Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT) 2014
DOI: 10.1109/icccnt.2014.6963152
|View full text |Cite
|
Sign up to set email alerts
|

Webshell detection techniques in web applications

Abstract: With widely adoption of online services, malicious web sites have become a malignant tumor of the Internet. Through system vulnerabilities, attackers can upload malicious files (which are also called webshells) to web server to create a backdoor for hackers' further attacks. Therefore, finding and detecting webshell inside web application source code are crucial to secure websites. In this paper, we propose a novel method based on the optimal threshold values to identify files that contain malicious codes from… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 6 publications
0
9
0
1
Order By: Relevance
“…The long short-term memory and hidden Markov model were used to construct the framework and detect it. Webshell detection techniques in web applications [3] proposed a novel method based on an optimal threshold to identify files containing malicious code in web applications. The detection system finds all the files in classifiers target folder and provides suspicious files to the administrator for inspection.…”
Section: Related Workmentioning
confidence: 99%
“…The long short-term memory and hidden Markov model were used to construct the framework and detect it. Webshell detection techniques in web applications [3] proposed a novel method based on an optimal threshold to identify files containing malicious code in web applications. The detection system finds all the files in classifiers target folder and provides suspicious files to the administrator for inspection.…”
Section: Related Workmentioning
confidence: 99%
“…With 500 webshell samples and 1200 normal samples, we set the ngram_range value to (2,2), and other parameters were unchanged. When setting max_features to 1000, 2500, 5000, 7500, 10,000, 12,500, 17,500, 20,000, 40,000, and 50,000, respectively, we calculated the accuracy rate and recall rate.…”
Section: Impact Of Max_features Value On Resultsmentioning
confidence: 99%
“…Attackers often exploit vulnerabilities in the system or web applications to upload a malicious file or malicious code to the webserver. This malicious file is called a webshell [2]. Once the webshell is executed, it can provide remote attackers with an interface to operate the server, including command execution, file manipulation, and database connection [3].…”
Section: Introductionmentioning
confidence: 99%
“…Although a small web site can be quickly located, and files can be excluded with weak features, using a combination of static features and manual work, for large web sites, the total amount of human effort is too large at this time. Therefore, Webshell detection techniques in web applications [15] proposes a new method to identify WebShells based on the optimal threshold of malicious signatures, malicious function samples and the longest characters at the beginning and end of file labels. The malicious code in each file of the Web application is scanned and found, and then a list of suspect files and a detailed log analysis table for each suspect file are automatically provided by the administrator for further inspection.…”
Section: A Detection Based On Static Featuresmentioning
confidence: 99%