[1] |
国家互联网应急响应中心. 2020 年我国互联网网络安全态势综述[EB].
|
|
CNCERT/CC. Overview of China’s Internet security posture in 2020[EB].
|
[2] |
BEHRENS S , HAGEN B . Web shell detection using NeoPI[EB].
|
[3] |
石刘洋, 方勇 . 基于Web日志的Webshell检测方法研究[J]. 信息安全研究, 2016,2(1): 66-73.
|
|
SHI L Y , FANG Y . Research on Webshell detection method based on Web log[J]. Journalof Information Security Research, 2016,(1): 66-73.
|
[4] |
YANG C H , SHEN C H . Implement web attack detection engine with snort by using modsecurity core rules[C]// Fourth the E-Learning and Information Technology Symposium (EITS 09). 2009.
|
[5] |
宋明璐 . 基于主动学习的CNN Webshell检测[D]. 北京:北京交通大学, 2021.
|
|
SONG M L . CNN Webshell detection based on active learning[D]. Beijing:Beijing Jiaotong University, 2021.
|
[6] |
龙啸, 方勇, 黄诚 ,等. Webshell 研究综述:检测与逃逸之间的博弈[J]. 网络空间安全, 2018,9(1): 62-68.
|
|
LONG X , FANG Y , HUANG C ,et al. Webshell research review:the confrontation between detection and escape[J]. Cyber Security, 2018,9(1): 62-68.
|
[7] |
STAROV O , DAHSE J , AHMAD S S ,et al. No honor among thieves:A large-scale analysis of malicious web shells[C]// Proceedings of the 25th International Conference on World Wide Web. 2016: 1021-1032.
|
[8] |
赵运弢, 徐春雨, 薄波 ,等. 基于流量的WebShell行为分析与检测方法[J]. 网络安全技术与应用, 2018,18(4): 8-9.
|
|
ZHAO Y T , XU C Y , BAO B ,et al. WebShell behavior analysis and detection method based on traffic[J]. Network Security Technology&Application, 2018,18(4): 8-9.
|
[9] |
HAAS S , SOMMER R , FISCHER M . Zeek-osquery:host-network correlation for advanced monitoring and intrusion detection[C]// IFIP International Conference on ICT Systems Security and Privacy Protection. Springer,Cham, 2020: 248-262.
|
[10] |
SANJAPPA S , AHMED M . Analysis of logs by using logstash[C]// Proceedings of the 5th International Conference on Frontiers in Intelligent Computing:Theory and Applications. Springer,Singapore, 2017: 579-585.
|
[11] |
CHEN L , LIU J , XIAN M ,et al. Docker container log collection and analysis system based on ELK[C]// 2020 International Conference on Computer Information and Big Data Applications (CIBDA). IEEE, 2020: 317-320.
|
[12] |
HARREMO?S P , TOPSOE F . Inequalities between entropy and index of coincidence derived from information diagrams[J]. IEEE Transactions on Information Theory, 2001,47(7): 2944-2960.
|
[13] |
曾理, 叶晓舟, 王玲芳 . DPDK 技术应用研究综述[J]. 网络新媒体技术, 2020,9(2): 1-8.
|
|
ZENG L , YE X Z , WANG L F . Summary of DPDK Technology Application Research[J]. Journal of Network New Media, 2020,9(2): 1-8.
|
[14] |
刘奕, 李建华, 张一瑫 ,等. 基于特征属性信息熵的网络异常流量检测方法[J]. 信息网络安全, 2021,21(2): 78-86.
|
|
LIU Y , LI J H , ZHANG Y T ,et al. Network abnormal traffic detec-tion method based on characteristic attribute information entropy[J]. Netinfo Security, 2021,21(2): 78-86.
|
[15] |
HESTERMAN J Y , CAUCCI L , KUPINSKI M A ,et al. Maximumlikelihood Estimation With a Contracting-grid Search Algorithm[J]. IEEE Transactions on Nuclear Science, 2010,57(3): 1077-1084.
|
[16] |
SHARAFALDIN I , LASHKARI A H , GHORBANI A A . Toward generating a new intrusion detection dataset and intrusion traffic characterization[C]// International Conference on Information Systems Security & Privacy (ICISSP). 2018: 108-116.
|
[17] |
WU Y , SUN Y , HUANG C ,et al. Session-based webshell detection using machine learning in web logs[J]. Security and Communication Networks,2019, 2019.
|