Nothing Special   »   [go: up one dir, main page]

Zhao et al., 2020 - Google Patents

Wsld: detecting unknown webshell using fuzzy matching and deep learning

Zhao et al., 2020

Document ID
15700857710106625737
Author
Zhao Z
Liu Q
Song T
Wang Z
Wu X
Publication year
Publication venue
Information and Communications Security: 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers 21

External Links

Snippet

Web applications have become one of the most common targets for attackers to exploit vulnerabilities in recent years. After successfully attacking the webserver, hackers upload webshell to maintain long-term and secret access to the server. Nowadays, webshell written …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/68Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory

Similar Documents

Publication Publication Date Title
Ren et al. CSKG4APT: A cybersecurity knowledge graph for advanced persistent threat organization attribution
Fang et al. FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm
Chowdhury et al. Malware analysis and detection using data mining and machine learning classification
Vinayakumar et al. Evaluating deep learning approaches to characterize and classify malicious URL’s
Tian et al. CNN-webshell: malicious web shell detection with convolutional neural network
Zhang et al. Webshell traffic detection with character-level features based on deep learning
Hussain et al. Malware detection using machine learning algorithms for windows platform
Mimura et al. Towards efficient detection of malicious VBA macros with LSI
Pan et al. Webshell detection based on executable data characteristics of php code
Qiu et al. Predicting the impact of android malicious samples via machine learning
Gonzalez et al. Authorship attribution of android apps
Zhao et al. Wsld: detecting unknown webshell using fuzzy matching and deep learning
Rafiq et al. AndroMalPack: enhancing the ML-based malware classification by detection and removal of repacked apps for Android systems
Kristiansen et al. Cti-twitter: Gathering cyber threat intelligence from twitter using integrated supervised and unsupervised learning
Mehta et al. SQLIML: A comprehensive analysis for SQL injection detection using multiple supervised and unsupervised learning schemes
Si et al. Malware detection using automated generation of yara rules on dynamic features
Liu et al. A new method for webshell detection based on bidirectional gru and attention mechanism
Sun et al. A matrix decomposition based webshell detection method
Fang et al. Pbdt: Python backdoor detection model based on combined features
Angadi et al. Malicious URL detection using machine learning techniques
Pei et al. Combining multi-features with a neural joint model for Android malware detection
Rayyan et al. Uniform resource locator classification using classical machine learning & deep learning techniques
Oudah et al. SQL injection detection using machine learning with different TF-IDF feature extraction approaches
Gupta et al. Blockchain based detection of android malware using ranked permissions
Liu et al. A Markov detection tree-based centralized scheme to automatically identify malicious webpages on cloud platforms