Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Webshell detection method and device based on artificial intelligence

A technology of artificial intelligence and detection methods, applied in the direction of neural learning methods, character and pattern recognition, instruments, etc., can solve the problems of difficult integration of webshell and achieve the effect of improving detection efficiency

Active Publication Date: 2020-09-01
北京金睛云华科技有限公司
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are also studies on the use of machine learning and deep learning, but how to combine different application scenarios of webshell is still difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webshell detection method and device based on artificial intelligence
  • Webshell detection method and device based on artificial intelligence
  • Webshell detection method and device based on artificial intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solution and advantages of the application clearer, the embodiments of the application will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0054]The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0055] figure 1 It is a flow chart of the artificial intelligence-based webshell detection method provided by this application. figure 1 The methods shown include:

[0056] Step A, obtaining the sample data of the webshell backdoor file;

[0057] The sample data of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a webshell detection method and device based on artificial intelligence. The method comprises the following steps: step A, acquiring sample data of a webshell backdoor file; B,performing feature extraction on a webshell backdoor file sample to generate feature vectors of supervised learning, the feature vectors of supervised learning including at least one of text features, byte code features and abnormal behavior features; C, respectively establishing a learning model of each feature vector according to the feature vectors of the supervised learning; and D, detectingthe network flow by using the learning model.

Description

technical field [0001] The present application relates to the fields of computer and artificial intelligence, in particular to an artificial intelligence-based webshell detection method and device. Background technique [0002] Webshell is often referred to as the intruder's authority to operate the website server to a certain extent through the website port, such as executing system commands, deleting web pages, modifying the homepage, file access, etc. The webshell attack is divided into two steps: 1. The attacker uses the vulnerability of the web server to implant a dynamic webshell script (also known as a backdoor or a Trojan horse) into it. These scripts are mixed with the normal webpage files in the WEB directory of the website server; 2. The attacker uses a browser to access the web and uploads it to the webshell script to obtain a command execution environment to achieve the purpose of controlling the website server. [0003] In related technologies, webshell detect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62G06N3/04G06N3/08
CPCH04L63/1408G06N3/08G06N3/045G06F18/24
Inventor 曲武邹荣珠
Owner 北京金睛云华科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products