A Method for Identifying Encrypted Webshell Traffic

Author:

Wu Qi1ORCID,Wen Shuo1ORCID,Liu Boliang1ORCID

Affiliation:

1. Guangdong Police College, China

Funder

The New Generation Information Technology Innovation Project of the China University Industry, University and Research Innovation Fund

Special Funds for the Cultivation of Guangdong College Students' Scientific and Technological Innovation (?Climbing Program?)

Guangdong Provincial Education Science Planning Project (Higher Education Special Project) Research on the Practical Teaching Reform of Cybersecurity and Law Enforcement Professional Courses under the Background of Science and Technology Police Development

Youth scientific research project of Guangdong police college

ooperative education project of industry university cooperation between Ministry of education and 360 enterprise security group -- Web Attack and Defense Technology (web security and operation)

Special Funds for the Cultivation of Guangdong College Students' Scientific and Technological Innovation (Climbing Program)

New Generation Information Technology Innovation Project of the China University Industry, University and Research Innovation Fund

Special Funds for the Cultivation of Guangdong College Students' Scientific and Technological Innovation (?Climbing Program? Special Funds)

Publisher

ACM

Reference17 articles.

1. Kim J , Yoo D H , Jang H , Web SHArk 1. 0 : a benchmark collection for malicious web shell detection . Journal of Information Processing Systems , 2015 , 11(2): 229 - 238 . Kim J, Yoo D H, Jang H, WebSHArk 1.0: a benchmark collection for malicious web shell detection. Journal of Information Processing Systems, 2015, 11(2): 229-238.

2. Yu B , Liu J W , Zhou Z. WADS : A Webshell Attack Defender Assisted by Software-Defined Networks//Information Security Practice and Experience: 16th International Conference , ISPEC 2021, Nanjing, China, December 17–19, 2021, Proceedings 16 . Springer International Publishing , 2021 : 209 - 222 . Yu B, Liu J W, Zhou Z. WADS: A Webshell Attack Defender Assisted by Software-Defined Networks//Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17–19, 2021, Proceedings 16. Springer International Publishing, 2021: 209-222.

3. Deng , L.Y. , Lee , D.L. , Chen , Y.H. , Yann , L.X. : Lexical analysis for the webshell attacks . In: 2016 International Symposium on Computer, Consumer and Control (IS3C) , pp. 579– 582 . IEEE (2016) Deng, L.Y., Lee, D.L., Chen, Y.H., Yann, L.X.: Lexical analysis for the webshell attacks. In: 2016 International Symposium on Computer, Consumer and Control (IS3C), pp. 579–582. IEEE (2016)

4. Tu T D , Guang C , Xiaojun G , Webshell detection techniques in web applications//Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT) . IEEE , 2014 : 1-7. Tu T D, Guang C, Xiaojun G, Webshell detection techniques in web applications//Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT). IEEE, 2014: 1-7.

5. Pan Z , Chen Y , Chen Y , Webshell detection based on executable data characteristics of php code. Wireless communications and mobile computing , 2021 , 2021: 1-12. Pan Z, Chen Y, Chen Y, Webshell detection based on executable data characteristics of php code. Wireless communications and mobile computing, 2021, 2021: 1-12.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3