Webshell detection method based on weighted fuzzy hash

A detection method and fuzzy technology, applied in encryption devices with shift registers/memory, digital transmission systems, electrical components, etc., can solve the problems of large differences in webshell size, poor adaptability, and poor detection effects, etc., to achieve Improve detection accuracy, improve anti-interference, and good adaptability

Active Publication Date: 2019-07-19
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF8 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional fuzzy hash algorithm directly applied to webshell detection can only resist a certain range of disturbances, generally within 6%, but for a larger range of redundant additions (more than 20%), its detection effect becomes very poor and its adaptability is not good it is good
Since the size of webshells varies greatly, changes in small webshell files can easily exceed the detection range of traditional fuzzy hash algorithms
[0014] (2) The traditional fuzzy hash algorithm is a universal algorithm for text similarity comparison. As a text with special functions, the key difference between webshell and ordinary text is the dangerous function. The traditional fuzzy hash algorithm does not didn't take this into account

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webshell detection method based on weighted fuzzy hash
  • Webshell detection method based on weighted fuzzy hash
  • Webshell detection method based on weighted fuzzy hash

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0077]In the existing technology, the traditional fuzzy hash algorithm can only resist a certain range of disturbances, generally within 6%, but for a larger range of redundant additions (over 20%), its detection effect becomes very poor, and its adaptability is not good . Since the size of webshells varies greatly, changes in small webshell files can easily exceed the fuzzy hash detection range. The traditional fuzzy hash algorithm is a universal algorithm for text similarity comparison. As a text with special functions, the key difference between webshell and ordinary text is the use of dangerous functions. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network space security, and discloses a webshell detection method and system based on a weighted fuzzy hash algorithm. A file to be detected is fragmented, the hash and weight of each fragment are solved, the weight is given to each fragment, the core fragment with the danger function is provided with a large weight, the information entropy of each fragment is considered at the same time, and the larger the information entropy value is, the smaller the given weight is; the hash of each fragment is spliced into a fuzzy hash string, and a total weight value is calculated to obtain a weighted fuzzy hash value; and the weighted fuzzy hash value of the to-be-detected file is compared with the weighted fuzzy hash value of each webshell pre-stored in the fingerprint database in sequence. Compared with a traditional fuzzy Hash algorithm, the method can effectively adapt to the situation that the size of a detected object changes greatly, has goodadaptability, greatly improves the detection accuracy of a variety sample, and improves the anti-interference performance.

Description

technical field [0001] The invention belongs to the technical field of network space security, and in particular relates to a webshell detection method and system based on weighted fuzzy hash. Background technique [0002] Currently, the closest prior art: [0003] Webshell is a malicious backdoor written in scripting languages ​​such as jsp, asp, php, etc. After an attacker uses website vulnerabilities such as sql injection and file upload to upload the webshell backdoor to obtain permissions, he can modify, delete or add server files by remotely executing commands. You can also view user data directly in the server database. [0004] Since the webshell operation will not leave records in the system security log and is mixed with normal webpage files, it is difficult for general administrators to see the traces of intrusion. Advanced webshell backdoors will also use various techniques to evade detection, so the research is efficient and accurate The demand for the webshel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L29/06
CPCH04L9/0643H04L63/1441H04L63/1416
Inventor 林宏刚陈麟黄元飞赖裕民张家旺李燕伟王鹏翩林星辰应志军吴倩杜薇陈禹张晓娜王博杨鹏高强陈亮
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products