Web backdoor path detection method
A path detection and backdoor technology, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve problems such as isolated chains and difficulty for administrators to find
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] Embodiment 1, web backdoor path detection method, such as Figure 1-3 As shown, there are three stages:
[0046] 1. Knowledge collection stage:
[0047] a), collect the existing WEB backdoor through the corresponding knowledge base, as path and file name features;
[0048] b) Collect commonly used English words as file name features;
[0049] c) Collect commonly used names as file name features.
[0050] 2. Target website identification stage:
[0051] Crawl the directory tree and website URL tree of the target website.
[0052] 3. Suspicious path identification stage:
[0053] a) According to the path and file name features collected in the knowledge collection stage 1, combined with the directory tree collected in the target website identification stage 2, the URL to be detected is combined.
[0054] b), remove the URL in the website URL tree in the URL collection to be detected, as the path to be detected;
[0055] c), access the path to be detected, identify ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


