Method and device for detecting website backdoor program

A program detection and backdoor technology, applied in the Internet field, can solve problems such as lack of detection methods, website harm, and impact on website image, so as to achieve the effect of improving the security level and reducing the probability of harm.

Active Publication Date: 2014-02-26
三六零数字安全科技集团有限公司
View PDF8 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, for the backdoor program lurking in the client, the existing antivirus software can be used to detect and kill the process, but for the backdoor program lurking in the website, there is no effective detection method at present, and if such If the backdoor program is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting website backdoor program
  • Method and device for detecting website backdoor program
  • Method and device for detecting website backdoor program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] Embodiment one: see figure 1 , the process of backdoor program detection includes:

[0026] Step 101: Obtain web page parameters of log data of the website to be detected.

[0027] Generally, the log data of a website includes: host, time, IP address, Uniform Resource Locator (Uniform Resource Locator, URL), web page parameters and other information. The web page parameters of the log data of the website to be detected can be extracted.

[0028] Step 102: Match the obtained web page parameters with the characteristic data in the locally saved behavior database.

[0029] In the embodiment of the present invention, the behavior database has been saved locally, and the characteristic data in the behavior database are all formed according to the disclosed backdoor program. Therefore, the webpage parameters can be matched with the characteristic data in the locally saved behavior database.

[0030] Step 103: When there is the first characteristic data matching the web pag...

Embodiment 2

[0038] Embodiment 2: In the process of detecting backdoor programs, a locally stored behavior database is required, and this behavior database can be formed based on published backdoor programs. see figure 2 , the local preservation process of the behavior database in this embodiment includes:

[0039] Step 201: Obtain multiple backdoor programs that have been published.

[0040] Many common backdoor programs are generally disclosed, or some backdoor programs will be disclosed once they are detected. In this way, there will be many disclosed backdoor programs, and these disclosed multiple backdoor programs will be obtained automatically or manually.

[0041] Step 202: execute each obtained backdoor program as a backdoor sample one by one, and obtain corresponding behavior data.

[0042] After obtaining the backdoor program, it needs to be executed as a backdoor sample, so that the corresponding behavior data can be obtained.

[0043] Each obtained backdoor program can be e...

Embodiment 3

[0049] Embodiment 3: In this implementation, the log data of the website to be detected is analyzed to determine the backdoor program in the website to be detected. For the specific process, see image 3 ,include:

[0050] Step 301: Analyze the website log files of the website to be detected, and identify each piece of log data in the website log files.

[0051] For example: record the website log files of the website to be detected through the CDN, analyze the website log files, and identify each piece of log data in the website log files.

[0052] Step 302: Use the identified piece of log data as current log data.

[0053] The log data includes basic information such as host, time, IP address, URL, web page parameters, etc., preferably, cookie information may also be included.

[0054] A piece of log data among the identified log data can be used as the current log data according to the set rules, for example: in chronological order, or in the order of the set hosts, etc.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for detecting a website backdoor program, which are used for improving security level of the website. The method comprises the following steps of: obtaining webpage parameters of log data of a to-be-detected website; matching the webpage parameters with characteristic data locally stored in a behavior database; obtaining a source code of a corresponding webpage file when first characteristic data matched with the webpage parameters exists in the behavior database; and determining the backdoor program in the to-be-detected website by the source code.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and device for detecting a website backdoor program. Background technique [0002] Backdoor programs generally refer to program methods that bypass security controls to gain access to programs or systems. During the development phase of software, programmers often create backdoor programs in the software so that defects in the program design can be modified. However, if these backdoors are known to others, or if the backdoors are not removed before the software is released, then it becomes a security risk and is easily attacked by hackers as vulnerabilities. Therefore, a backdoor program is also called a Trojan horse, and its purpose is to lurk in the system to collect information or facilitate the entry of hackers. [0003] At present, for the backdoor program lurking in the client, the existing antivirus software can be used to detect and kill the process, but f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/56G06F17/30
Inventor 董方
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products