An unknown vulnerability mining method for distribution network equipment based on industrial control protocol
The invention discloses an unknown vulnerability mining method of distribution network equipment based on industrial control protocol, which comprises the following steps: S1, configuring the same industrial control protocol as the distribution network equipment to simulate the communication process...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | DAI JIAN XIONG WEI XIE JIANG WEI YAN HUANG FEI ZHAO ZHIWEI OU LIN ZHONG JIAYONG YU HONGXIN GAN TONGLIN WANG HONGBIN OU RUI HE YAN HE HE ZHOU NING WEI SU GONG QIUJIN ZHANG YOUQIANG LIU ZUJIAN YAO SHUYOU |
description | The invention discloses an unknown vulnerability mining method of distribution network equipment based on industrial control protocol, which comprises the following steps: S1, configuring the same industrial control protocol as the distribution network equipment to simulate the communication process of the distribution network equipment; 2, mining the unknown vulnerability of distribution networkequipment based on various industrial control protocols of the distribution network. 2, carry out information detection on that distribution network equipment according to the step S1, and detecting the port and the service state thereof; 3, testing heterogeneous network data packets during the communication process of distribution network equipment, and monitoring the status of distribution network equipment; 4, performing playback test on the heterogeneous data packet in the step S3, and analyzing; S5: classifying and displaying the data analyzed in step S4. The invention can carry out analog communication, informat |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN109088772A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN109088772A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN109088772A3</originalsourceid><addsrcrecordid>eNqNjDEOwjAMALswIOAP5gFIBYbCWFUgJib2Km1csJraIXGo-D1F4gFMN9zp5hmXDIl7lpHhlRxjMA050jcMxMR3GFAfYqGTAJaiBmqSkjAw6iihB3wm8gOyQmMiWpgUsU3f0jhohTWIAx9EpRW3zGadcRFXPy6y9fl0qy4b9FJj9KbFaVxX121-zA-HotiV-3-aD4-DRCw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>An unknown vulnerability mining method for distribution network equipment based on industrial control protocol</title><source>esp@cenet</source><creator>DAI JIAN ; XIONG WEI ; XIE JIANG ; WEI YAN ; HUANG FEI ; ZHAO ZHIWEI ; OU LIN ; ZHONG JIAYONG ; YU HONGXIN ; GAN TONGLIN ; WANG HONGBIN ; OU RUI ; HE YAN ; HE HE ; ZHOU NING ; WEI SU ; GONG QIUJIN ; ZHANG YOUQIANG ; LIU ZUJIAN ; YAO SHUYOU</creator><creatorcontrib>DAI JIAN ; XIONG WEI ; XIE JIANG ; WEI YAN ; HUANG FEI ; ZHAO ZHIWEI ; OU LIN ; ZHONG JIAYONG ; YU HONGXIN ; GAN TONGLIN ; WANG HONGBIN ; OU RUI ; HE YAN ; HE HE ; ZHOU NING ; WEI SU ; GONG QIUJIN ; ZHANG YOUQIANG ; LIU ZUJIAN ; YAO SHUYOU</creatorcontrib><description>The invention discloses an unknown vulnerability mining method of distribution network equipment based on industrial control protocol, which comprises the following steps: S1, configuring the same industrial control protocol as the distribution network equipment to simulate the communication process of the distribution network equipment; 2, mining the unknown vulnerability of distribution networkequipment based on various industrial control protocols of the distribution network. 2, carry out information detection on that distribution network equipment according to the step S1, and detecting the port and the service state thereof; 3, testing heterogeneous network data packets during the communication process of distribution network equipment, and monitoring the status of distribution network equipment; 4, performing playback test on the heterogeneous data packet in the step S3, and analyzing; S5: classifying and displaying the data analyzed in step S4. The invention can carry out analog communication, informat</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20181225&DB=EPODOC&CC=CN&NR=109088772A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20181225&DB=EPODOC&CC=CN&NR=109088772A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>DAI JIAN</creatorcontrib><creatorcontrib>XIONG WEI</creatorcontrib><creatorcontrib>XIE JIANG</creatorcontrib><creatorcontrib>WEI YAN</creatorcontrib><creatorcontrib>HUANG FEI</creatorcontrib><creatorcontrib>ZHAO ZHIWEI</creatorcontrib><creatorcontrib>OU LIN</creatorcontrib><creatorcontrib>ZHONG JIAYONG</creatorcontrib><creatorcontrib>YU HONGXIN</creatorcontrib><creatorcontrib>GAN TONGLIN</creatorcontrib><creatorcontrib>WANG HONGBIN</creatorcontrib><creatorcontrib>OU RUI</creatorcontrib><creatorcontrib>HE YAN</creatorcontrib><creatorcontrib>HE HE</creatorcontrib><creatorcontrib>ZHOU NING</creatorcontrib><creatorcontrib>WEI SU</creatorcontrib><creatorcontrib>GONG QIUJIN</creatorcontrib><creatorcontrib>ZHANG YOUQIANG</creatorcontrib><creatorcontrib>LIU ZUJIAN</creatorcontrib><creatorcontrib>YAO SHUYOU</creatorcontrib><title>An unknown vulnerability mining method for distribution network equipment based on industrial control protocol</title><description>The invention discloses an unknown vulnerability mining method of distribution network equipment based on industrial control protocol, which comprises the following steps: S1, configuring the same industrial control protocol as the distribution network equipment to simulate the communication process of the distribution network equipment; 2, mining the unknown vulnerability of distribution networkequipment based on various industrial control protocols of the distribution network. 2, carry out information detection on that distribution network equipment according to the step S1, and detecting the port and the service state thereof; 3, testing heterogeneous network data packets during the communication process of distribution network equipment, and monitoring the status of distribution network equipment; 4, performing playback test on the heterogeneous data packet in the step S3, and analyzing; S5: classifying and displaying the data analyzed in step S4. The invention can carry out analog communication, informat</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjDEOwjAMALswIOAP5gFIBYbCWFUgJib2Km1csJraIXGo-D1F4gFMN9zp5hmXDIl7lpHhlRxjMA050jcMxMR3GFAfYqGTAJaiBmqSkjAw6iihB3wm8gOyQmMiWpgUsU3f0jhohTWIAx9EpRW3zGadcRFXPy6y9fl0qy4b9FJj9KbFaVxX121-zA-HotiV-3-aD4-DRCw</recordid><startdate>20181225</startdate><enddate>20181225</enddate><creator>DAI JIAN</creator><creator>XIONG WEI</creator><creator>XIE JIANG</creator><creator>WEI YAN</creator><creator>HUANG FEI</creator><creator>ZHAO ZHIWEI</creator><creator>OU LIN</creator><creator>ZHONG JIAYONG</creator><creator>YU HONGXIN</creator><creator>GAN TONGLIN</creator><creator>WANG HONGBIN</creator><creator>OU RUI</creator><creator>HE YAN</creator><creator>HE HE</creator><creator>ZHOU NING</creator><creator>WEI SU</creator><creator>GONG QIUJIN</creator><creator>ZHANG YOUQIANG</creator><creator>LIU ZUJIAN</creator><creator>YAO SHUYOU</creator><scope>EVB</scope></search><sort><creationdate>20181225</creationdate><title>An unknown vulnerability mining method for distribution network equipment based on industrial control protocol</title><author>DAI JIAN ; XIONG WEI ; XIE JIANG ; WEI YAN ; HUANG FEI ; ZHAO ZHIWEI ; OU LIN ; ZHONG JIAYONG ; YU HONGXIN ; GAN TONGLIN ; WANG HONGBIN ; OU RUI ; HE YAN ; HE HE ; ZHOU NING ; WEI SU ; GONG QIUJIN ; ZHANG YOUQIANG ; LIU ZUJIAN ; YAO SHUYOU</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN109088772A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2018</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>DAI JIAN</creatorcontrib><creatorcontrib>XIONG WEI</creatorcontrib><creatorcontrib>XIE JIANG</creatorcontrib><creatorcontrib>WEI YAN</creatorcontrib><creatorcontrib>HUANG FEI</creatorcontrib><creatorcontrib>ZHAO ZHIWEI</creatorcontrib><creatorcontrib>OU LIN</creatorcontrib><creatorcontrib>ZHONG JIAYONG</creatorcontrib><creatorcontrib>YU HONGXIN</creatorcontrib><creatorcontrib>GAN TONGLIN</creatorcontrib><creatorcontrib>WANG HONGBIN</creatorcontrib><creatorcontrib>OU RUI</creatorcontrib><creatorcontrib>HE YAN</creatorcontrib><creatorcontrib>HE HE</creatorcontrib><creatorcontrib>ZHOU NING</creatorcontrib><creatorcontrib>WEI SU</creatorcontrib><creatorcontrib>GONG QIUJIN</creatorcontrib><creatorcontrib>ZHANG YOUQIANG</creatorcontrib><creatorcontrib>LIU ZUJIAN</creatorcontrib><creatorcontrib>YAO SHUYOU</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>DAI JIAN</au><au>XIONG WEI</au><au>XIE JIANG</au><au>WEI YAN</au><au>HUANG FEI</au><au>ZHAO ZHIWEI</au><au>OU LIN</au><au>ZHONG JIAYONG</au><au>YU HONGXIN</au><au>GAN TONGLIN</au><au>WANG HONGBIN</au><au>OU RUI</au><au>HE YAN</au><au>HE HE</au><au>ZHOU NING</au><au>WEI SU</au><au>GONG QIUJIN</au><au>ZHANG YOUQIANG</au><au>LIU ZUJIAN</au><au>YAO SHUYOU</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>An unknown vulnerability mining method for distribution network equipment based on industrial control protocol</title><date>2018-12-25</date><risdate>2018</risdate><abstract>The invention discloses an unknown vulnerability mining method of distribution network equipment based on industrial control protocol, which comprises the following steps: S1, configuring the same industrial control protocol as the distribution network equipment to simulate the communication process of the distribution network equipment; 2, mining the unknown vulnerability of distribution networkequipment based on various industrial control protocols of the distribution network. 2, carry out information detection on that distribution network equipment according to the step S1, and detecting the port and the service state thereof; 3, testing heterogeneous network data packets during the communication process of distribution network equipment, and monitoring the status of distribution network equipment; 4, performing playback test on the heterogeneous data packet in the step S3, and analyzing; S5: classifying and displaying the data analyzed in step S4. The invention can carry out analog communication, informat</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN109088772A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | An unknown vulnerability mining method for distribution network equipment based on industrial control protocol |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T04%3A57%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=DAI%20JIAN&rft.date=2018-12-25&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN109088772A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |