[1] |
2019中国主机安全服务报告[R].
|
|
2019 China Host Security Service Report[R].
|
[2] |
W3Techs W3Techs.Usage of server-side programming languages for websites[EB]. 2020.
|
[3] |
戴桦, 李景, 卢新岱 ,等. 智能检测Webshell的机器学习算法[J]. 网络与信息安全学报, 2017,3(4): 51-57.
|
|
DAI H , LI J , LU X D ,et al. Machine learning algorithm for intelligent detection of Webshell[J]. Chinese Journal of Network and Information Security, 2017,3(4): 51-57.
|
[4] |
XU M K , CHEN X , HU Y . Design of software to search ASP Web shell[J]. Procedia Engineering, 2012,29: 123-127.
|
[5] |
AI Z , LUKTARHAN N , ZHAO Y X ,et al. WS-LSMR:malicious WebShell detection algorithm based on ensemble learning[J]. IEEE Access, 2020,8: 75785-75797.
|
[6] |
崔艳鹏, 史科杏, 胡建伟 . 基于XGBoost算法的Webshell检测方法研究[J]. 计算机科学, 2018,45(S1): 375-379.
|
|
CUI Y P , SHI K X , HU J W . Research of webshell detection method based on XGBoost algorithm[J]. Computer Science, 2018,45(S1): 375-379.
|
[7] |
LI T T , REN C H , FU Y S ,et al. Webshell detection based on the word attention mechanism[J]. IEEE Access, 2019,7: 185140-185147.
|
[8] |
WU Y X , SUN Y Q , HUANG C ,et al. Session-based Webshell detection using machine learning in web logs[J]. Security and Communication Networks, 2019,2019: 1-11.
|
[9] |
YANG W C , SUN B , CUI B J . A Webshell detection technology based on HTTP traffic analysis[M]// Innovative Mobile and Internet Services in Ubiquitous Computing. Cham: Springer International Publishing, 2018, 336-342.
|
[10] |
ZHANG H , GUAN H C , YAN H B ,et al. Webshell traffic detection with character-level features based on deep learning[J]. IEEE Access, 2018,6: 75268-75277.
|
[11] |
RODOFILE N , RADKE K , FOO E . Real-time and interactive attacks on DNP3 critical infrastructure using Scapy[R]. 2015.
|
[12] |
BERNERS-LEE T , FIELDING R , MASINTER L . Uniform resource identifier (URI):generic syntax[R]. RFC Editor, 2005.
|
[13] |
STAROV O , DAHSE J , AHMAD S S ,et al. No honor among thieves:a large-scale analysis of malicious Web shells[C]// Proceedings of the 25th International Conference on World Wide Web. 2016: 1021-1032.
|
[14] |
BEAL M J , GHAHRAMANI Z , RASMUSSEN C E . The infinite hidden Markov model[C]// Advances in Neural Information Processing Systems. 2002: 577-584.
|
[15] |
ZHANG J , LI Z Y , NAI K ,et al. DELR:a double-level ensemble learning method for unsupervised anomaly detection[J]. Knowledge-Based Systems, 2019,181: 104783.
|
[16] |
GIACINTO G , ROLI F . An approach to the automatic design of multiple classifier systems[J]. Pattern Recognition Letters, 2001,22(1): 25-33.
|
[17] |
Scikit-learn website[EB].
|
[18] |
CHAWLA N V , BOWYER K W , HALL L O ,et al. SMOTE:synthetic minority over-sampling technique[J]. Journal of Artificial Intelligence Research, 2002,16: 321-357.
|
[19] |
KRSTINI? D , BRAOVI? M , ?ERI? L . Multi-label classifier performance evaluation with confusion matrix[C]// Proceedings of Computer Science & Information Technology. 2020: 1-14.
|