Webpage backdoor detection method and system based on data executable features

A web page backdoor and detection method technology, applied in the field of network security, can solve the problems of inability to detect and analyze, source code obfuscation encryption, etc., to achieve the effect of improving obfuscation encryption, increasing distinguishing ability, and reducing false positive rate

Active Publication Date: 2020-07-31
NAT UNIV OF DEFENSE TECH
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since statistical features can only be detected and analyzed from an overall point of view, due to the rapid development of current Web services, developers often obfuscate and encrypt the source code in order to avoid source code leakage, which leads to methods based on statistical features to detect web pages. A large number of false positives are generated during the backdoor, and effective detection and analysis cannot be carried out

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webpage backdoor detection method and system based on data executable features
  • Webpage backdoor detection method and system based on data executable features
  • Webpage backdoor detection method and system based on data executable features

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0044] This embodiment provides a backdoor detection method for web pages based on data executable features, refer to figure 1 with 2 , The method for detecting the webpage backdoor includes the following steps:

[0045] Step 1: Obtain the sample source code training set and source code to be tested.

[0046] In this embodiment, the sample source code training set includes normal sample source code and web page backdoor sample source code. The normal sample source code is the source code of the latest version of the well-known php language cms framework at home and abroad. The web page backdoor sample source code can be the open source PHP language web page in github. The backdoor collection items are formed after re-relocation and troubleshooting.

[0047] Step 2: Perform opcode code extraction and word frequency feature extraction on each sample s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a webpage backdoor detection method based on data executable features. The webpage backdoor detection method comprises the steps of obtaining a sample source code training setand a to-be-tested source code; performing opcode code extraction and word frequency feature extraction on each sample source code in the sample source code training set and the to-be-tested source code in sequence; performing data executable feature extraction on each sample source code in the sample source code training set and the to-be-tested source code to obtain data executable features of each sample source code and the to-be-tested source code; constructing feature matrixes corresponding to the sample source codes and the to-be-tested source code respectively; performing webpage backdoor detection training on the feature matrixes corresponding to the sample source codes to obtain a webpage backdoor detection model; and inputting the feature matrix corresponding to the to-be-testedsource code into the webpage backdoor detection model for webpage backdoor detection. The invention further discloses a storage medium and a system. According to the invention, the accuracy of webpagebackdoor detection can be effectively improved, and misinformation is reduced.

Description

Technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a webpage backdoor detection method and system based on data executable characteristics. Background technique [0002] With the rapid development of the Internet and the rapid popularization of web applications, web service attacks have become more frequent, and the implantation of webpage backdoors into target sites has become one of the most commonly used attack methods by attackers. Attackers use webpage backdoors to obtain system information. The command execution environment can further control the website server to achieve the purpose of information sniffing, data theft or tampering. In order to fight against Web service attacks, the research on backdoor detection of web pages has become one of the current important tasks. [0003] Web page backdoor detection technology is currently divided into two methods: dynamic feature detection and static feature detect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/563
Inventor 潘祖烈沈毅陈远超李阳赵军施凡陈燏
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products