Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for testing vulnerability

A technology for testing equipment and equipment, applied in the direction of digital transmission systems, electrical components, transmission systems, etc., can solve the problems of hidden online control equipment that cannot be found in time, unfavorable equipment missed detection, etc.

Inactive Publication Date: 2017-09-19
BEIJING LANXUM NEW TECH CO LTD +2
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional vulnerability testing scheme is based on the known control system environment, and the staff will test the control equipment to be tested according to a fixed process. Such a test cannot find hidden online control equipment in time, and the open testing process is not conducive to finding Due to the missed detection of equipment caused by internal personnel, the present invention provides a vulnerability testing device that can be controlled by the outside to scan all online devices in the control network anytime and anywhere. At the same time, such remote control vulnerability testing equipment also enriches the security. means of audit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for testing vulnerability
  • Method and device for testing vulnerability
  • Method and device for testing vulnerability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0012] Firstly, the basic principle of testing the loopholes in the present invention is: connect the equipment for testing the loopholes to the network switch in the control network. In this way, the device can scan the control network where it is located to obtain information such as IP addresses, service port numbers, and MAC addresses of all online devices. After obtaining the MAC address, the device can obtain the device provi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method and device for testing vulnerability. The method is suitable for execution in a computer device. The method comprises the following steps: identifying a device in a control network to obtain information of each identified device; determining test examples associated with each identified device; sending the information of each device and identifications associated with the test examples to a mobile terminal through a wireless network to allow the mobile terminal to select devices to be tested and selected test examples according to user input; receiving test instruction message comprising the information of the selected devices and the identification of the selected test examples from the mobile terminal; according to the test instruction information, executing the selected test examples for the selected devices to obtain corresponding test results; and sending message comprising the test results to the mobile terminal.

Description

[0001] The invention relates to the field of equipment monitoring, in particular to a method and equipment for testing loopholes. Background technique [0002] In the early days, industrial control systems were deployed in an environment that was physically isolated from the outside world and did not involve network security issues. However, with the widespread application of Internet technology in industrial control systems, the network security problems of industrial control systems are becoming more and more serious. In order to improve the stability and security of industrial control systems, device vulnerability testing is an important link. [0003] The traditional vulnerability testing scheme is based on the known control system environment, and the staff will test the control equipment to be tested according to a fixed process. Such a test cannot find hidden online control equipment in time, and the open testing process is not conducive to finding Due to the missed de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/08H04L29/06
Inventor 胡浩何小梅金宪珊陈钢王明华傅刚刘青李志李远侯海波
Owner BEIJING LANXUM NEW TECH CO LTD