Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

WEB backdoor detection method and system based on relevance tree

A detection method and backdoor technology, applied in transmission systems, special data processing applications, instruments, etc., can solve the problems that detection methods are difficult to detect quickly and accurately, feature code confusion or concealment, etc., to achieve good versatility, improve security, Efficient effect

Active Publication Date: 2014-02-05
INST OF INFORMATION ENG CAS
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with binary-encoded programs, WEBshell is a plain text file, which is easy to transform and flexible to use scripts. It is easy to confuse or hide signatures, which makes it difficult for detection methods based on signature matching to detect quickly and accurately.
Traditional anti-virus, firewall and other methods are powerless against WEB backdoor programs, and new security methods must be adopted to ensure server security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WEB backdoor detection method and system based on relevance tree
  • WEB backdoor detection method and system based on relevance tree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037]The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. It should be understood that the described embodiments are only some of the embodiments of the present invention, not all of them. example. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0038] Such as figure 1 Shown is the flow chart of the website WEB link association tree generation method in an embodiment of the WEB backdoor detection method based on the association tree of the present invention, when the attacker visits the WEB backdoor WEB page of its implantation, the system quickly inquires about the backdoor URL request, When it is found that it is not in the link association tree, and it is confirmed that i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a WEB backdoor detection method and system based on a relevance tree. The WEB backdoor detection system comprises a link relevance tree generation module and an attack real-time detection module. The detection system does not depend on antivirus software or file feature detection software, instead, initiative crawling and access record collecting are conducted on WEB links first, a link set of all URLs of a WEB is established through analysis and process, and the link and skip relation of the URLs is marked in a computerized algorithm in a tree mode, so that a link relevance tree is formed. If a backdoor URL request does not exist in the link relevance tree, a security monitoring module of the system gives an alarm, and the attack request is stopped. By means of the detection method, the safety of WEB application is improved, the problem of WEB backdoor attack which can not be detected and prevented by security products such as the antivirus software and a firewall is solved, the university is good, there is no need to mount software programs on a WEB server, and the type of the WEB server, WEB programming languages, customer usage and the like are all made to be transparent.

Description

technical field [0001] The invention relates to a WEB backdoor detection method and system, in particular to a WEB backdoor detection method and system based on an association tree, and belongs to the fields of computer network security and information security. Background technique [0002] At present, WEB applications have occupied the main position of network applications. With the vigorous development of WEB applications, there are overwhelming WEB application security problems, and WEB application security is facing a great threat. With the continuous development of WEB technology and the improvement of network attack technology, the attack methods against WEB applications are also changing with each passing day. As WEB business platforms are widely used in all walks of life, attackers also shift their attention from attacks on network servers to attacks on WEB services. At this level, attackers can use security holes to gain control of WEB servers. Steal important int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F17/30
Inventor 马多贺徐震杨婧宋晨吕双双李乃山
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products