skip to main content
10.1145/3058060.3058083acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccspConference Proceedingsconference-collections
research-article

A Matrix Decomposition based Webshell Detection Method

Authors Info & Claims
Published:17 March 2017Publication History

ABSTRACT

WebShell is a web based network backdoor. With the help of WebShells, the hacker can take any control of the web services illegally. The current method of detecting WebShells is just matching the eigenvalues or detecting the produced flow or services, which is hard to find new kinds of WebShells. To solve these problems, this paper analyzes the different features of a page and proposes a novel matrix decomposition based WebShell detection algorithm. The algorithm is a supervised machine learning algorithm. By analyzing and learning features of known existing and non-existing WebShell pages, the algorithm can make predictions on the unknown pages. The experimental results show that, compared with traditional detection methods, this algorithm spends less time, has higher accuracy and recall rate, and can detect new kinds of WebShells with a certain probability, overcoming the shortcomings of the traditional feature matching based method, improving the accuracy and recalling rate of WebShell detection.

References

  1. Xia, Y., Ren, X., Peng, Z., Zhang, J., & She, L. (2014). Effectively identifying the influential spreaders in large-scale social networks. Multimedia Tools and Applications, 1--13.Google ScholarGoogle Scholar
  2. Tu, T. D., Guang, C., Xiaojun, G., & Wubin, P. (2014, July). Webshell detection techniques in web applications. In 2014 International Conference on Computing, Communication and Networking Technologies (ICCCNT), (pp. 1--7). IEEE.Google ScholarGoogle Scholar
  3. Stranieri, A., & Zeleznikow, J. (2002). WebShell: The development of web based expert systems. In Research and Development in Intelligent Systems XVIII (pp.245-258). Springer London. Google ScholarGoogle ScholarCross RefCross Ref
  4. Zhao, X., Liu, H., Xue, G., & Cao, W. (2014, December). Analysis of trojan horse events by query of vulnerability information in searching engines. In 2014 Seventh International Symposium on Computational Intelligence and Design (ISCID), (Vol. 2, pp. 268--271). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Attack and Precaution of Webpage Trojan[J]. Computer Knowledge and Technology, 2014 (2X): 932-934.Google ScholarGoogle Scholar
  6. Mingkun, X., Xi, C., & Yan, H. (2012). Design of software to search ASP web shell. Procedia Engineering, 29, 123--127. Google ScholarGoogle ScholarCross RefCross Ref
  7. Liu, X., Xia, Y., Chen, W., Xiang, Y., Hassan, M. M., & Alelaiwi, A. (2016). SEMD: Secure and Efficient Message Dissemination with Policy Enforcement in VANET. Journal of Computer and System Sciences. 1316--1328. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Xia, Y., Liu, X., Xia, F., & Wang, G. (2016). A reduction of security notions in designated confirmer signatures. Theoretical Computer Science, 618, 1--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Le, V. G., Nguyen, H. T., Lu, D. N., & Nguyen, N. H. (2016, September). A Solution for Automatically Malicious Web Shell and Web Application Vulnerability Detection. In International Conference on Computational Collective Intelligence (pp. 367--378). Springer International Publishing. Google ScholarGoogle ScholarCross RefCross Ref
  10. HU, J., XU, Z., MA, D., & Yang, J. (2012). Research of Webshell Detection Based on Decision Tree [J]. Journal of Network New Media, 6, 005.Google ScholarGoogle Scholar
  11. Ye F, Gong J, Yang W. (2015). Black Box Detection of Webshell Based on Support Vector Machine[J]. Journal of Nanjing University of Aeronautics and Astronautics, 2015, 47(6): 924-930.Google ScholarGoogle Scholar
  12. Murphy, K. P. (2012). Machine learning: a probabilistic perspective. MIT press.Google ScholarGoogle Scholar
  13. Bishop, C. M. (2006). Pattern recognition. Machine Learning, 128.Google ScholarGoogle Scholar
  14. Lee, D. D., & Seung, H. S. (2001). Algorithms for non-negative matrix factorization. In Advances in neural information processing systems (pp. 556--562).Google ScholarGoogle Scholar
  15. Langley, P. (1994, November). Selection of relevant features in machine learning. In Proceedings of the AAAI Fall symposium on relevance (Vol. 184, pp. 245--271).Google ScholarGoogle Scholar
  16. Schorfheide, F. (2000). Loss function-based evaluation of DSGE models. Journal of Applied Econometrics, 15(6), 645--670. Google ScholarGoogle ScholarCross RefCross Ref
  17. Cohen, F. E., & Sternberg, M. J. (1980). On the prediction of protein structure: the significance of the root-mean-square deviation. Journal of molecular biology, 138(2), 321--333. Google ScholarGoogle ScholarCross RefCross Ref
  18. Sokolova, M., Japkowicz, N., & Szpakowicz, S. (2006, December). Beyond accuracy, F-score and ROC: a family of discriminant measures for performance evaluation. In Australasian Joint Conference on Artificial Intelligence (pp. 1015--1021). Springer Berlin Heidelberg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Hosmer, D. W., & Lemeshow, S. (2000). Introduction to the logistic regression model. Applied Logistic Regression, Second Edition, 1--30. Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICCSP '17: Proceedings of the 2017 International Conference on Cryptography, Security and Privacy
    March 2017
    153 pages
    ISBN:9781450348676
    DOI:10.1145/3058060

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 March 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader