2021
DOI: 10.1155/2021/5533963
|View full text |Cite
|
Sign up to set email alerts
|

Webshell Detection Based on Executable Data Characteristics of PHP Code

Abstract: A webshell is a malicious backdoor that allows remote access and control to a web server by executing arbitrary commands. The wide use of obfuscation and encryption technologies has greatly increased the difficulty of webshell detection. To this end, we propose a novel webshell detection model leveraging the grammatical features extracted from the PHP code. The key idea is to combine the executable data characteristics of the PHP code with static text features for webshell classification. To verify the propose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…Therefore, a webshell detection method based on statistical characteristics loses its original advantages. Pan et al [14] proposed a webshell detection method based on executable data features in PHP code. This method combines the characteristics of executable data from the PHP code with the characteristics of the static text to detect webshells.…”
Section: Static Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, a webshell detection method based on statistical characteristics loses its original advantages. Pan et al [14] proposed a webshell detection method based on executable data features in PHP code. This method combines the characteristics of executable data from the PHP code with the characteristics of the static text to detect webshells.…”
Section: Static Methodsmentioning
confidence: 99%
“…Regular expressions [13] were the earliest method used for webshell content detection. Its disadvantage is that it can only extract features from the existing known webshells, and it needs to be constantly updated [14]. D-Shield [15] is a currently popular static webshell detection tool.…”
Section: Introductionmentioning
confidence: 99%
“…ey innovatively used the FastText text classifier to characterize PHP's opcode sequence, integrating its classification results and statistical features as the Random Forest classifier's input. In addition to the statistical and opcode features mentioned above, Pan et al's [23] detection method of webshell used AST to obtain executable data features of PHP code, fully considering the execution data flow and function parameter characteristics of common system commands. e opcode sequence should be combined with the best n-gram value to effectively ensure the detection effect.…”
Section: Static Detectionmentioning
confidence: 99%
“…e majority of susceptible websites at this level are those that have been online for an extended period of time and heavily utilize PHP and JSP. Current research on PHP-type webshell attack [2][3][4][5][6][7] is enough, but research on JSP-type webshell detection is much lower than that on PHP-type webshell detection, so we need to propose a detection technique for JSP-type webshell. At the moment, webshell research is concentrated on static and dynamic detection.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, we produced some JSP webshells artificially to augment the real dataset, increase the number of data samples, and boost the detection effect. (4) We analyze and detect JSP files on the bytecode level to effectively identify obfuscated and encrypted webshells.…”
Section: Introductionmentioning
confidence: 99%