CN109067696B - Webshell detection method and system based on graph similarity analysis - Google Patents

Webshell detection method and system based on graph similarity analysis Download PDF

Info

Publication number
CN109067696B
CN109067696B CN201810527915.6A CN201810527915A CN109067696B CN 109067696 B CN109067696 B CN 109067696B CN 201810527915 A CN201810527915 A CN 201810527915A CN 109067696 B CN109067696 B CN 109067696B
Authority
CN
China
Prior art keywords
weight
graph
page
relation access
page relation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810527915.6A
Other languages
Chinese (zh)
Other versions
CN109067696A (en
Inventor
文伟平
叶晓亮
张汉
张涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Dingyuan Lanjian Information Technology Co ltd
Original Assignee
Hunan Dingyuan Lanjian Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Dingyuan Lanjian Information Technology Co ltd filed Critical Hunan Dingyuan Lanjian Information Technology Co ltd
Priority to CN201810527915.6A priority Critical patent/CN109067696B/en
Publication of CN109067696A publication Critical patent/CN109067696A/en
Application granted granted Critical
Publication of CN109067696B publication Critical patent/CN109067696B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a webshell detection method and system based on graph similarity analysis, and relates to the technical field of information security. The method comprises the steps of obtaining code files in all directories of a system Web server to be detected, obtaining a first weight, drawing a first page relation access graph and a second page relation access graph, generating third-fifth page relation access graphs, obtaining a second weight and a third weight, and obtaining a final weight, so that the possibility that the code files are webshells is detected. By utilizing the technical scheme provided by the invention, the missing report rate caused by the deformation of the webshell can be effectively reduced, and the method can be used as a method for assisting other detection means and reducing the detection range; in addition, as one of the static detection methods, the invention can reduce the sacrifice in the aspect of dynamic detection performance, and the detection performance is better.

Description

Webshell detection method and system based on graph similarity analysis
Technical Field
The invention relates to the technical field of information security, in particular to a webshell detection method and system based on graph similarity analysis.
Background
With the rapid development of internet technology, webshells which are often used by WEB owners for website management and server management are also often used by intruders through WEB service ports at present, and become one of tools for controlling servers or acquiring certain permissions, so that webshells are also called as "backdoors of websites".
The webshell can be nested in a normal webpage to run, and is not easy to be searched and killed; the method can also penetrate through a server firewall and cannot be intercepted by the firewall, and related security events occur frequently, so that great loss is caused, and the method is particularly important for detecting the webshell.
Currently, webshell detection methods are mainly divided into two main categories: static detection and dynamic detection.
Static detection mainly comprises two types, one is to form a feature library according to some known features of webshell, such as feature functions and the like, and match the feature library to obtain a result; the other is based on some features of the webshell, such as entropy of information in statistical features, longest words, and so on. The two methods are easy to bypass by the deformed webshell, so that a large false alarm rate and a large false missing rate exist.
The dynamic detection mainly comprises two types, one is that the dynamic detection is put in a sandbox to operate and is detected according to the characteristics in the process; another is to take a hook of the correlation function and thus perform the detection. Although dynamic detection is better than static detection in detecting deformed webshells, the dynamic detection also has a high false alarm rate due to the reasons of failure in triggering and the like, and a normal program and the webshells cannot be well distinguished. In addition, dynamic detection has a large sacrifice in performance.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a webshell detection method based on graph similarity analysis, and when the deformed webshell is detected, the method can be used as an auxiliary detection means, the detection range of other detection methods is reduced, and the false alarm rate of the webshell can also be reduced.
The technical scheme provided by the invention is as follows:
a webshell detection method based on graph similarity analysis comprises the following steps:
step 1, obtaining a first weight;
aiming at a system to be detected, code files in all directories of a Web server in the system are obtained, the code files are processed, annotation information is obtained, the annotation information is matched with an annotation information feature library, and a weight is given according to a matching result; specifically, regular matching can be performed, each time a character string is matched, the weight is increased by 1, and the final weight is the first weight, so that the first weight is obtained. The 'annotation information feature library' established by the invention almost contains annotation information in common virus horses, particularly annotation information in the published webshell. The method for acquiring the annotation information comprises the following steps: writing a script according to the programming language of the code file, and acquiring annotation information by the script, for example: < | for html language! The characters between-and- > are the annotation information.
Step 2, drawing the first page relation access graph and the second page relation access graph, and specifically executing the following operations:
21) and drawing a first page relation access graph according to the relevant information of the system to be detected.
At the beginning of programming, the website has a normal jump logic relationship, namely, a graph formed by the jump relationship of each page in the website. The first page relation access graph is a normal jump graph of all pages of the website and is also a directed graph, wherein nodes are all pages, and directed edges among the nodes represent access paths among the pages.
The relevant information of the system comprises development documents, instruction manuals, URLs in label languages and the like of the system and opinions of developers.
22) And drawing a second page relation access graph according to the related log information. Second Page relationship Access graph
The related log information comprises: system logs, server access logs, website logs, and the like.
The nodes in the second page relation access graph are pages accessed in a specific time period by a certain IP (Internet protocol) acquired according to the related log information. The method for drawing the second page relation access graph specifically includes: according to the website log, particularly the reserved URL record and the like, which pages are visited by a certain IP in a specific time period can be obtained, so that a skip relation graph of the pages is drawn according to the normal and all skip logics of the website.
Step 3, generating a third page relation access graph, a fourth page relation access graph and a fifth page relation access graph;
31) according to the second page relation access graph, layering the second page relation access graph, wherein the first layer is a main page of the detected system, pages related to database operation, file operation, user authority operation and the like in the second page relation access graph are respectively used as a second layer, a third layer and a fourth layer, and the rest pages are used as a fifth layer; and the access relation between the pages, namely the directed edge is not changed, so that a third page relation access graph is formed.
The judgment method of pages related to database operation, file operation, user authority operation and the like is as follows:
a1) judging according to the page function; for example: the function of the page relates to the aspects of adding and deleting data, downloading and uploading files, giving different permissions to different users and the like;
a2) judging according to the code of the page; for example: according to the page language, java is taken as an example, the page code has getConnection (jdbc, "root") similar connection database statement or delete from XX work XX similar database operation statement, createenefile () similar creation file statement or buffer write () similar character adding output object statement, and shiro is used for realizing a user permission similar method.
32) And pruning the first page relation access graph and the third page relation access graph. Cutting off nodes at the fifth layer in the third page relation access graph, and cutting off corresponding directed edges, thereby forming a fifth page relation access graph; and simultaneously, the same layering and pruning measures are taken for the first page relation access graph, so that a fourth page relation access graph is formed. Step 4, acquiring a second weight and a third weight;
according to the graph similarity algorithm, the similarity between the first page relation access graph and the second page relation access graph and the similarity between the fourth page relation access graph and the fifth page relation access graph are calculated respectively, corresponding weight values are given according to the similarity, and a second weight value and a third weight value are obtained.
In specific implementation, the similarity is a graph similarity d calculated according to formula 112(ii) a And directly calculating the similarity d of the obtained graphs12As a weight.
The graph similarity algorithm is: and matrixing the page relation access graphs to form an n multiplied by n matrix, wherein n is the number of elements contained in a set after the nodes in the two graphs are subjected to graph similarity analysis are merged. If there is an edge between two points, then there is a1 in the matrix, otherwise it is a 0.
And then vectorizing the matrix, namely sequentially taking the elements in the matrix as each coordinate of the vector according to the sequence from left to right and from top to bottom. The distance between the two vectors is then calculated using equation 1, and the value is taken as the similarity of the graphs.
Figure BDA0001676458100000031
Wherein n is the dimension of the vector and is also equal to n in the matrix; x1kAnd X2kRespectively being each coordinate of the two vectors; k is a serial number and takes the value of (1, n); d12Is the graph similarity.
Step 5, obtaining a final weight value; detecting the possibility that the code file is webshell according to the final weight and the first weight;
wherein, the first weight, the second weight and the third weight can be added according to the weight proportion to obtain the final weight;
in specific implementation, the final weight calculation method comprises the following steps: the final weight is 30% of the first weight, 20% of the second weight and 50% of the third weight. And (4) sorting according to the final weight value, wherein the final weight value is more than 30, and the possibility of webshell existence is high. At this time, the code files of all the pages are sorted according to the size of the first weight, the probability that the webshell exists in the pages ranked within the top 50% is very high, and whether the code files are webshells can be further determined through other detection methods or manual verification.
The invention also provides a webshell detection system based on graph similarity analysis, which is realized by the webshell detection method based on graph similarity analysis, and comprises the following steps: the system comprises an annotation information extraction module, an annotation information feature library, first to fifth page relation access graph acquisition modules, a first weight acquisition module, a second weight acquisition module, a third weight acquisition module and a judgment module; wherein:
the annotation information extraction module is used for extracting annotation information of the code files in all directories of the Web server;
the annotation information feature library is used for matching annotation information extracted by the annotation information extraction module;
the first page relation access graph acquisition module: drawing a first page relation access graph according to the relevant information of the system;
the second page relation access graph acquisition module: drawing according to the related log information, and drawing a second page relation access graph;
the third page relation access graph acquisition module: layering the second page relation access graph, and drawing a third page relation access graph;
the fourth page relation access graph acquisition module: layering and pruning the first page relation access graph, and drawing a fourth page relation access graph;
a fifth page relation access graph obtaining module: pruning the third page relation access graph, and drawing a fifth page relation access graph;
the first weight obtaining module is used for performing regular matching on the annotation information extracted by the annotation information feature library and the annotation information extraction module and obtaining a first weight according to a matching result;
the second weight value obtaining module is used for calculating the similarity of the first page relationship access graph and the second page relationship access graph according to a graph similarity algorithm and obtaining a second weight value according to a calculation result;
the third weight obtaining module is used for calculating the similarity between the fourth page relation access graph and the fifth page relation access graph according to a graph similarity algorithm and obtaining a third weight according to a calculation result;
and the judging module is used for obtaining the final weight and judging the possibility that the detection code file is the webshell according to the final weight and the first weight.
Compared with the prior art, the invention has the beneficial effects that:
by utilizing the technical scheme provided by the invention, the false alarm rate caused by the deformation of the webshell can be effectively reduced, and the method can be used as a method for assisting other detection means and reducing the detection range; in addition, as one of the static detection methods, the invention can reduce the sacrifice in the aspect of dynamic detection performance, and the detection performance is better.
Drawings
FIG. 1 is a block flow diagram of the method of the present invention.
FIG. 2 is a block diagram showing the structure of the detecting system according to the present invention.
Detailed Description
The invention will be further described by way of examples, without in any way limiting the scope of the invention, with reference to the accompanying drawings.
The invention provides a webshell detection method based on graph similarity analysis, and in order to better understand the technical scheme of the invention, the technical scheme of the invention is further described in detail with reference to the attached drawings. The invention realizes the webshell detection system based on the graph similarity analysis by using the webshell detection method based on the graph similarity analysis, which comprises the following steps: the system comprises an annotation information extraction module, an annotation information feature library, first to fifth page relation access graph acquisition modules, a first weight acquisition module, a second weight acquisition module, a third weight acquisition module and a judgment module; the data flow relationships between the modules are shown in fig. 2.
The specific embodiment of the invention is as follows:
1. the method comprises the steps of obtaining code files in all directories of the Web server, processing the code files by a comment information extraction module, obtaining comment information, performing regular matching on the comment information and a comment information feature library, adding 1 to a weight value every time a character string is matched, and obtaining a final weight value which is a first weight value.
The annotation information feature library contains annotation information in common virus trojans, in particular code annotations in published webshells.
2. 21) drawing a first page relation access graph according to the relevant information of the system. The first page relation access graph is a normal all-page jump graph of the website and is a directed graph, wherein nodes are all pages, and directed edges among the nodes represent jump paths among the pages.
The related information of the system comprises development documents, instruction manuals, URLs (uniform resource locators) in a label language and the like of the system and opinions of developers.
22) And drawing a second page relation access graph of the system according to the related log information, wherein the second page relation access graph is an actual webpage jump path graph.
The related log information comprises: system logs, server access logs, website logs, and the like.
Step 3,
31) According to the second page relation access graph, layering the second page relation access graph, wherein the first layer is a main page of the system, pages related to database operation, file operation, user authority operation and the like in the access relation graph are respectively used as a second layer, a third layer and a fourth layer, and the rest pages are used as a fifth layer; the access relation between the pages, namely the directed edges, is not changed, so that a page relation access graph is formed.
32) And pruning the third page relation access graph of the first page relation access graph. Cutting off nodes at the fifth layer in the third page relation access graph, and cutting off corresponding directed edges, thereby forming a fifth page relation access graph; and simultaneously, the same pruning measures are taken for the first page relation access graph, so that a fourth page relation access graph is formed.
And 4, respectively calculating the similarity between the first page relationship access graph and the second page relationship access graph and the similarity between the fourth page relationship access graph and the fifth page relationship access graph according to a graph similarity algorithm, and endowing corresponding weight values to obtain a third weight value of a second weight value.
The graph similarity algorithm is as follows: and matrixing the page relation access graph to form an n multiplied by n matrix, wherein n is the number of elements contained in a set after the nodes in the two graphs are subjected to graph similarity analysis are merged. If there is an edge in the matrix, the position in the matrix is 1, otherwise, the position is 0.
And then vectorizing the matrix, namely sequentially taking the elements in the matrix as each coordinate of the vector according to the sequence from left to right and from top to bottom. The distance between the two vectors is then calculated using the following formula, and its value is taken as the similarity of the graphs.
Figure BDA0001676458100000061
Wherein n is the dimension of the vector and is also equal to n in the matrix; x1kAnd X2kRespectively being each coordinate of the two vectors; k is a serial number and takes the value of (1, n); d12Is the graph similarity.
Step 5, obtaining a final weight value; detecting the possibility that the code file is a webshell according to the final weight and the first weight;
wherein, the first weight, the second weight and the third weight can be added according to the weight proportion to obtain the final weight;
in specific implementation, the final weight calculation method comprises the following steps: the final weight is 30% of the first weight, 20% of the second weight and 50% of the third weight. And (4) sorting according to the final weight value, wherein the final weight value is more than 30, and the possibility of webshell existence is high. At this time, the code files of all the pages are sorted according to the size of the first weight, the probability that the webshell exists in the pages ranked within the top 50% is very high, and whether the code files are webshell can be further determined through other detection methods or manual verification.
It is noted that the disclosed embodiments are intended to aid in further understanding of the invention, but those skilled in the art will appreciate that: various substitutions and modifications are possible without departing from the spirit and scope of the invention and appended claims. Therefore, the invention should not be limited to the embodiments disclosed, but the scope of the invention is defined by the appended claims.

Claims (8)

1. A webshell detection method based on graph similarity analysis is characterized by comprising the steps of obtaining code files in all directories of a system Web server to be detected, generating third-fifth page relation access graphs by obtaining a first weight, drawing a first page relation access graph and a second page relation access graph, obtaining a second weight and a third weight, obtaining a final weight, and detecting the possibility that the code files are webshells; the method comprises the following steps:
step 1, obtaining a first weight, including:
11) establishing an annotation information feature library;
12) processing the code file to acquire annotation information;
13) matching the annotation information with an annotation information feature library, and endowing a weight according to a matching result to obtain a first weight;
step 2, drawing the first page relation access graph and the second page relation access graph, and specifically executing the following operations:
21) drawing a first page relation access graph according to the relevant information of the system to be detected; the first page relation access graph is a directed graph, nodes of the graph are all pages of a website, and directed edges among the nodes represent access paths among the pages; the relevant information of the system comprises development documents, an instruction manual, URL information in a label language and opinions of developers of the system;
22) drawing a second page relation access graph according to the related log information; the nodes in the second page relation access graph are pages accessed in a specific time period and acquired according to the related log information;
step 3, generating a third page relation access graph, a fourth page relation access graph and a fifth page relation access graph; the following operations are performed:
31) layering a second page relation access graph, wherein the first layer is a main page of the system to be detected, pages related to database operation, file operation and user permission operation in the second page relation access graph are respectively used as a second layer, a third layer and a fourth layer, and the rest pages are used as fifth layers; the access relation among the pages, namely the directed edge, is unchanged, so that a third page relation access graph is formed;
32) pruning the first page relation access graph and the third page relation access graph: cutting off nodes at the fifth layer in the third page relation access graph, and cutting off corresponding directed edges, thereby forming a fifth page relation access graph; meanwhile, the pruning method is adopted for the first page relation access graph, so that a fourth page relation access graph is formed;
step 4, acquiring a second weight and a third weight;
according to a graph similarity algorithm, respectively calculating the similarity between a first page relation access graph and a second page relation access graph and the similarity between a fourth page relation access graph and a fifth page relation access graph, and endowing corresponding weight values according to the similarity to obtain a second weight value and a third weight value;
step 5, adding the first weight, the second weight and the third weight according to the weight proportion to obtain a final weight; and detecting the code file according to the final weight and the first weight to obtain the possibility that the code file is the webshell.
2. The webshell detection method based on graph similarity analysis as claimed in claim 1, wherein step 13) specifically adopts a regular matching method, and every time a character string is matched, the weight is added by 1, and the finally obtained weight is used as the first weight.
3. The method of claim 1, wherein the annotated information feature library comprises annotated information from common virus trees and horses; the method for acquiring the annotation information comprises the following steps: and compiling a script according to the programming language of the code file, and acquiring annotation information through the script.
4. The method for detecting webshell based on graph similarity analysis as claimed in claim 1, wherein in step 31), the judgment related to database operation, file operation, user authority operation page comprises a method for judging according to page function and a method for judging according to page code.
5. The webshell detection method based on graph similarity analysis as claimed in claim 1, wherein in step 4, the graph similarity algorithm is:
matrixing a page relation access graph to form an n multiplied by n matrix, wherein n is the number of elements contained in a set obtained after a node in two graphs for graph similarity analysis is subjected to union set; if an edge exists between the two nodes, the value of the two nodes in the matrix is 1, otherwise, the value is 0;
vectorizing the matrix, namely sequentially taking the elements in the matrix as each coordinate of the matrix vector according to the sequence from left to right and from top to bottom;
calculating the distance between two vectors according to formula 1 to obtain the similarity d of the image12
Figure FDA0002715009500000021
Wherein n is the dimension of the vector and is equal to n in the matrix; x1kAnd X2kRespectively being each coordinate of the two vectors; k is a serial number and takes the value of (1, n); d12Is the graph similarity;
the calculated graph similarity d12As a weight.
6. The method for detecting webshell based on graph similarity analysis according to claim 1, wherein the detection in step 5 is specifically:
calculating the final weight, wherein the calculating method specifically comprises the following steps: the final weight is 30% of the first weight, 20% of the second weight and 50% of the third weight;
setting a final weight threshold; sorting according to the final weight value, wherein the probability of webshell existence is high for code files with the final weight value above the final weight value threshold;
setting a first weight sorting threshold; and sorting the code files of all the pages according to the size of the first weight, wherein the probability that the webshell exists in the pages ranked within the sorting threshold is high.
7. The method of claim 6, wherein the code file is further verified by other detection methods or by manual verification to determine whether the code file is a webshell.
8. A webshell detection system based on graph similarity analysis and realized by the webshell detection method based on graph similarity analysis of any claim 1-7, comprising: the system comprises an annotation information extraction module, an annotation information feature library, first to fifth page relation access graph acquisition modules, a first weight acquisition module, a second weight acquisition module, a third weight acquisition module and a judgment module; wherein:
the annotation information extraction module is used for extracting annotation information of the code files in all directories of the Web server;
the annotation information feature library is used for matching the annotation information extracted by the annotation information extraction module;
the first page relation access graph acquisition module: drawing a first page relation access graph according to the system related information;
the second page relation access graph acquisition module: drawing a second page relation access graph according to the related log information;
the third page relation access graph acquisition module: layering the second page relation access graph, and drawing a third page relation access graph;
the fourth page relation access graph acquisition module: layering and pruning the first page relation access graph, and drawing a fourth page relation access graph;
a fifth page relation access graph obtaining module: pruning the third page relation access graph, and drawing a fifth page relation access graph;
the first weight obtaining module is used for performing regular matching on the annotation information feature library and the annotation information extracted by the annotation information extracting module, and obtaining a first weight according to a matching result;
the second weight value obtaining module is used for calculating the similarity of the first page relation access graph and the second page relation access graph according to a graph similarity algorithm and obtaining a second weight value according to a calculation result;
the third weight obtaining module is used for calculating the similarity between the fourth page relation access graph and the fifth page relation access graph according to a graph similarity algorithm and obtaining a third weight according to a calculation result;
the judging module is used for obtaining the final weight; and judging the possibility that the detection code file is the webshell according to the final weight and the first weight.
CN201810527915.6A 2018-05-29 2018-05-29 Webshell detection method and system based on graph similarity analysis Expired - Fee Related CN109067696B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810527915.6A CN109067696B (en) 2018-05-29 2018-05-29 Webshell detection method and system based on graph similarity analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810527915.6A CN109067696B (en) 2018-05-29 2018-05-29 Webshell detection method and system based on graph similarity analysis

Publications (2)

Publication Number Publication Date
CN109067696A CN109067696A (en) 2018-12-21
CN109067696B true CN109067696B (en) 2020-12-08

Family

ID=64819756

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810527915.6A Expired - Fee Related CN109067696B (en) 2018-05-29 2018-05-29 Webshell detection method and system based on graph similarity analysis

Country Status (1)

Country Link
CN (1) CN109067696B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967616A (en) * 2015-06-05 2015-10-07 北京安普诺信息技术有限公司 WebShell file detection method in Web server
CN107241296A (en) * 2016-03-28 2017-10-10 阿里巴巴集团控股有限公司 A kind of Webshell detection method and device
CN107888571A (en) * 2017-10-26 2018-04-06 江苏省互联网行业管理服务中心 A kind of various dimensions webshell intrusion detection methods and detecting system based on HTTP daily records

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967616A (en) * 2015-06-05 2015-10-07 北京安普诺信息技术有限公司 WebShell file detection method in Web server
CN107241296A (en) * 2016-03-28 2017-10-10 阿里巴巴集团控股有限公司 A kind of Webshell detection method and device
CN107888571A (en) * 2017-10-26 2018-04-06 江苏省互联网行业管理服务中心 A kind of various dimensions webshell intrusion detection methods and detecting system based on HTTP daily records

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PDF文件漏洞检测;文伟平;王永剑;孟正;《清华大学学报(自然科学版)》;20170115;全文 *

Also Published As

Publication number Publication date
CN109067696A (en) 2018-12-21

Similar Documents

Publication Publication Date Title
CN102542201B (en) Detection method and system for malicious codes in web pages
US9003529B2 (en) Apparatus and method for identifying related code variants in binaries
US11263062B2 (en) API mashup exploration and recommendation
Zhu et al. Android malware detection based on multi-head squeeze-and-excitation residual network
CN112989348B (en) Attack detection method, model training method, device, server and storage medium
JP2010501096A (en) Cooperative optimization of wrapper generation and template detection
CN113139192B (en) Third party library security risk analysis method and system based on knowledge graph
Haruta et al. Visual similarity-based phishing detection scheme using image and CSS with target website finder
CN114528457B (en) Web fingerprint detection method and related equipment
KR101696694B1 (en) Method And Apparatus For Analysing Source Code Vulnerability By Using TraceBack
CN116186759A (en) Sensitive data identification and desensitization method for privacy calculation
CN111597422A (en) Buried point mapping method and device, computer equipment and storage medium
CN104778232B (en) Searching result optimizing method and device based on long query
US10339207B2 (en) Identifying a functional fragment of a document object model tree
CN103838865A (en) Method and device for mining timeliness seed page
CN109067696B (en) Webshell detection method and system based on graph similarity analysis
CN111191235A (en) Suspicious file analysis method and device and computer readable storage medium
KR102411383B1 (en) Apparatus for processing cyber threat information, method for processing cyber threat information, and medium for storing a program processing cyber threat information
KR101005871B1 (en) B-Tree Index Vector Based Web-Log Restoration Method For Huge Web Log Mining And Web Attack Detection
Haas Protocol to discover machine-readable entities of the ecosystem management actions taxonomy
KR100989320B1 (en) B-Tree Index Vector Based Web-Log High-Speed Search Method For Huge Web Log Mining And Web Attack Detection and B-tree based indexing log processor
Lei et al. Design and implementation of an automatic scanning tool of SQL injection vulnerability based on Web crawler
CN111475812B (en) Webpage backdoor detection method and system based on data executable characteristics
CN111859387B (en) Automatic construction method for Android platform software vulnerability model
CN116719986B (en) Python-based data grabbing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201208