![]() ![]() What is more, we consider the text’s statistical characteristics, including the information entropy, the longest string, etc., to identify the obfuscated Python code. The model summarizes the common functional modules and functions in the backdoor files and extracts the number of calls in the text to form sample features. This paper proposes a Python backdoor detection model named PBDT based on combined features. Language differences make the method not entirely applicable. Previous research work was mainly focused on numerous PHP webshells, with less research on Python backdoor files. Thus, it is urgent to take adequate measures to defend such attacks. It has posed a serious threat to network security. Backdoor is a means by which attackers can invade the system to achieve illegal purposes and damage users’ rights. ![]() The experimental results reveal that present model has achieved 99.14% accuracy, 98.68% precision, 98.03% recall, and 98.35% f1 score, and the overall effect is better than the already existing JSP webshell detection approaches.Īpplication security is essential in today’s highly development period. Meanwhile, we introduce the XGBoost algorithm as the model classifier. The model’s fundamental premise is that it introduces the BERT-based word vector extraction method, which has been shown in experiments to be more effective at detecting obfuscation, encryption, and other means of evading detection than the traditional Word2vec word vector extraction method. This paper provides a novel webshell detection model for the JSP language. In this case, a detection approach for the JSP webshells is needed. At the same time, there are fewer detection techniques for JSP webshells. Meanwhile, there are variations between languages such as JSP and PHP, and researchers have proposed webshell detection methods primarily for languages such as PHP. In recent years, techniques such as obfuscation and encryption have been deployed on webshell technology, and classic detection approaches such as static feature matching are gradually underperforming on webshell detection. Detecting webshells is a key security concern for website administrators. ![]() Webshell is a malicious program that might result in data theft, file modification, or other damaging behaviors once uploaded to a server. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |