from the communicated IP ports;
and forming the message queue according to the opened IP port.
6. The industrial control system-based weak password detection apparatus according to claim 4, wherein the scanning unit is specifically configured to:
extracting, by a thread, the IP port scanned by a port scanner from the message queue.
7. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method of any of claims 1 to 3 when executing the computer program.
8. A computer-readable medium having non-volatile program code executable by a processor, wherein the program code causes the processor to perform the method of any of claims 1 to 3.
CN201910825035.1A 2019-09-02 2019-09-02 Weak password detection method and device based on industrial control system Active CN110519289B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910825035.1A CN110519289B (en) 2019-09-02 2019-09-02 Weak password detection method and device based on industrial control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910825035.1A CN110519289B (en) 2019-09-02 2019-09-02 Weak password detection method and device based on industrial control system

Publications (2)

Publication Number Publication Date
CN110519289A CN110519289A (en) 2019-11-29
CN110519289B true CN110519289B (en) 2022-03-11

Family

ID=68629546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910825035.1A Active CN110519289B (en) 2019-09-02 2019-09-02 Weak password detection method and device based on industrial control system

Country Status (1)

Country Link
CN (1) CN110519289B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105721472A (en) * 2016-02-23 2016-06-29 北京皮尔布莱尼软件有限公司 Port security check method, device and system
CN106685954A (en) * 2016-12-27 2017-05-17 北京神州绿盟信息安全科技股份有限公司 Method and device for scanning plug-in and determining rule scheduling sequence in plug-in
CN106934274A (en) * 2015-12-31 2017-07-07 中国移动通信集团黑龙江有限公司 A kind of weak passwurd detection method, apparatus and system
CN107707553A (en) * 2017-10-18 2018-02-16 北京启明星辰信息安全技术有限公司 Weak passwurd scan method, device and computer-readable storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095737B (en) * 2014-04-16 2019-03-01 阿里巴巴集团控股有限公司 The method and apparatus for detecting weak password
CN106713284A (en) * 2016-12-02 2017-05-24 国网浙江省电力公司电力科学研究院 Industrial control security testing system, and industrial control system
CN106973071A (en) * 2017-05-24 2017-07-21 北京匡恩网络科技有限责任公司 A kind of vulnerability scanning method and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106934274A (en) * 2015-12-31 2017-07-07 中国移动通信集团黑龙江有限公司 A kind of weak passwurd detection method, apparatus and system
CN105721472A (en) * 2016-02-23 2016-06-29 北京皮尔布莱尼软件有限公司 Port security check method, device and system
CN106685954A (en) * 2016-12-27 2017-05-17 北京神州绿盟信息安全科技股份有限公司 Method and device for scanning plug-in and determining rule scheduling sequence in plug-in
CN107707553A (en) * 2017-10-18 2018-02-16 北京启明星辰信息安全技术有限公司 Weak passwurd scan method, device and computer-readable storage medium

Also Published As

Publication number Publication date
CN110519289A (en) 2019-11-29

Similar Documents

Publication Publication Date Title
CN111147504B (en) Threat detection method, apparatus, device and storage medium
US7152244B2 (en) Techniques for detecting and preventing unintentional disclosures of sensitive data
CN110730175B (en) Botnet detection method and detection system based on threat information
CN110581827B (en) Detection method and device for brute force cracking
Wu et al. MobiFish: A lightweight anti-phishing scheme for mobile phones
US9363286B2 (en) System and methods for detection of fraudulent online transactions
Vetterl et al. Bitter harvest: Systematically fingerprinting low-and medium-interaction honeypots at internet scale
US9602525B2 (en) Classification of malware generated domain names
Althobaiti et al. A review of human-and computer-facing url phishing features
CN109167781B (en) Network attack chain identification method and device based on dynamic correlation analysis
WO2018076697A1 (en) Method and apparatus for detecting zombie feature
CN108154031B (en) Method, device, storage medium and electronic device for identifying disguised application
CN107070845B (en) System and method for detecting phishing scripts
Zaimi et al. Survey paper: Taxonomy of website anti-phishing solutions
JP2012037948A (en) Method for changing device setting
CN105939314A (en) Network protection method and device
CN110519289B (en) Weak password detection method and device based on industrial control system
CN112351002B (en) Message detection method, device and equipment
CN110865774A (en) Information security detection method and device for printing equipment
CN103096321A (en) Method for detecting malicious server and device for the same
CN112333180A (en) APT attack detection method and system based on data mining
US20230275912A1 (en) Graph-based analysis of security incidents
CN113852625B (en) Weak password monitoring method, device, equipment and storage medium
CN109660499A (en) It attacks hold-up interception method and device, calculate equipment and storage medium
CN110830518B (en) Traceability analysis method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant