Webshell malicious family clustering analysis method

A cluster analysis and family technology, applied in the field of information security, can solve problems such as fast variant speed, fast malicious file variant speed, lack of detection, comparison and analysis, etc., to improve accuracy and precision, improve discovery efficiency, and reduce work. amount of effect

Active Publication Date: 2022-02-11
CENT SOUTH UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still some problems that need to be solved urgently in the practical application of Webshell. First, the variant speed of Webshell is fast. Because WebShell can be written in a variety of development languages, and it is easy to adapt it through program development methods such as obfuscation, encryption, and packing, resulting in The rapid variation of WebShell malicious files has greatly affected the accuracy and efficiency of malicious file detection methods; secondly, the traditional API call information-based malicious file detection methods have ignored some security vulnerabilities caused by function parameters. Lack of effective webshell malicious family clustering analysis methods to detect, compare and analyze malicious webshells

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webshell malicious family clustering analysis method
  • Webshell malicious family clustering analysis method
  • Webshell malicious family clustering analysis method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention is described below through specific embodiments shown in the accompanying drawings. It should be understood, however, that these descriptions are exemplary only and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0042] Here, it should also be noted that, in order to avoid obscuring the present invention due to unnecessary details, only the structures and / or processing steps closely related to the solution according to the present invention are shown in the drawings, and the related Other details are not relevant to the invention.

[0043] Such as figure 1 As shown, a webshell malicious family clustering analysis method includes the following steps:

[0044] Step 1:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a webshell malicious family clustering analysis method, and relates to the technical field of information security. The method comprises the following steps: step 1, obtaining function call information, parameter values and return value information during Webshell operation; step 2, cleaning, splicing and sequencing the function call information; 3, vectorizing the function call sequence information in the step 2; 4, calculating information entropies of the parameter values and the return values, and sorting according to a function calling sequence; 5, according to the func_seq, the argv_seq and the return_seq obtained in the step 2 and the step 4, building an RNN model to predict the three types of sequences respectively, and learning code family features; 6, after minhash processing is carried out on the original sequence data and the predicted sequence data, mapping the original sequence data and the predicted sequence data into pixel points, and thus, a pixel map is formed; 7, superposing the original pixel image obtained in the step 6 and the predicted pixel image, and drawing a final pixel image; and step 8, clustering the pixel image obtained in the step 7 by using a DBSCAN clustering algorithm.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for clustering and analyzing webshell malicious families. Background technique [0002] Webshell is a command execution environment written in a scripting language. An attacker can manipulate the server by uploading the script file to the server and hiding it in a benign file. At present, WebShell has become the primary source of harm affecting the security of cloud hosts. In order to prevent the intrusion of hackers and ensure the asset security of cloud users in real time, a high-accuracy and high-efficiency malicious Webshell detection method is very important. [0003] Traditional WebShell prevention and control methods are mostly based on predefined rules. The creation of new rules and the update of old rules are always slower than the speed of WebShell variants, making it easy for malicious files to bypass rule detection. In order to solv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/561
Inventor 周芳芳袁键陈茁王心远吕胜蓝范毅伦李影赵颖
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products