2019
DOI: 10.1007/978-981-13-6621-5_6
|View full text |Cite|
|
Sign up to set email alerts
|

Automatic and Accurate Detection of Webshell Based on Convolutional Neural Network

Abstract: The rapid development of the Internet has changed the way people live and work. Web security, as the foundation of network security, has received much more attention. Based on the variability of Webshells and the vulnerability of detection methods, this paper proposed a model that used deep learning to detect and implements the automatic identification of Webshells. For the shortcomings of the traditional detection models using machine learning algorithms, this paper proposed to apply convolutional neural netw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…Machine learning and deep learning methods [25][26][27] are used in webshell detection. Among the deep learning methods used, CNN [28][29][30] is often used for webshell detection. Tian et al [31] first applied CNN to webshell detection.…”
Section: Methods Of Webshell Detectionmentioning
confidence: 99%
“…Machine learning and deep learning methods [25][26][27] are used in webshell detection. Among the deep learning methods used, CNN [28][29][30] is often used for webshell detection. Tian et al [31] first applied CNN to webshell detection.…”
Section: Methods Of Webshell Detectionmentioning
confidence: 99%
“…is is the oldest and most traditional way to detect webshells, which places high demands on the administrators of the website. Administrators are supposed to have a comprehensive grasp of the website files and have a high recognition ability for some newly added exception files [13], such as some naming files, passby.php, pass.asp, and a.jsp. Besides, these small files should be treated carefully because there are probably one word Trojans.…”
Section: Methods Of Webshell Detectionmentioning
confidence: 99%
“…Since only one path in the code sequences of a malicious sample may be malicious, there is considerable interference by non-malicious paths on the features. This also explains why researchers have suggested that the Doc2Vec detection performance is below par [6].…”
Section: Encrypted Communicationmentioning
confidence: 98%
“…Analysis of the hash values revealed that a little over one-half of the malicious samples (1,031 samples) were included in the benign samples. Manual analysis of the 1,031 samples revealed that they were, in fact, benign -this raises questions about the results presented by researchers who have used these datasets [4,6,14]. In any case, these 1,031 samples were eliminated to leave only 1,019 malicious samples.…”
Section: Data Processingmentioning
confidence: 99%