Detection method used for Webshell

A detection result and file detection technology, which is applied in special data processing applications, instruments, electrical digital data processing, etc., can solve problems such as the inability of firewalls to intercept, and achieve the effect of reducing maintenance difficulty and improving work efficiency

Inactive Publication Date: 2015-07-08
CEPO BEIJING INFORMATION TECH CO LTD
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The attacker exchanges data through the legal port opened between the browser or the control terminal and the controlled WEB application syst

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method used for Webshell
  • Detection method used for Webshell
  • Detection method used for Webshell

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The invention provides a comprehensive detection method for detecting the website Webshell. In order to better illustrate the method and technology in the present invention, the present invention provides some specific illustrations. It should be noted that the illustrations given here are only examples of the present invention, and those skilled in the art can easily obtain other examples based on these examples. The technical solution in the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention.

[0027] The invention discloses a comprehensive detection method for Webshell detection, the processing flow is as follows figure 2 In the detection method of the present invention, the agent monitoring program operation flowchart and image 3 As shown in the flow chart of the cloud processing center in the detection method of the present invention:

[0028] Initialization: Deploy the monito...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a comprehensive detection method used for Webshell. The detection method is a high-order WEB file detection method which supports combination of multiple detection means, covers the full-life cycle of a website and can achieve pre-event detection, in-event warning and after-event tracing in order to solve the security problems of website Trojan embedding and website invisible back door implanting and perform website file security audit. Through installing a monitoring agent program on a WEB server, WEB file detection results are dynamically sent to a cloud management enter so that a comprehensive risk analysis can be performed on the results, and the cloud management center performs the comprehensive analysis according to data of multiple sources and establishes a statistics model for each file for dynamically detecting the changes of the files, so that WEB file risk management is achieved.

Description

technical field [0001] The invention relates to a comprehensive detection method of Webshell, which establishes a statistical model for all websites and website files by digging access website access records to track the threat value of website files. Background technique [0002] In recent years, hidden attacks such as websites being implanted with backdoors have been increasing year by year. The "2013 my country Internet Network Security Situation Summary" issued by the National Internet Emergency Center stated that in 2013, the National Internet Emergency Center found that 61,000 websites in my country had passed overseas Backdoors were implanted, an increase of 62.1% compared to 2012. Hackers usually use script Trojan horses to tamper with the application system, control the operating system, and steal sensitive data in the database after successfully exploiting the WEB application vulnerability. Such as figure 1 A typical system connection schematic diagram in the prio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30H04L29/08
Inventor 刘忠魁陈中祥任风伟
Owner CEPO BEIJING INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products