Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Equipment protocol vulnerability detection method and device

A vulnerability detection and equipment technology, applied in the field of network security, can solve problems such as low code coverage and low test efficiency, and achieve the effect of improving detection efficiency, code coverage, and vulnerability detection efficiency

Active Publication Date: 2021-10-29
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the technical problem to be solved by the present invention is to overcome the defects of low test efficiency caused by a large number of invalid samples and low code coverage in the prior art, thereby providing a device protocol vulnerability detection method and device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment protocol vulnerability detection method and device
  • Equipment protocol vulnerability detection method and device
  • Equipment protocol vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0023] In the description of the present invention, it should be noted that the technical features involved in the different embodiments of the present invention described below can be combined as long as they do not constitute conflicts with each other.

[0024] An embodiment of the present invention provides a device protocol vulnerability detection method, including:

[0025] Step S10: Determine the protocol type of the device to be detected, and obtain the protocol message corresponding to the protocol typ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an equipment protocol vulnerability detection method and device, and the method comprises the steps: determining a to-be-detected protocol type of to-be-detected equipment, and obtaining a protocol message corresponding to the to-be-detected protocol type in a system where the to-be-detected equipment is located; obtaining a relationship between fields in the protocol message; performing protocol state machine learning on a system where the to-be-detected equipment is located according to the protocol message, and obtaining a state machine path of the system where the to-be-detected equipment is located; determining a test case generation method according to the state paths, and generating test cases corresponding to the state paths according to the test case generation method in combination with the relationship between the fields; and inputting the test case into the to-be-detected equipment, and obtaining a protocol vulnerability detection result of the to-be-detected equipment according to the working state of the to-be-detected equipment. According to the method and the device, the test cases are generated in combination with the relationship among the fields in the protocol message and the state path, so that a large number of redundant test cases are prevented from being generated, the code coverage rate is improved, and the vulnerability detection efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a device protocol vulnerability detection method and device. Background technique [0002] After the application of industrial automation control technology and Internet of Things technology, the power system has gained efficiency and benefits, but it is also facing serious security threats. There may be loopholes in the power equipment protocol. Using such loopholes to attack downstream equipment such as smart meters in the power system may break through the protection measures of the power system, affect the backbone network of the power system, and cause a wider range of failures. Therefore, it is extremely necessary for the security protection of the power system to discover the current downstream equipment protocol and system loopholes in the power system. [0003] The application of traditional fuzz testing technology can detect program vulnerabilities in the equi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/57G06F11/36
CPCH04L63/1416H04L63/1433G06F21/577G06F11/3676G06F11/3684G06F11/3688G06F2221/034
Inventor 王文辉张錋韩啸韩龙玺程凯
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products