[1] |
Compromised web servers and web Shells[Z]. 2017.
|
[2] |
YANG W , SUN B , CUI B . A Webshell detection technology based on http traffic analysis[C]// Proceedings of International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Berlin:Springer, 2018.
|
[3] |
赵运弢, 徐春雨, 薄波 ,等. 基于流量的 Webshell 行为分析与检测方法[J]. 网络安全技术与应用, 2018 (4): 8-9.
|
|
ZHAO Y T , XU C Y , BAO B ,et al. Webshell behavior analysis and detection method based on traffic[J]. Network Security Technology and Application, 2018 (4): 8-9.
|
[4] |
王应军 . 基于流量的 Webshell 通信识别[D]. 武汉:武汉大学, 2018.
|
|
WANG Y J . Webshell communication recognition based on traffic[D]. Wuhan:Wuhan University, 2018.
|
[5] |
TIAN Y , WANG J , ZHOU Z ,et al. CNN-Webshell:malicious Webshell detection with convolutional neural network[C]// Proceedings of the 2017 VI International Conference.[S.l.:s.n. ], 2017.
|
[6] |
KIM J , YOO D H , JANG H ,et al. WebShark 1.0:a benchmark collection for malicious Webshell detection[J]. Journal of Information Processing Systems, 2015,11(2): 229-238.
|
[7] |
TU D T , CHENG G , GUO X J , ,et al. Webshell detection techniques in Web applications[C]// Proceedings of International Conference on Computing,Communication and Networking Technologies (ICCCNT). Piscataway:IEEE Press, 2014.
|
[8] |
HUANG Y W , TSAI C H , LIN T P ,et al. A testing framework for Web application security assessment[J]. Computer Networks, 2005,48(5): 739-761.
|
[9] |
SOOEL S , VITALY S . Saferphp:finding semantic vulnerabilities in PHP applications[C]// Proceedings of ACM SIGPLAN Workshop on Programming Languages & Analysis for Security. New York:ACM Press, 2011.
|
[10] |
WASSERMANN G , SU Z . Sound and precise analysis of web applications for injection vulnerabilities[J]. ACM SIGPLAN Notices, 2007,42(6):32.
|
[11] |
GARY W , SU Z D . Static detection of cross-site scripting vulnerabilities[C]// Proceedings of ACM/IEEE International Conference on Software Engineering. Piscataway:IEEE Press, 2008.
|
[12] |
XIE Y , AIKEN A . Static detection of security vulnerabilities in scripting languages[J]. USENIX Security Symposium, 2006(15): 179-192.
|
[13] |
EE M , LEE Y , YOON H . An enhanced rule-based web scanner based on similarity score[J]. Advances in Electrical and Computer Engineering, 2016,16(3): 9-14.
|
[14] |
ANG X , WANG L , WEI G ,et al. Hidden web crawling for SQL injection detection[C]// Proceedings of IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT). Piscataway:IEEE Press, 2010.
|
[15] |
ALMGREN M , DEBAR H , DACIER M . A lightweight tool for detecting web server attacks[C]// Proceedings of ISOC Network and Distributed System Security Symposium.[S.l.:s.n]. 2000.
|
[16] |
KRUEGEL C , VIGNA G . Anomaly detection of web-based attacks[C]// Proceedings of the 10th ACM Conference on Computer and Communications Security. New York:ACM Press, 2003: 251-261.
|
[17] |
ROBERTSON W , VIGNA G , KRUEGEL C ,et al. Using generalization and characterization techniques in the anomaly-based detection of Web attacks[C]// Proceedings of ISOC Network and Distributed System Security Symposium.[S.l.:s.n. ], 2006.
|
[18] |
KO C , RUSCHITZKA M , LECITTK . Execution monitoring of security-critical programs in distributed systems:A specification-based approach[C]// Proceedings of 1997 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 1997: 175-187.
|
[19] |
PREM U , SEKAR R . Experiences with specification-based intrusion detection[C]// Proceedings of International Workshop on Recent Advances in Intrusion Detection. Berlin:Springer, 2001: 172-189.
|
[20] |
HOSSAIN M N , MILAJERDI S M , WANG J ,et al. Sleuth:real-time attack scenario reconstruction from cots audit data[C]// Proceedings of 26th Security Symposium.[S.l.:s.n]. 2017: 487-504.
|
[21] |
STAROV O , DAHSE J , AHMADS S ,et al. No honor among thieves:A large-scale analysis of malicious Webshells[C]// Proceedings of the 25th International Conference on World Wide Web.[S.l.:s.n]. 2016: 1021-1032.
|
[22] |
CUI H , HUANG D , FANG Y ,et al. Webshell detection based on random forest–gradient boosting decision tree algorithm[C]// Proceedings of 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). Piscataway:IEEE Press, 2018: 153-160.
|
[23] |
OHN T . JohnTroony’s php-Webshells repository[EB]. 2016.
|
[24] |
IKICAT. Nikicat’s web-malware-collection repository[EB]. 2016.
|
[25] |
Ennc’s Webshell Repository. Tennc’s Webshell repository[EB]. 2016.
|
[26] |
HANG Z , LI M , ZHU L ,et al. Smart detect:a smart detection scheme for malicious Webshell codes via ensemble learning[C]// Proceedings of International Conference on Smart Computing and Communication. Berlin:Springer, 2018.
|
[27] |
HAITIN. Webshell detector[EB]. 2018.
|
[28] |
HU T , QU Z , XU H ,et al. Risk Cog:unobtrusive real-time user authentication on mobile devices in the wild[J]. IEEE Transactions on Mobile Computing, 2019,19(2): 466-483.
|