Unlock instant, AI-driven research and patent intelligence for your innovation.

Web backdoor path detection method

A path detection and backdoor technology, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve problems such as isolated chains and difficulty for administrators to find

Active Publication Date: 2022-03-18
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] After hackers invade the website, they will put the backdoor file in a relatively hidden location, usually an isolated link, which is difficult for administrators to find

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web backdoor path detection method
  • Web backdoor path detection method
  • Web backdoor path detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] Embodiment 1, web backdoor path detection method, such as Figure 1-3 As shown, there are three stages:

[0046] 1. Knowledge collection stage:

[0047] a), collect the existing WEB backdoor through the corresponding knowledge base, as path and file name features;

[0048] b) Collect commonly used English words as file name features;

[0049] c) Collect commonly used names as file name features.

[0050] 2. Target website identification stage:

[0051] Crawl the directory tree and website URL tree of the target website.

[0052] 3. Suspicious path identification stage:

[0053] a) According to the path and file name features collected in the knowledge collection stage 1, combined with the directory tree collected in the target website identification stage 2, the URL to be detected is combined.

[0054] b), remove the URL in the website URL tree in the URL collection to be detected, as the path to be detected;

[0055] c), access the path to be detected, identify ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a web backdoor path detection method, which is used to obtain the collection path set $Webshell_Path and the file name collection $Webshell_Name; use a web crawler to crawl along the homepage of the website to obtain the directory tree $Web_Catalog, URL tree $Web_Url_Tree, and the website Root directory $Web_Root, custom error page $Error_Page; according to the collection path collection $Webshell_Path, file name collection $Webshell_Name, directory tree $Web_Catalog and URL tree $Web_Url_Tree to obtain the URL collection $Target_Url to be detected; the present invention is implanted by hackers on the website After the WEB backdoor, a batch of possible WEB paths can be given to provide support for the subsequent analysis of the WEB backdoor. The invention proposes a method for detecting a WEB backdoor path, through which the suspicious path of a website can be detected, providing support for further detection of the WEB backdoor.

Description

technical field [0001] The invention relates to a detection scheme of a WEB backdoor path, in particular to a method for detecting a web backdoor path. Background technique [0002] WEB backdoor: WEB backdoor is a command execution environment in the form of web pages such as ASP, PHP, JSP or CGI, which can also be called webshell. After a hacker has invaded a website, he usually mixes the ASP or PHP backdoor file with the normal webpage files in the WEB directory of the website server, and then he can use a browser to access the ASP or PHP backdoor to obtain a command execution environment to achieve To control the purpose of the web server. [0003] Web crawler technology: The first step in active detection of WEB backdoors is to identify suspicious WEB paths. Usually, web crawlers traverse the entire website directory and files to obtain the path tree of the website. However, because the WEB backdoor is implanted by hackers through website vulnerabilities, it is placed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/02
CPCH04L63/1433H04L63/1466H04L67/02
Inventor 娄宇范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD