CN111385272A - Weak password detection method and device - Google Patents

Weak password detection method and device Download PDF

Info

Publication number
CN111385272A
CN111385272A CN201811642809.9A CN201811642809A CN111385272A CN 111385272 A CN111385272 A CN 111385272A CN 201811642809 A CN201811642809 A CN 201811642809A CN 111385272 A CN111385272 A CN 111385272A
Authority
CN
China
Prior art keywords
data request
login
web
web system
requesting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811642809.9A
Other languages
Chinese (zh)
Other versions
CN111385272B (en
Inventor
张鑫
高雪峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201811642809.9A priority Critical patent/CN111385272B/en
Publication of CN111385272A publication Critical patent/CN111385272A/en
Application granted granted Critical
Publication of CN111385272B publication Critical patent/CN111385272B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a method and a device for detecting a weak password, relates to the technical field of network security, and can solve the problem that whether a user logs in a web system and uses the weak password cannot be detected by the conventional third-party system. The method mainly comprises the following steps: acquiring a data request sent by a terminal; identifying whether the data request is used for requesting to log in the web system or not by utilizing a pre-established web login identification model, wherein the web login identification model is an artificial intelligence model obtained by training according to login characteristics in the known data request requesting to log in the web system; if the data request is used for requesting to log in a web system, judging whether the terminal successfully logs in the web system according to a data response corresponding to the data request; if the login is successful, judging whether the password in the data request is a weak password or not according to a preset weak password rule. The method and the device are mainly suitable for the scene of identifying the weak password of the web system.

Description

Weak password detection method and device
Technical Field
The invention relates to the technical field of network security, in particular to a weak password detection method and device.
Background
A weak password is one that is easily guessed and cracked by a person, such as 123456, abcdef, and so on, which are common. Weak passwords have long been an item that must be checked for various security checks and risk assessments, and have a high hazard level. However, in the case that some intranets deployed by enterprises communicate using HTTP (HyperText Transfer Protocol) with relatively poor security, some users still set weak passwords for convenience of input and memory when using OA (Office Automation), mail and other web systems, and the service end of these web systems may not force the users to set non-weak passwords, so that once a weak password is cracked, great risk is brought to the enterprises. In addition, although a third-party system such as a management platform can monitor the behaviors of each device in the local area network, the third-party system can only monitor whether each user is networked, logs in which software, and whether a fault occurs, and cannot accurately know whether the user uses a weak password when logging in the web system.
Disclosure of Invention
In view of this, the present invention provides a method and an apparatus for detecting a weak password, which aim to solve the problem that the existing third-party system cannot detect whether the user logs in the web system and uses the weak password.
The purpose of the invention is realized by adopting the following technical scheme:
in a first aspect, the present invention provides a method for detecting a weak password, the method comprising:
acquiring a data request sent by a terminal;
identifying whether the data request is used for requesting to log in the web system or not by utilizing a pre-established web login identification model, wherein the web login identification model is an artificial intelligence model obtained by training according to login characteristics in the known data request requesting to log in the web system;
if the data request is used for requesting to log in a web system, judging whether the terminal successfully logs in the web system according to a data response corresponding to the data request;
if the login is successful, judging whether the password in the data request is a weak password or not according to a preset weak password rule.
Optionally, the identifying whether the data request is for requesting to log in the web system by using a pre-established web log-in identification model includes:
extracting features to be detected from the data request;
importing the features to be detected into the web login identification model, and classifying the features to be detected through the web login identification model;
and determining whether the data request is used for requesting to log in the web system according to the classification result.
Optionally, the determining, according to the data response corresponding to the data request, whether the terminal successfully logs in the web system includes:
matching the data response corresponding to the data request with a preset login success rule;
and if the matching is successful, determining that the terminal successfully logs in the web system.
Optionally, matching the data response corresponding to the data request with a preset login success rule includes:
judging whether the data response corresponding to the data request contains Cookie for representing successful login;
and if the Cookie is contained, determining that the data response is successfully matched with the preset login success rule.
Optionally, the login feature comprises any one or a combination of:
a uniform resource locator URL, a username, and a password.
In a second aspect, the present invention provides an apparatus for detecting a weak password, the apparatus comprising:
the acquisition unit is used for acquiring a data request sent by a terminal;
the identification unit is used for identifying whether the data request is used for requesting to log in the web system or not by utilizing a pre-established web login identification model, and the web login identification model is an artificial intelligence model obtained by training according to login characteristics in the known data request requesting to log in the web system;
the first judgment unit is used for judging whether the terminal successfully logs in the web system or not according to the data response corresponding to the data request when the data request is used for requesting to log in the web system;
and the second judgment unit is used for judging whether the password in the data request is a weak password or not according to a preset weak password rule when the login is successful.
Optionally, the identification unit includes:
the extraction module is used for extracting the features to be detected from the data request;
the classification module is used for importing the features to be detected into the web login identification model and classifying the features to be detected through the web login identification model;
and the first determining module is used for determining whether the data request is used for requesting to log in the web system according to the classification result.
Optionally, the first determining unit includes:
the matching module is used for matching the data response corresponding to the data request with a preset login success rule;
and the second determining module is used for determining that the terminal successfully logs in the web system when the matching is successful.
Optionally, the matching module is configured to determine whether a data response corresponding to the data request contains a Cookie used for characterizing successful login; and if the Cookie is contained, determining that the data response is successfully matched with the preset login success rule.
Optionally, the login feature comprises any one or a combination of:
a uniform resource locator URL, a username, and a password.
In a third aspect, the present invention provides a storage medium storing a plurality of instructions adapted to be loaded by a processor and to perform the method for weak password detection according to the first aspect.
In a fourth aspect, the present invention provides an electronic device comprising a storage medium and a processor;
the processor is suitable for realizing instructions;
the storage medium adapted to store a plurality of instructions;
the instructions are adapted to be loaded by the processor and to perform the method of weak password detection as described in the first aspect.
By means of the technical scheme, the method and the device for detecting the weak password provided by the invention can firstly acquire the data request sent by the terminal, then identify whether the data request is used for requesting to log in the web system or not by utilizing the artificial intelligence model web login identification model obtained by training according to the login characteristics in the data request which is known to request to log in the web system, judge whether the terminal successfully logs in the web system or not according to the data response corresponding to the data request when the data request is used for requesting to log in the web system, and judge whether the password in the data request is the weak password or not according to the preset weak password rule when the login is successful. Therefore, the third party of the invention can identify whether the weak password is used when the user logs in the web system, and can utilize the web login identification model with the machine self-learning function to self-learn the login behavior of the known request to log in the web system when identifying whether the data request is used for requesting to log in the web system, and identify the login behaviors except the known login behavior, thereby identifying more weak passwords.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart illustrating a method for detecting a weak password according to an embodiment of the present invention;
FIG. 2 is a block diagram illustrating an apparatus for detecting a weak password according to an embodiment of the present invention;
fig. 3 is a block diagram illustrating another apparatus for detecting a weak password according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a method for detecting a weak password, which mainly comprises the following steps of:
101. and acquiring a data request sent by the terminal.
When a user logs in a web system through a terminal, login information such as an account number and a password is input, and after the terminal receives the login information, a data request for requesting to log in the web system is generated according to the login information and is sent to a server of the web system, so that the server can verify the login information in the data request and make a corresponding response. The embodiment of the invention is used as a third party of the terminal and the server, and can acquire the data request and the data response by adopting the modes of network sniffing, network port mirroring and the like.
The terminal may be various electronic devices having a display function and supporting an interactive function, including but not limited to a smart phone, a tablet computer, a personal computer, a desktop computer, and the like.
102. And identifying whether the data request is used for requesting to log in the web system by utilizing a pre-established web login identification model.
The web login identification model is an artificial intelligence model obtained by training according to login characteristics in a known data request for requesting to login the web system. The login features include any one or a combination of: URL (Uniform Resource Locator), username, and password. Since the current common method for data identification is rule matching, the embodiment of the present invention may also adopt a rule matching manner when identifying whether a data request is used for requesting to log in a web system. However, the set rules are only deterministic descriptions of known login features, so the rule matching method can only identify the features identical to the known login features, but cannot identify other features. When the artificial intelligence technology trains the artificial intelligence model, the method is not limited to the deterministic description of the known login features, and features similar to the known login features can be mined from the known login features. Thus, the artificial intelligence model can identify more login features.
103. And if the data request is used for requesting to log in a web system, judging whether the terminal successfully logs in the web system according to the data response corresponding to the data request.
When a data request is used to request login to a web system, even if the password contained in the data request is a weak password, the corresponding web system cannot necessarily be successfully logged in because it may not be a password registered by the user. Therefore, it makes no sense to directly verify whether the password is a weak password after determining that the data request is for requesting to log in to the web system, and it makes sense to verify whether the password is a weak password after determining that the log in to the web system is successful. After the login information in the data request is verified, the server gives a corresponding data response for representing successful login to the terminal, so that whether the terminal successfully logs in the web system can be judged according to the data response corresponding to the data request.
104. If the login is successful, judging whether the password in the data request is a weak password or not according to a preset weak password rule.
After the terminal successfully logs in the web server, in order to improve the account security, weak password detection can be performed on the password used by successful login, so that when the password used by the terminal is found to be a weak password, the terminal can prompt the corresponding user to modify the password in time. When the password is judged to be a weak password, the password can be matched with a preset weak password rule, if the password is successfully matched, the password is determined to be a weak password, and if the password is not successfully matched, the secret is determined not to be the weak password. For example, it may be determined whether the password is a continuous plurality of digits; if yes, determining that the password is a weak password; otherwise, it is not a weak password. Further, when it is determined that the login has failed, there is no meaning whether or not the password in the data request is a weak password, so in this case, there is no need to perform any weak password identification operation on the password in the data request.
The method for detecting the weak password provided by the embodiment of the invention can firstly acquire the data request sent by the terminal, then utilizes the artificial intelligence model web login identification model obtained by training according to the login characteristics in the data request of the known request login web system to identify whether the data request is used for requesting to login the web system, judges whether the terminal successfully logs in the web system according to the data response corresponding to the data request when the data request is used for requesting to login the web system, and judges whether the password in the data request is the weak password according to the preset weak password rule when the login is successful. Therefore, the third party in the embodiment of the invention can identify whether the weak password is used when the user logs in the web system, and can self-learn the login behavior of the known web system requesting to log in by using the web login identification model with the machine self-learning function when identifying whether the data request is used for requesting to log in the web system, and identify the login behavior except the known login behavior, thereby identifying more weak passwords.
In another embodiment of the present invention, an alternative implementation of the above step 102 is further described, the implementation comprising: extracting features to be detected from the data request; importing the features to be detected into the web login identification model, and classifying the features to be detected through the web login identification model; and determining whether the data request is used for requesting to log in the web system according to the classification result.
The characteristics to be detected comprise URL, user name, password and the like. After the features to be detected are input into the web login identification model, the login identification model can identify whether the URL is the URL of the web system or not; if yes, whether the to-be-detected features contain login information such as a user name and a password for requesting to login the web system can be continuously identified, and if yes, the data request is determined to be used for requesting to login the web system.
In another embodiment of the present invention, an alternative implementation of step 103 is further described, which includes: matching the data response corresponding to the data request with a preset login success rule; if the matching is successful, determining that the terminal successfully logs in the web system; and if the matching fails, determining that the terminal fails to log in the web system.
Specifically, whether a data response corresponding to the data request contains a Cookie for representing successful login is judged; if the Cookie is contained, determining that the data response is successfully matched with the preset login success rule; and if the Cookie does not exist, determining that the data response fails to be matched with the preset login success rule.
The Cookie used for representing successful login may be a Cookie directly received or a Cookie received after the terminal page is skipped.
Further, according to the above method embodiment, another embodiment of the present invention further provides a device for detecting a weak password, as shown in fig. 2, the device mainly includes: an acquisition unit 21, a recognition unit 22, a first judgment unit 23 and a second judgment unit 24. Wherein,
an obtaining unit 21, configured to obtain a data request sent by a terminal;
the identification unit 22 is configured to identify whether the data request is used for requesting to log in the web system by using a pre-established web login identification model, where the web login identification model is an artificial intelligence model obtained by training according to login features in the data request for requesting to log in the web system;
a first judging unit 23, configured to, when the data request is used to request to log in a web system, judge, according to a data response corresponding to the data request, whether the terminal successfully logs in the web system;
and the second judging unit 24 is configured to, when the login is successful, judge whether the password in the data request is a weak password according to a preset weak password rule.
Optionally, as shown in fig. 3, the identification unit 22 includes:
an extracting module 221, configured to extract features to be detected from the data request;
a classification module 222, configured to import the feature to be detected into the web login identification model, and classify the feature to be detected through the web login identification model;
a first determining module 223, configured to determine whether the data request is for requesting to log in the web system according to the classification result.
Optionally, as shown in fig. 3, the first judging unit 23 includes:
a matching module 231, configured to match a data response corresponding to the data request with a preset login success rule;
and a second determining module 232, configured to determine that the terminal successfully logs in the web system when the matching is successful.
Optionally, the matching module 231 is configured to determine whether a data response corresponding to the data request contains a Cookie used for characterizing successful login; and if the Cookie is contained, determining that the data response is successfully matched with the preset login success rule.
Optionally, the login feature comprises any one or a combination of:
a uniform resource locator URL, a username, and a password.
The weak password detection device provided by the embodiment of the invention can acquire a data request sent by a terminal, then identify whether the data request is used for requesting to log in a web system by using an artificial intelligence model web login identification model obtained by training according to login characteristics in the data request which is known to request to log in the web system, judge whether the terminal successfully logs in the web system according to data response corresponding to the data request when the data request is used for requesting to log in the web system, and judge whether a password in the data request is a weak password according to a preset weak password rule when the login is successful. Therefore, the third party in the embodiment of the invention can identify whether the weak password is used when the user logs in the web system, and can self-learn the login behavior of the known web system requesting to log in by using the web login identification model with the machine self-learning function when identifying whether the data request is used for requesting to log in the web system, and identify the login behavior except the known login behavior, thereby identifying more weak passwords.
Further, according to the above method embodiment, another embodiment of the present invention further provides a storage medium storing a plurality of instructions, the instructions being adapted to be loaded by a processor and to execute the weak password detection method as described above.
The storage medium may include a volatile storage medium in a computer readable medium, a random access storage medium (RAM) and/or a non-volatile memory, such as a Read Only Memory (ROM) or a flash memory (flash RAM), and the storage medium includes at least one memory chip.
The instruction stored in the storage medium provided by the embodiment of the invention can acquire a data request sent by a terminal, then identify whether the data request is used for requesting to log in the web system by using an artificial intelligence model web login identification model obtained by training according to login characteristics in the data request which is known to request to log in the web system, judge whether the terminal successfully logs in the web system according to data response corresponding to the data request when the data request is used for requesting to log in the web system, and judge whether a password in the data request is a weak password according to a preset weak password rule when the login is successful. Therefore, the third party in the embodiment of the invention can identify whether the weak password is used when the user logs in the web system, and can self-learn the login behavior of the known web system requesting to log in by using the web login identification model with the machine self-learning function when identifying whether the data request is used for requesting to log in the web system, and identify the login behavior except the known login behavior, thereby identifying more weak passwords.
Further, according to the above method embodiment, another embodiment of the present invention also provides an electronic device, which includes a storage medium and a processor;
the processor is suitable for realizing instructions;
the storage medium adapted to store a plurality of instructions;
the instructions are adapted to be loaded by the processor and to perform the weak password detection method as described above.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel may set one or more parameters to identify whether the user logged into the web system using a weak password by adjusting the kernel parameters.
The electronic equipment provided by the embodiment of the invention can acquire a data request sent by a terminal, then identify whether the data request is used for requesting to log in the web system by using an artificial intelligence model web login identification model obtained by training according to login characteristics in the data request which is known to request to log in the web system, judge whether the terminal successfully logs in the web system according to data response corresponding to the data request when the data request is used for requesting to log in the web system, and judge whether a password in the data request is a weak password according to a preset weak password rule when the login is successful. Therefore, the third party in the embodiment of the invention can identify whether the weak password is used when the user logs in the web system, and can self-learn the login behavior of the known web system requesting to log in by using the web login identification model with the machine self-learning function when identifying whether the data request is used for requesting to log in the web system, and identify the login behavior except the known login behavior, thereby identifying more weak passwords.
The present application further provides a computer program product adapted to perform program code for initializing the following method steps when executed on a third party device:
acquiring a data request sent by a terminal;
identifying whether the data request is used for requesting to log in the web system or not by utilizing a pre-established web login identification model, wherein the web login identification model is an artificial intelligence model obtained by training according to login characteristics in the known data request requesting to log in the web system;
if the data request is used for requesting to log in a web system, judging whether the terminal successfully logs in the web system according to a data response corresponding to the data request;
if the login is successful, judging whether the password in the data request is a weak password or not according to a preset weak password rule.
The embodiment of the invention also discloses:
a1, a weak password detection method, the method comprising:
acquiring a data request sent by a terminal;
identifying whether the data request is used for requesting to log in the web system or not by utilizing a pre-established web login identification model, wherein the web login identification model is an artificial intelligence model obtained by training according to login characteristics in the known data request requesting to log in the web system;
if the data request is used for requesting to log in a web system, judging whether the terminal successfully logs in the web system according to a data response corresponding to the data request;
if the login is successful, judging whether the password in the data request is a weak password or not according to a preset weak password rule.
A2, according to the method of A1, the method for identifying whether the data request is for requesting to log in to a web system using a pre-established web log identification model includes:
extracting features to be detected from the data request;
importing the features to be detected into the web login identification model, and classifying the features to be detected through the web login identification model;
and determining whether the data request is used for requesting to log in the web system according to the classification result.
A3, according to the method in A1, the step of judging whether the terminal successfully logs in the web system according to the data response corresponding to the data request comprises the steps of:
matching the data response corresponding to the data request with a preset login success rule;
and if the matching is successful, determining that the terminal successfully logs in the web system.
A4, according to the method of A3, the matching of the data response corresponding to the data request with a preset login success rule includes:
judging whether the data response corresponding to the data request contains Cookie for representing successful login;
and if the Cookie is contained, determining that the data response is successfully matched with the preset login success rule.
A5, the method of any one of A1-A4, the login features comprising any one or more of the following in combination:
a uniform resource locator URL, a username, and a password.
B6, a weak password detection apparatus, the apparatus comprising:
the acquisition unit is used for acquiring a data request sent by a terminal;
the identification unit is used for identifying whether the data request is used for requesting to log in the web system or not by utilizing a pre-established web login identification model, and the web login identification model is an artificial intelligence model obtained by training according to login characteristics in the known data request requesting to log in the web system;
the first judgment unit is used for judging whether the terminal successfully logs in the web system or not according to the data response corresponding to the data request when the data request is used for requesting to log in the web system;
and the second judgment unit is used for judging whether the password in the data request is a weak password or not according to a preset weak password rule when the login is successful.
B7, the apparatus according to B6, the identification unit comprising:
the extraction module is used for extracting the features to be detected from the data request;
the classification module is used for importing the features to be detected into the web login identification model and classifying the features to be detected through the web login identification model;
and the first determining module is used for determining whether the data request is used for requesting to log in the web system according to the classification result.
B8, the device according to B6, the first judging unit includes:
the matching module is used for matching the data response corresponding to the data request with a preset login success rule;
and the second determining module is used for determining that the terminal successfully logs in the web system when the matching is successful.
B9, according to the device of B8, the matching module is used for judging whether the data response corresponding to the data request contains Cookie for representing successful login; and if the Cookie is contained, determining that the data response is successfully matched with the preset login success rule.
B10, the apparatus according to any one of B6-B9, the login features comprising any one or combination of:
a uniform resource locator URL, a username, and a password.
C11, a storage medium storing instructions adapted to be loaded by a processor and to perform the method of weak password detection as described in any of a1-a 5.
D12, an electronic device comprising a storage medium and a processor;
the processor is suitable for realizing instructions;
the storage medium adapted to store a plurality of instructions;
the instructions are adapted to be loaded by the processor and to perform a method of weak password detection as described in any of a1-a 5.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It will be appreciated that the relevant features of the method and apparatus described above are referred to one another. In addition, "first", "second", and the like in the above embodiments are for distinguishing the embodiments, and do not represent merits of the embodiments.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components of the weak password detection method and apparatus according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

Claims (10)

1. A method for detecting a weak password, the method comprising:
acquiring a data request sent by a terminal;
identifying whether the data request is used for requesting to log in the web system or not by utilizing a pre-established web login identification model, wherein the web login identification model is an artificial intelligence model obtained by training according to login characteristics in the known data request requesting to log in the web system;
if the data request is used for requesting to log in a web system, judging whether the terminal successfully logs in the web system according to a data response corresponding to the data request;
if the login is successful, judging whether the password in the data request is a weak password or not according to a preset weak password rule.
2. The method of claim 1, wherein identifying whether the data request is for requesting login to a web system using a pre-established web login identification model comprises:
extracting features to be detected from the data request;
importing the features to be detected into the web login identification model, and classifying the features to be detected through the web login identification model;
and determining whether the data request is used for requesting to log in the web system according to the classification result.
3. The method of claim 1, wherein determining whether the terminal successfully logs in the web system according to the data response corresponding to the data request comprises:
matching the data response corresponding to the data request with a preset login success rule;
and if the matching is successful, determining that the terminal successfully logs in the web system.
4. The method of claim 3, wherein matching the data response corresponding to the data request with a preset login success rule comprises:
judging whether the data response corresponding to the data request contains Cookie for representing successful login;
and if the Cookie is contained, determining that the data response is successfully matched with the preset login success rule.
5. The method according to any of claims 1-4, wherein the login features comprise any one or a combination of:
a uniform resource locator URL, a username, and a password.
6. An apparatus for detecting a weak password, the apparatus comprising:
the acquisition unit is used for acquiring a data request sent by a terminal;
the identification unit is used for identifying whether the data request is used for requesting to log in the web system or not by utilizing a pre-established web login identification model, and the web login identification model is an artificial intelligence model obtained by training according to login characteristics in the known data request requesting to log in the web system;
the first judgment unit is used for judging whether the terminal successfully logs in the web system or not according to the data response corresponding to the data request when the data request is used for requesting to log in the web system;
and the second judgment unit is used for judging whether the password in the data request is a weak password or not according to a preset weak password rule when the login is successful.
7. The apparatus of claim 6, wherein the identification unit comprises:
the extraction module is used for extracting the features to be detected from the data request;
the classification module is used for importing the features to be detected into the web login identification model and classifying the features to be detected through the web login identification model;
and the first determining module is used for determining whether the data request is used for requesting to log in the web system according to the classification result.
8. The apparatus according to claim 6, wherein the first judging unit includes:
the matching module is used for matching the data response corresponding to the data request with a preset login success rule;
and the second determining module is used for determining that the terminal successfully logs in the web system when the matching is successful.
9. A storage medium storing a plurality of instructions adapted to be loaded by a processor and to perform a method of weak password detection as claimed in any one of claims 1 to 5.
10. An electronic device, comprising a storage medium and a processor;
the processor is suitable for realizing instructions;
the storage medium adapted to store a plurality of instructions;
the instructions are adapted to be loaded by the processor and to perform a method of detecting a weak password as claimed in any one of claims 1 to 5.
CN201811642809.9A 2018-12-29 2018-12-29 Weak password detection method and device Active CN111385272B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811642809.9A CN111385272B (en) 2018-12-29 2018-12-29 Weak password detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811642809.9A CN111385272B (en) 2018-12-29 2018-12-29 Weak password detection method and device

Publications (2)

Publication Number Publication Date
CN111385272A true CN111385272A (en) 2020-07-07
CN111385272B CN111385272B (en) 2024-06-21

Family

ID=71222311

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811642809.9A Active CN111385272B (en) 2018-12-29 2018-12-29 Weak password detection method and device

Country Status (1)

Country Link
CN (1) CN111385272B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112084487A (en) * 2020-09-10 2020-12-15 北京天融信网络安全技术有限公司 Weak password analysis method and device, storage medium and electronic equipment
CN112613029A (en) * 2021-01-06 2021-04-06 深信服科技股份有限公司 Weak password detection method and device, computer storage medium and equipment
CN114006773A (en) * 2021-12-31 2022-02-01 北京微步在线科技有限公司 Weak password judgment method, device, equipment and storage medium

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090055910A1 (en) * 2007-08-20 2009-02-26 Lee Mark C System and methods for weak authentication data reinforcement
US20130055379A1 (en) * 2011-08-23 2013-02-28 Research In Motion Limited System, device and method for authentication
US20130097697A1 (en) * 2011-10-14 2013-04-18 Microsoft Corporation Security Primitives Employing Hard Artificial Intelligence Problems
CN103701805A (en) * 2013-12-26 2014-04-02 山石网科通信技术有限公司 Method and device for detecting weak password in network
CN104717219A (en) * 2015-03-20 2015-06-17 百度在线网络技术(北京)有限公司 Vocal print login method and device based on artificial intelligence
CN105656887A (en) * 2015-12-30 2016-06-08 百度在线网络技术(北京)有限公司 Artificial intelligence-based voiceprint authentication method and device
CN105871825A (en) * 2016-03-28 2016-08-17 深圳市双赢伟业科技股份有限公司 Method and system for security detection of router
CN106790149A (en) * 2016-12-28 2017-05-31 北京安天网络安全技术有限公司 The method and system that a kind of defence IoT equipment is invaded
CN106934274A (en) * 2015-12-31 2017-07-07 中国移动通信集团黑龙江有限公司 A kind of weak passwurd detection method, apparatus and system
CN107196899A (en) * 2017-03-21 2017-09-22 北京神州泰岳软件股份有限公司 Equipment weak passwurd management method and device
CN107330331A (en) * 2016-04-29 2017-11-07 阿里巴巴集团控股有限公司 There are the methods, devices and systems of the system of leak in identification
CN107426231A (en) * 2017-08-03 2017-12-01 北京奇安信科技有限公司 A kind of method and device for identifying user behavior
CN107465642A (en) * 2016-06-02 2017-12-12 百度在线网络技术(北京)有限公司 A kind of method and device for judging account abnormal login
US20180041537A1 (en) * 2016-08-02 2018-02-08 Sophos Limited Identifying and remediating phishing security weaknesses
CN107707553A (en) * 2017-10-18 2018-02-16 北京启明星辰信息安全技术有限公司 Weak passwurd scan method, device and computer-readable storage medium
CN107846415A (en) * 2017-12-11 2018-03-27 北京奇虎科技有限公司 A kind of server log method and device
CN108053247A (en) * 2017-12-15 2018-05-18 北京知道创宇信息技术有限公司 A kind of false amount identification model generation method, false amount recognition methods and computing device
CN108768824A (en) * 2018-05-15 2018-11-06 腾讯科技(深圳)有限公司 Information processing method and device
CN108763920A (en) * 2018-05-23 2018-11-06 四川大学 A kind of password strength assessment model based on integrated study
CN108809895A (en) * 2017-04-27 2018-11-13 腾讯科技(深圳)有限公司 The detection method and device of weak passwurd
CN108881138A (en) * 2017-10-26 2018-11-23 新华三信息安全技术有限公司 A kind of web-page requests recognition methods and device

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090055910A1 (en) * 2007-08-20 2009-02-26 Lee Mark C System and methods for weak authentication data reinforcement
US20130055379A1 (en) * 2011-08-23 2013-02-28 Research In Motion Limited System, device and method for authentication
US20130097697A1 (en) * 2011-10-14 2013-04-18 Microsoft Corporation Security Primitives Employing Hard Artificial Intelligence Problems
CN103701805A (en) * 2013-12-26 2014-04-02 山石网科通信技术有限公司 Method and device for detecting weak password in network
CN104717219A (en) * 2015-03-20 2015-06-17 百度在线网络技术(北京)有限公司 Vocal print login method and device based on artificial intelligence
CN105656887A (en) * 2015-12-30 2016-06-08 百度在线网络技术(北京)有限公司 Artificial intelligence-based voiceprint authentication method and device
CN106934274A (en) * 2015-12-31 2017-07-07 中国移动通信集团黑龙江有限公司 A kind of weak passwurd detection method, apparatus and system
CN105871825A (en) * 2016-03-28 2016-08-17 深圳市双赢伟业科技股份有限公司 Method and system for security detection of router
CN107330331A (en) * 2016-04-29 2017-11-07 阿里巴巴集团控股有限公司 There are the methods, devices and systems of the system of leak in identification
CN107465642A (en) * 2016-06-02 2017-12-12 百度在线网络技术(北京)有限公司 A kind of method and device for judging account abnormal login
US20180041537A1 (en) * 2016-08-02 2018-02-08 Sophos Limited Identifying and remediating phishing security weaknesses
CN106790149A (en) * 2016-12-28 2017-05-31 北京安天网络安全技术有限公司 The method and system that a kind of defence IoT equipment is invaded
CN107196899A (en) * 2017-03-21 2017-09-22 北京神州泰岳软件股份有限公司 Equipment weak passwurd management method and device
CN108809895A (en) * 2017-04-27 2018-11-13 腾讯科技(深圳)有限公司 The detection method and device of weak passwurd
CN107426231A (en) * 2017-08-03 2017-12-01 北京奇安信科技有限公司 A kind of method and device for identifying user behavior
CN107707553A (en) * 2017-10-18 2018-02-16 北京启明星辰信息安全技术有限公司 Weak passwurd scan method, device and computer-readable storage medium
CN108881138A (en) * 2017-10-26 2018-11-23 新华三信息安全技术有限公司 A kind of web-page requests recognition methods and device
CN107846415A (en) * 2017-12-11 2018-03-27 北京奇虎科技有限公司 A kind of server log method and device
CN108053247A (en) * 2017-12-15 2018-05-18 北京知道创宇信息技术有限公司 A kind of false amount identification model generation method, false amount recognition methods and computing device
CN108768824A (en) * 2018-05-15 2018-11-06 腾讯科技(深圳)有限公司 Information processing method and device
CN108763920A (en) * 2018-05-23 2018-11-06 四川大学 A kind of password strength assessment model based on integrated study

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
SHUO ZHAI等: ""Design and implementation of password-based identity authentication system"", 《2010 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATION AND SYSTEM MODELING (ICCASM 2010)》 *
何金栋: ""Web中间件弱口令检测系统的设计和实现"", 《通讯世界》 *
张滨: ""人工智能在安全领域的应用"", 《电信工程技术与标准化》, 15 December 2018 (2018-12-15) *
时宗胜;: "人工智能技术在移动互联网中的应用研究", 数字通信世界, no. 10, 1 October 2017 (2017-10-01) *
黄志威;: "改进的AdaBoost检测算法在身份识别中的应用", 科技通报, no. 10, 31 October 2015 (2015-10-31) *
黎源等: ""集中弱口令检查系统的分析与设计"", 《中小企业管理与科技(上旬刊)》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112084487A (en) * 2020-09-10 2020-12-15 北京天融信网络安全技术有限公司 Weak password analysis method and device, storage medium and electronic equipment
CN112613029A (en) * 2021-01-06 2021-04-06 深信服科技股份有限公司 Weak password detection method and device, computer storage medium and equipment
CN114006773A (en) * 2021-12-31 2022-02-01 北京微步在线科技有限公司 Weak password judgment method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN111385272B (en) 2024-06-21

Similar Documents

Publication Publication Date Title
CN110399925B (en) Account risk identification method, device and storage medium
CN108683666B (en) Webpage identification method and device
CN109376078B (en) Mobile application testing method, terminal equipment and medium
CN104468249B (en) Account abnormity detection method and device
JP6622316B2 (en) System and method for user attribute information confirmation, and client and server using the same
CN111401416B (en) Abnormal website identification method and device and abnormal countermeasure identification method
CN106469261B (en) Identity verification method and device
US9667613B1 (en) Detecting mobile device emulation
CN109167797A (en) Analysis of Network Attack method and apparatus
CN106961419A (en) WebShell detection methods, apparatus and system
CN107135195A (en) The detection method and device of abnormal user account
CN111385272B (en) Weak password detection method and device
CN102710770A (en) Identification method for network access equipment and implementation system for identification method
US20140096242A1 (en) Method, system and client terminal for detection of phishing websites
CN104901924B (en) Internet account verification method and device
CN111385270A (en) WAF-based network attack detection method and device
CN108306886B (en) Identity authentication method, device and storage medium
CN106453266A (en) Abnormal networking request detection method and apparatus
CN109698809A (en) A kind of recognition methods of account abnormal login and device
CN106304070B (en) Network automatic connection method and device
CN104184709A (en) Verification method, device, server, service data center and system
CN107241292B (en) Vulnerability detection method and device
CN109257321A (en) Safe login method and device
CN105162604A (en) Feature image identification based verification method and system, and verification server
CN107332804A (en) The detection method and device of webpage leak

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant