Vulnerability detection method and device for industrial control system
A vulnerability detection and industrial control system technology, applied in transmission systems, electrical components, etc., can solve problems affecting the normal operation of industrial control equipment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] According to an embodiment of the present invention, an embodiment of a vulnerability detection method for an industrial control system is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0033] figure 1 It is a flowchart of a vulnerability detection method for an industrial control system according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0034] Step S102, obtaining the IP network segment and network protocol list of the industrial control network to be detected;
[0035] It should be noted that the above IP network segment may include one IP, multiple IPs, or the entire IP network segm...
Embodiment 2
[0064] The embodiment of the present invention also provides a loophole detection device for an industrial control system, the loophole detection device for the industrial control system is used to implement the loophole detection method for the industrial control system provided in the above-mentioned content of the embodiment of the present invention, the following is provided by the embodiment of the present invention The specific introduction of the vulnerability detection device of the industrial control system.
[0065] Such as Figure 4 as shown, Figure 4 It is a schematic diagram of the above-mentioned vulnerability detection device of the industrial control system, and the vulnerability detection device of the industrial control system includes: an acquisition unit 10 , an execution unit 20 , an extraction unit 30 and a determination unit 40 .
[0066] The obtaining unit 10 is used to obtain the IP network segment and network protocol list of the industrial control ...
Embodiment 3
[0077] An embodiment of the present invention also provides an electronic device, including a memory and a processor, the memory is used to store a program that supports the processor to execute the method described in the first embodiment above, and the processor is configured to execute the program stored in memory.
[0078] see Figure 5 , the embodiment of the present invention also provides an electronic device 100, including: a processor 50, a memory 51, a bus 52 and a communication interface 53, the processor 50, the communication interface 53 and the memory 51 are connected through the bus 52; Executable modules, such as computer programs, stored in the execution memory 51 .
[0079] Wherein, the memory 51 may include a high-speed random access memory (RAM, Random Access Memory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other net...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


