CN110210225A - A kind of intelligentized Docker container malicious file detection method and device - Google Patents

A kind of intelligentized Docker container malicious file detection method and device Download PDF

Info

Publication number
CN110210225A
CN110210225A CN201910445566.8A CN201910445566A CN110210225A CN 110210225 A CN110210225 A CN 110210225A CN 201910445566 A CN201910445566 A CN 201910445566A CN 110210225 A CN110210225 A CN 110210225A
Authority
CN
China
Prior art keywords
file
web page
testing result
document
docker container
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910445566.8A
Other languages
Chinese (zh)
Inventor
黄诚
谢逸
黄德禄
崔韩东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan University
Sun Yat Sen University
National Sun Yat Sen University
Original Assignee
Sichuan University
National Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan University, National Sun Yat Sen University filed Critical Sichuan University
Priority to CN201910445566.8A priority Critical patent/CN110210225A/en
Publication of CN110210225A publication Critical patent/CN110210225A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/561Virus type analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects

Abstract

This application involves field of computer technology, a kind of intelligentized Docker container malicious file detection method and device are provided.The method is applied to server, which comprises obtains multiple files in the original image of target Docker container, the target Docker container is Docker container to be detected;For each file in the multiple file, this document is detected using the malicious file condition code based on yara rule, to judge whether this document is malicious file, obtains the first testing result;For each file in the multiple file, this document is detected using antivirus software, to judge whether this document is malicious file, obtains the second testing result;Obtain multiple web page files in the original image of the target Docker container;For each web page files in the multiple web page files, web page files input Web page classifying model is obtained into third testing result to detect whether the webpage is Webshell webpage backdoor file.

Description

A kind of intelligentized Docker container malicious file detection method and device
Technical field
This application involves field of computer technology, in particular to a kind of intelligentized Docker container malicious file Detection method and device.
Background technique
Docker is a container engine dependent on linux kernel, is issued based on Apache2.0 open source authorized agreement, Automatically dispose of the application program based on container can be fast implemented.Docker is mainly by client, finger daemon, mirror image, appearance Device and five part of mirror image warehouse composition, provide simply and the modeling pattern of light weight.Wherein, on the one hand mirror image is in object-oriented Class, be equivalent to template;On the other hand be equivalent to a file system again, required program when in addition to providing container operation, library, Outside the files such as resource, configuration, some some configuration parameters (such as anonymous volumes, environmental variance, use to prepare when operation are further comprised Family etc.).And container is the equal of the entity that is created that according to this template of mirror image.
While the rapid development of Docker container technique, Docker vessel safety problem also has become users pass The focus of note, more and more potential Docker safety problems start to emerge.For mirror image, safety problem is mainly: exploitation Person is easy to leave down the sensitive information of some database passwords etc when constructing mirror image;Mirror image or society whether from official The mirror image in area, mirror image itself, which can also have many loopholes, may cause risk.Although mirror image is very high in terms of transmission and deployment Effect, but also the propagation for the malicious file of virus, back door etc provides convenience.
Summary of the invention
In view of this, the embodiment of the present application provides a kind of intelligentized Docker container malicious file detection method and dress It sets, it is intended to safety detection be carried out to the original image of Docker container from many aspects, to more thoroughly detect Docker Malicious file in the original image of container.
The embodiment of the present application first aspect provides a kind of intelligentized Docker container malicious file detection method, described Method is applied to server, which comprises
Multiple files in the original image of target Docker container are obtained, the target Docker container is to be detected Docker container;
For each file in the multiple file, using the malicious file condition code based on yara rule to this document It is detected, to judge whether this document is malicious file, obtains the first testing result;
For each file in the multiple file, this document is detected using antivirus software, to judge this article Whether part is malicious file, obtains the second testing result;
Obtain multiple web page files in the original image of the target Docker container;
For each web page files in the multiple web page files, which is inputted into Web page classifying model, with Detect whether the webpage is Webshell webpage backdoor file, obtains third testing result.
Optionally, the method also includes:
Multiple sample web page files are obtained, each sample web page file in the multiple sample web page file carries mark Note, which characterizes the static nature of the sample web page file, wherein a part in the multiple sample web page file is Webshell webpage backdoor file;
It is input with the multiple sample web page file, preset model is trained, the Web page classifying model is obtained, The Web page classifying model is for judging whether single web page files are Webshell webpage backdoor file.
Optionally, the static nature includes at least at least one of following characteristics: comentropy is overlapped index, maximum Word length, dangerous function number, file compression rate, Eval function number.
Optionally, for each file in the multiple file, the malicious file condition code based on yara rule is utilized This document is detected, to judge whether this document is malicious file, comprising:
Multiple disclosed malicious file condition codes based on yara rule are obtained, yara rule base is established;
For each file in the multiple file, whether detect in this document comprising the evil in the yara rule base Meaning file eigenvalue, wherein when this document includes the malicious file condition code in the yara rule base, determine that this document is Malicious file.
Optionally, the server is connect with client communication;The method also includes:
Receive the original image for the target Docker container that the client is sent;
First testing result, second testing result and the third testing result are sent to the client End.
Optionally, the server is connect with database communication;The method also includes:
First testing result, second testing result and the third testing result are stored in the data Library, so that the client obtains first testing result, second testing result and described by the database Third testing result.
The embodiment of the present application second aspect provides a kind of intelligentized Docker container malicious file detection device, described Device is applied to server, and described device includes:
First obtains module, multiple files in original image for obtaining target Docker container, the target Docker container is Docker container to be detected;
First detection module, for utilizing the malice based on yara rule for each file in the multiple file File eigenvalue detects this document, to judge whether this document is malicious file, obtains the first testing result;
Second detection module, for for each file in the multiple file, using antivirus software to this document into Row detection, to judge whether this document is malicious file, obtains the second testing result;
Second obtains module, multiple web page files in original image for obtaining the target Docker container;
Third detection module, each web page files for being directed in the multiple web page files are defeated by the web page files Enter webpage disaggregated model, to detect whether the webpage is Webshell webpage backdoor file, obtains third testing result.
Optionally, described device further include:
Third obtains module, each sample for obtaining multiple sample web page files, in the multiple sample web page file This web page files carries label, which characterizes the static nature of the sample web page file, wherein the multiple sample web page text A part in part is Webshell webpage backdoor file;
Training module is trained preset model, obtains described for being input with the multiple sample web page file Web page classifying model, the Web page classifying model is for judging whether single web page files are Webshell webpage backdoor file.
Optionally, the first detection module includes:
Setting up submodule establishes yara rule for obtaining multiple disclosed malicious file condition codes based on yara rule Then library;
Detection sub-module, whether for each file in the multiple file, detecting in this document includes the yara Malicious file condition code in rule base, wherein when this document includes the malicious file condition code in the yara rule base, Determine that this document is malicious file.
Optionally, the server is connect with client communication, described device further include:
Receiving module, for receiving the original image for the target Docker container that the client is sent;
Sending module is used for first testing result, second testing result and the third testing result It is sent to the client.
Using intelligentized Docker container malicious file detection method provided by the embodiments of the present application, server is directed to mesh Multiple files in the original image of Docker container are marked, it is examined using the malicious file condition code based on yara rule Survey, and it detected using antivirus software, web page files are also inputted into Web page classifying model, with detect the webpage whether be Webshell webpage backdoor file.
On the one hand, server is for multiple files in the original image of target Docker container, from multidimensional angle to it It is detected, specifically, using a variety of detection means such as malicious file condition code, antivirus software and Web page classifying models to it It is detected, every kind of detection means can detect the malicious file that the means are coped with, so as to more thoroughly detect Malicious file in the original image of Docker container.
On the other hand, the detection means such as server by utilizing malicious file condition code and antivirus software hold target Docker When multiple files in the original image of device are detected, known malicious file can be detected.And for current unknown evil Meaning file, this detection means of server by utilizing Web page classifying model, to multiple in the original image of target Docker container File is detected, to predict current unknown malicious file.To realize server to current unknown malicious file Intelligent measurement, improve the reliability of the detection function of server.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below by institute in the description to the embodiment of the present application Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the application Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is the flow chart for the intelligentized Docker container malicious file detection method that one embodiment of the application proposes;
Fig. 2 is the flow chart for the training method to Web page classifying model that one embodiment of the application proposes;
Fig. 3 is the schematic diagram for the intelligentized Docker container malicious file detection device that one embodiment of the application provides.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on this Shen Please in embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall in the protection scope of this application.
It is the intelligentized Docker container malicious file detection method that one embodiment of the application proposes with reference to Fig. 1, Fig. 1 Flow chart, this method are applied to server.As shown in Figure 1, method includes the following steps:
S11: obtaining multiple files in the original image of target Docker container, and the target Docker container is to be checked The Docker container of survey.
In the present embodiment, the original image of target Docker container refers to: being utilized when creating target Docker container Mirror image.
In the present embodiment, server can be connect with client communication, and server can be sent by receiving the client The target Docker container original image, to obtain the original image of the target Docker container.Server pair Acquired original image decompression, and then get multiple files in original image.Since server is connect with client, clothes Business device receives the original image for the target Docker container that client is sent, to hold to the Docker in client home environment Device safety is detected, on the one hand, client can by server to the Docker container security in home environment into Row detection, host where client need not execute detection operation, reduce client operating pressure.On the other hand, server can be with Arrangement is collected to the malicious file detected in original image transmitted by multiple client, to further increase server The detectability of itself.
Illustratively, client provides a user the interface UI (User Interface), and detects home environment (i.e. client Host where end) in mirror image, the mirror image that the machine is downloaded is presented to the user by client in the form of a list.Client, which receives, to be used Selection of the family to certain mirror images, and mirror image selected by user is transmitted to server.After the mirror image of packing is transmitted, clothes Business device returns to client and sends successful information.When client, which receives, sends successful information, client enters detection Interface is loaded, while sending the request detected to server.
S12: for each file in the multiple file, using the malicious file condition code based on yara rule to this File is detected, and to judge whether this document is malicious file, obtains the first testing result.
In the present embodiment, there are how many a malicious files for characterizing in multiple files for the first testing result.
Illustratively, such as each file in multiple files, the malicious file condition code based on yara rule is utilized After detecting to each file, 2 malicious files are detected in total, then first testing result can be " 2 ".Alternatively, the One testing result is presented in a manner of scoring safely, such as full marks are 100 points, and one malicious file of every detection deducts 10 points, example Such as each file in multiple files, each file is detected using the malicious file condition code based on yara rule Afterwards, 2 malicious files are detected in total, then the first testing result is " 80 points ".
In the present embodiment, for each file in multiple files, the malicious file feature based on yara rule is utilized When code detects this document, it may particularly include following steps:
S121: multiple disclosed malicious file condition codes based on yara rule are obtained, yara rule base is established;
S122: whether for each file in the multiple file, detecting in this document includes the yara rule base In malicious file condition code, wherein this document include the yara rule base in malicious file condition code when, determine should File is malicious file.
Illustratively, server obtains the spy of the malicious file based on yara rule from multiple disclosed yara Rule Information sources Code is levied, to establish the local yara rule base of server oneself.For each file in the multiple file, server is directed to The condition code of this document is matched one by one with multiple malicious file condition codes in the yara rule base of local, when this feature code with When a certain malicious file condition code matches, i.e., the malicious file condition code in yara rule base is contained in this document, it is determined that This document is malicious file.
S13: for each file in the multiple file, detecting this document using antivirus software, with judgement Whether this document is malicious file, obtains the second testing result.
In the present embodiment, there are how many a malicious files for characterizing in multiple files for the second testing result.
Illustratively, such as each file in multiple files, after being detected using antivirus software to this document, always 1 malicious file is detected altogether, then second testing result can be " 1 ".Alternatively, side of second testing result to score safely Formula is presented, such as full marks are 100 points, and one malicious file of every detection deducts 10 points, such as each text in multiple files Part after detecting using antivirus software to this document, detects 1 malicious file, then the second testing result is " 90 in total Point ".
Illustratively, for each file in multiple files, server by utilizing increases income antivirus software ClamAV successively to text Part is detected, and obtains the output information of open source antivirus software ClamAV, to realize the detection to malicious file.Open source antivirus Software ClamAV can farthest have found malicious file present in multiple files of the original image of Docker container, have Help realize the automatic identification to the known malicious file such as known sample and backdoor programs.
S14: multiple web page files in the original image of the target Docker container are obtained.
In the present embodiment, server can be connect with client communication, and server can be sent by receiving the client The target Docker container original image, to obtain the original image of the target Docker container.Server pair Acquired original image decompression, to get the All Files in original image.Server is from wherein filtering out the mesh Mark all web page files in the original image of Docker container.
S15: for each web page files in the multiple web page files, which is inputted into Web page classifying mould Type obtains third testing result to detect whether the webpage is Webshell webpage backdoor file.
In the present embodiment, there are after how many a Webshell webpages for characterizing in multiple web page files for third testing result Door file.
Illustratively, such as each web page files in multiple web page files, using Web page classifying model to the webpage After file is detected, 2 Webshell webpage backdoor files are detected in total, then the third testing result can be " 2 ".Or Person, third testing result are presented in a manner of scoring safely, such as full marks are 100 points, after one Webshell webpage of every detection Door file, deducts 10 points, such as each web page files in multiple web page files, using Web page classifying model to the webpage After file is detected, 2 Webshell webpage backdoor files are detected in total, then third testing result is " 80 points ".
In the present embodiment, Web page classifying model is obtained from first passing through training in advance to preset model.When training, obtain more A sample web page file, each sample web page file in the multiple sample web page file carry label, and label characterization should The static nature of sample web page file, wherein a part in the multiple sample web page file is Webshell webpage back door File;It is input with the multiple sample web page file, preset model is trained, the Web page classifying model, institute are obtained Web page classifying model is stated for judging whether single web page files are Webshell webpage backdoor file.Wherein, described static special Sign includes at least at least one of following characteristics: comentropy is overlapped index, maximum word length, dangerous function number, file The number of compression ratio, Eval function (function in program language).
It is the flow chart for the training method to Web page classifying model that one embodiment of the application proposes with reference to Fig. 2, Fig. 2.Tool Body collects number multiple Webshell webpage backdoor file samples and multiple normal web page files samples in training, from every Manual extraction goes out the effective static nature of malicious file in a sample, and such as comentropy is overlapped index, maximum word length, activation Function number, file compression rate, Eval function numbers etc. form eigenmatrix, using eigenmatrix as the input data of model, Using random forests algorithm training preset model, Web page classifying model is obtained.Server is by Web page classifying model realization pair The detection of unknown malicious file in the original image of Docker container.
The present embodiment is using machine learning techniques to the web page files other than yara rule base and antivirus software sphere of action It is predicted, more comprehensively can thoroughly detect the Webshell webpage that can't detect based on yara rule base and antivirus software Backdoor file, the recall rate of the further high safety problem to target Docker container.
In the above-mentioned method including step S11 to step S15, step S11 to step S13 embodies server can be from multiple The function of known malicious file is detected in file, step S14 to step S15 embodies server can be from multiple web page files In detect the function of unknown Webshell webpage backdoor file.
Using the above-mentioned method including step S11 to step S15, on the one hand, server is for target Docker container Multiple files in original image utilize a variety of detection hands such as malicious file condition code, antivirus software and Web page classifying model Section detects it, and every kind of detection means can detect the malicious file that the means are coped with, so as to more thoroughly examine Measure the malicious file in the original image of Docker container.
On the other hand, the detection means such as server by utilizing malicious file condition code and antivirus software hold target Docker When multiple files in the original image of device are detected, known malicious file can be detected.And for current unknown evil Meaning file, this detection means of server by utilizing Web page classifying model, to multiple in the original image of target Docker container File is detected, to predict current unknown malicious file.To realize server to current unknown malicious file Intelligent measurement, improve the reliability of the detection function of server.
Server is in the first testing result, the second testing result and the third obtained by step S11 to step S15 After testing result, first testing result, second testing result and the third testing result are also sent to visitor Family end.
In addition, server can also be connect with database communication, server will after step S11 to step S15 gained The first testing result, the second testing result and the third testing result deposit database arrived, so that client can pass through data Library obtains static detection result, the first dynamic detection result, the second dynamic detection result and third dynamic detection result.
Based on the same inventive concept, one embodiment of the application provides a kind of intelligentized Docker container malicious file detection Device.It is showing for the intelligentized Docker container malicious file detection device that one embodiment of the application provides with reference to Fig. 3, Fig. 3 It is intended to.As shown in figure 3, the device includes:
First obtains module 31, multiple files in original image for obtaining target Docker container, the target Docker container is Docker container to be detected;
First detection module 32, for utilizing the evil based on yara rule for each file in the multiple file Meaning file eigenvalue detects this document, to judge whether this document is malicious file, obtains the first testing result;
Second detection module 33, each file for being directed in the multiple file, using antivirus software to this document It is detected, to judge whether this document is malicious file, obtains the second testing result;
Second obtains module 34, multiple web page files in original image for obtaining the target Docker container;
Third detection module 35, each web page files for being directed in the multiple web page files, by the web page files It inputs Web page classifying model and obtains third testing result to detect whether the webpage is Webshell webpage backdoor file.
Optionally, described device further include:
Third obtains module, each sample for obtaining multiple sample web page files, in the multiple sample web page file This web page files carries label, which characterizes the static nature of the sample web page file, wherein the multiple sample web page text A part in part is Webshell webpage backdoor file;
Training module is trained preset model, obtains described for being input with the multiple sample web page file Web page classifying model, the Web page classifying model is for judging whether single web page files are Webshell webpage backdoor file.
Optionally, the first detection module includes:
Setting up submodule establishes yara rule for obtaining multiple disclosed malicious file condition codes based on yara rule Then library;
Detection sub-module, whether for each file in the multiple file, detecting in this document includes the yara Malicious file condition code in rule base, wherein when this document includes the malicious file condition code in the yara rule base, Determine that this document is malicious file.
Optionally, the server is connect with client communication, described device further include:
Receiving module, for receiving the original image for the target Docker container that the client is sent;
Sending module is used for first testing result, second testing result and the third testing result It is sent to the client.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple Place illustrates referring to the part of embodiment of the method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiments of the present application may be provided as method, apparatus or calculating Machine program product.Therefore, the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present application can be used one or more wherein include computer can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to a kind of intelligentized Docker container malicious file detection method provided herein and device, carry out It is discussed in detail, specific examples are used herein to illustrate the principle and implementation manner of the present application, above embodiments Explanation be merely used to help understand the present processes and its core concept;At the same time, for those skilled in the art, According to the thought of the application, there will be changes in the specific implementation manner and application range, in conclusion in this specification Hold the limitation that should not be construed as to the application.

Claims (10)

1. a kind of intelligentized Docker container malicious file detection method, which is characterized in that be applied to server, the method Include:
Multiple files in the original image of target Docker container are obtained, the target Docker container is to be detected Docker container;
For each file in the multiple file, this document is carried out using the malicious file condition code based on yara rule Detection, to judge whether this document is malicious file, obtains the first testing result;
For each file in the multiple file, this document is detected using antivirus software, to judge that this document is No is malicious file, obtains the second testing result;
Obtain multiple web page files in the original image of the target Docker container;
For each web page files in the multiple web page files, which is inputted into Web page classifying model, with detection Whether the webpage is Webshell webpage backdoor file, obtains third testing result.
2. the method according to claim 1, wherein the method also includes:
Multiple sample web page files are obtained, each sample web page file in the multiple sample web page file carries label, should Label characterizes the static nature of the sample web page file, wherein a part in the multiple sample web page file is Webshell webpage backdoor file;
It is input with the multiple sample web page file, preset model is trained, the Web page classifying model is obtained, it is described Web page classifying model is for judging whether single web page files are Webshell webpage backdoor file.
3. according to the method described in claim 2, it is characterized in that, the static nature includes at least in following characteristics at least A kind of: comentropy is overlapped index, maximum word length, dangerous function number, file compression rate, Eval function number.
4. the method according to claim 1, wherein utilizing base for each file in the multiple file This document is detected in the malicious file condition code of yara rule, to judge whether this document is malicious file, comprising:
Multiple disclosed malicious file condition codes based on yara rule are obtained, yara rule base is established;
For each file in the multiple file, whether detect in this document comprising the malice text in the yara rule base Part condition code, wherein when this document includes the malicious file condition code in the yara rule base, determine that this document is malice File.
5. method according to any one of claims 1 to 4, which is characterized in that the server is connect with client communication;Institute State method further include:
Receive the original image for the target Docker container that the client is sent;
First testing result, second testing result and the third testing result are sent to the client.
6. according to the method described in claim 5, it is characterized in that, the server is connect with database communication;The method Further include:
First testing result, second testing result and the third testing result are stored in the database, with Make the client obtain first testing result, second testing result and the third by the database to examine Survey result.
7. a kind of intelligentized Docker container malicious file detection device, which is characterized in that be applied to server, described device Include:
First obtains module, multiple files in original image for obtaining target Docker container, the target Docker Container is Docker container to be detected;
First detection module, for utilizing the malicious file based on yara rule for each file in the multiple file Condition code detects this document, to judge whether this document is malicious file, obtains the first testing result;
Second detection module, for being examined to this document using antivirus software for each file in the multiple file It surveys, to judge whether this document is malicious file, obtains the second testing result;
Second obtains module, multiple web page files in original image for obtaining the target Docker container;
Third detection module, for for each web page files in the multiple web page files, which to be inputted net Page disaggregated model obtains third testing result to detect whether the webpage is Webshell webpage backdoor file.
8. device according to claim 7, which is characterized in that described device further include:
Third obtains module, each sample net for obtaining multiple sample web page files, in the multiple sample web page file Page file carries label, which characterizes the static nature of the sample web page file, wherein in the multiple sample web page file A part be Webshell webpage backdoor file;
Training module is trained preset model, obtains the webpage for being input with the multiple sample web page file Disaggregated model, the Web page classifying model is for judging whether single web page files are Webshell webpage backdoor file.
9. device according to claim 7, which is characterized in that the first detection module includes:
Setting up submodule establishes yara rule base for obtaining multiple disclosed malicious file condition codes based on yara rule;
Whether detection sub-module detects in this document for each file in the multiple file comprising the yara rule Malicious file condition code in library, wherein when this document includes the malicious file condition code in the yara rule base, determine This document is malicious file.
10. device according to claim 7, which is characterized in that the server is connect with client communication, described device Further include:
Receiving module, for receiving the original image for the target Docker container that the client is sent;
Sending module, for sending first testing result, second testing result and the third testing result To the client.
CN201910445566.8A 2019-05-27 2019-05-27 A kind of intelligentized Docker container malicious file detection method and device Pending CN110210225A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910445566.8A CN110210225A (en) 2019-05-27 2019-05-27 A kind of intelligentized Docker container malicious file detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910445566.8A CN110210225A (en) 2019-05-27 2019-05-27 A kind of intelligentized Docker container malicious file detection method and device

Publications (1)

Publication Number Publication Date
CN110210225A true CN110210225A (en) 2019-09-06

Family

ID=67788697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910445566.8A Pending CN110210225A (en) 2019-05-27 2019-05-27 A kind of intelligentized Docker container malicious file detection method and device

Country Status (1)

Country Link
CN (1) CN110210225A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851824A (en) * 2019-11-13 2020-02-28 哈尔滨工业大学 Detection method for malicious container
CN112560018A (en) * 2020-12-23 2021-03-26 苏州三六零智能安全科技有限公司 Sample file detection method and device, terminal equipment and storage medium
CN113407935A (en) * 2021-06-16 2021-09-17 中国光大银行股份有限公司 File detection method and device, storage medium and server

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090088687A (en) * 2008-02-15 2009-08-20 한국정보보호진흥원 System for detecting webshell and method thereof
KR101080953B1 (en) * 2011-05-13 2011-11-08 (주)유엠브이기술 System and method for detecting and protecting webshell in real-time
CN107659570A (en) * 2017-09-29 2018-02-02 杭州安恒信息技术有限公司 Webshell detection methods and system based on machine learning and static and dynamic analysis
CN109067708A (en) * 2018-06-29 2018-12-21 北京奇虎科技有限公司 A kind of detection method, device, equipment and the storage medium at webpage back door
CN109583567A (en) * 2018-11-29 2019-04-05 四川大学 A kind of Web autoscanner fingerprint recognition model based on CNN
CN109657467A (en) * 2018-11-26 2019-04-19 北京兰云科技有限公司 A kind of webpage back door detection method and device, computer readable storage medium
CN109753798A (en) * 2018-12-11 2019-05-14 四川大学 A kind of Webshell detection model based on random forest and FastText
CN109800574A (en) * 2018-12-12 2019-05-24 中国人民公安大学 Computer Virus Detection Method and system based on cryptographic algorithm analysis

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090088687A (en) * 2008-02-15 2009-08-20 한국정보보호진흥원 System for detecting webshell and method thereof
KR101080953B1 (en) * 2011-05-13 2011-11-08 (주)유엠브이기술 System and method for detecting and protecting webshell in real-time
CN107659570A (en) * 2017-09-29 2018-02-02 杭州安恒信息技术有限公司 Webshell detection methods and system based on machine learning and static and dynamic analysis
CN109067708A (en) * 2018-06-29 2018-12-21 北京奇虎科技有限公司 A kind of detection method, device, equipment and the storage medium at webpage back door
CN109657467A (en) * 2018-11-26 2019-04-19 北京兰云科技有限公司 A kind of webpage back door detection method and device, computer readable storage medium
CN109583567A (en) * 2018-11-29 2019-04-05 四川大学 A kind of Web autoscanner fingerprint recognition model based on CNN
CN109753798A (en) * 2018-12-11 2019-05-14 四川大学 A kind of Webshell detection model based on random forest and FastText
CN109800574A (en) * 2018-12-12 2019-05-24 中国人民公安大学 Computer Virus Detection Method and system based on cryptographic algorithm analysis

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LOVEYOUYOU: ""Docker镜像扫描器的实现"", 《公众号名称为"REEBUF"的微信公众平台》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851824A (en) * 2019-11-13 2020-02-28 哈尔滨工业大学 Detection method for malicious container
CN112560018A (en) * 2020-12-23 2021-03-26 苏州三六零智能安全科技有限公司 Sample file detection method and device, terminal equipment and storage medium
CN112560018B (en) * 2020-12-23 2023-10-31 苏州三六零智能安全科技有限公司 Sample file detection method, device, terminal equipment and storage medium
CN113407935A (en) * 2021-06-16 2021-09-17 中国光大银行股份有限公司 File detection method and device, storage medium and server

Similar Documents

Publication Publication Date Title
US10402817B1 (en) Relaxed fraud detection for transactions using virtual transaction cards
US11570211B1 (en) Detection of phishing attacks using similarity analysis
CN109376078B (en) Mobile application testing method, terminal equipment and medium
CN106161342B (en) The dynamic optimization of safety applications
US11509667B2 (en) Predictive internet resource reputation assessment
Li et al. Block: a black-box approach for detection of state violation attacks towards web applications
CN107659570A (en) Webshell detection methods and system based on machine learning and static and dynamic analysis
CN110210225A (en) A kind of intelligentized Docker container malicious file detection method and device
CN104980404B (en) Method and system for protecting account information security
CN105793862B (en) Dynamic routine is guided execution in isolation environment
JPWO2018235252A1 (en) Analyzing device, log analyzing method, and analyzing program
CN106022112A (en) Configuring a sandbox environment for malware testing
CN108009425A (en) File detects and threat level decision method, apparatus and system
KR101858620B1 (en) Device and method for analyzing javascript using machine learning
US20180074818A1 (en) Source code mapping through context specific key word indexes and fingerprinting
CN110516173B (en) Illegal network station identification method, illegal network station identification device, illegal network station identification equipment and illegal network station identification medium
KR20190031030A (en) Method and system for identifying an open source software package based on binary files
CN107392028A (en) The detection method and its detection means of sensitive information, storage medium, electronic equipment
US11550707B2 (en) Systems and methods for generating and executing a test case plan for a software product
CN106030527B (en) By the system and method for application notification user available for download
CN114036501A (en) APP detection method, system, device, equipment and storage medium
US10817601B2 (en) Hypervisor enforcement of cryptographic policy
KR101115250B1 (en) Apparatus and method for checking safety of qr code
KR20160031589A (en) Malicious application detecting method and computer program executing the method
CN109582560A (en) Test file edit methods, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190906

RJ01 Rejection of invention patent application after publication