Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Port detection method and apparatus for application

A port detection and port technology, which is applied in computer security devices, instruments, computing, etc., can solve the problem of low detection efficiency of fixed ports, and achieve the effect of solving low detection efficiency

Active Publication Date: 2017-07-04
ALIBABA GRP HLDG LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In the embodiment of the present application, the port information monitored by the application to be tested is used to perform repeated detection, and when there is the same correspondence between the port and the application in the execution result of the repeated detection, it is determined that the port monitored by the application to be tested is a fixed port The method achieves the purpose of automatically detecting whether the port used by the application is a fixed port, and then solves the current technical problem that the detection efficiency of the fixed port is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Port detection method and apparatus for application
  • Port detection method and apparatus for application
  • Port detection method and apparatus for application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] According to the embodiment of the present application, a method embodiment of an applied port detection method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions , and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0021] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structure block diagram of a computer terminal according to an applied port detection method in the prior art. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processors 102 (the processo...

Embodiment 2

[0078] According to an embodiment of the present application, a device for implementing the port detection method of the above application is also provided, and the device can run on figure 1 computer terminal, however, is not limited to figure 1 The structure of the computer terminal shown. Such as Figure 5 As shown, the device includes:

[0079] The control module 50 is coupled and connected with the processing module 52, and is used to control the repeated operation of the application under test for multiple times, and obtain the corresponding relationship between the port information monitored by the application under test and the application under test when the application under test is repeatedly run repeatedly, and obtain multiple correspondences. In an optional embodiment, the above-mentioned number of repeated running of the application to be tested may be 2, that is, repeated twice. Optionally, the following steps A to C may be repeated multiple times to obtain ...

Embodiment 3

[0087] Embodiments of the present application may provide a computer terminal, and the computer terminal may be any computer terminal device in a group of computer terminals. Optionally, in this embodiment, the foregoing computer terminal may also be replaced with a terminal device such as a mobile terminal.

[0088] Optionally, in this embodiment, the foregoing computer terminal may be located in at least one network device among multiple network devices of the computer network.

[0089] In this embodiment, the above-mentioned computer terminal can execute the program code of the following steps in the application port detection method: obtain the corresponding relationship between the port information monitored by the above-mentioned application under test and the above-mentioned application under test when the application under test is repeatedly run , to obtain a plurality of corresponding relationships; judging whether there is the same corresponding relationship in the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a port detection method and apparatus for an application. The method comprises the steps of obtaining a plurality of corresponding relationships between port information monitored by a to-be-detected application and the to-be-detected application when the to-be-detected application runs repeatedly for multiple times; and judging whether the same corresponding relationships exist in the corresponding relationships, and when the same corresponding relationships exist, determining that a fixed port exists in ports monitored by the to-be-detected application.

Description

technical field [0001] The present invention relates to the field of application security detection, in particular, to an application port detection method and device. Background technique [0002] At present, some applications need to monitor ports locally. If the monitored port is fixed (the port is called a fixed port), some security issues may arise. For example: [0003] Malicious attackers can reverse-analyze the application and protocol to obtain the data format type received by the port, and then construct malicious data to obtain sensitive information. For example, Wuyun vulnerability: http: / / www.wooyun.org / bugs / wooyun-2010-094537. [0004] When some applications listen to ports locally, they transmit intent data to start activities through uniform resource locators (Uniform Resource Locator, referred to as URL), and malicious users can construct intents to start corresponding activities, for example, in the application When the client has a vulnerability, if the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F21/14
CPCG06F21/14G06F21/566G06F2221/034G06F21/1011
Inventor 曹建峰陈晋福
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products