Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Webshell detection and response system

A technology for systems and Trojans, applied in the field of network Trojan backdoor detection/response systems, which can solve problems such as insufficient professional knowledge and difficulty in responding quickly.

Inactive Publication Date: 2014-08-06
MNEMONIC SECURITY
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] But this existing network Trojan horse backdoor detection technology also needs to additionally set the network Trojan horse backdoor detection application program compiled with binary file form in the detection object server to detect the network Trojan horse backdoor. The possibility of conflicts with other applications in (processing), and additional management personnel are required for the detection of network Trojan horse backdoors, and when accidents occur due to network Trojan horse backdoors, there is a lack of professional knowledge of network Trojan horse backdoors. Difficult to address quickly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webshell detection and response system
  • Webshell detection and response system
  • Webshell detection and response system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Hereinafter, the preferred embodiments described with reference to the accompanying drawings are described in detail in order to make it easy for those of ordinary skill in the art to which the present invention belongs to understand and reproduce.

[0026] In the process of describing the present invention, if it is determined that the specific description of the related known function or structure will have an unnecessary influence on the understanding of the gist of the embodiment of the present invention, the detailed description will be omitted.

[0027] The terms used in the full text of the specification of the present invention are terms defined in consideration of the functions in the embodiments of the present invention. They can be fully deformed according to the intentions and conventions of the users or operators. Therefore, the definitions of these terms should be based on this specification. Explain based on the overall content.

[0028] figure 1 It is a network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A webshell detection and response system is provided. The webshell detection and response system may collect information from a detection target server through an information collection script inserted into a webpage home path of the detection target server without installing a separate web shell detection application compiled in the form of binary file in the detection target server, and determine whether the detection target server is infected with a webshell remotely using the collected information.

Description

Technical field [0001] The present invention relates to a network Trojan horse backdoor (Webshell) detection technology, in particular to a network Trojan horse backdoor detection / response system. The system does not need to set an additional network Trojan horse backdoor detection application program compiled into a binary file in the detection target server , It can also easily detect the network Trojan backdoor in the detection target server. Background technique [0002] The network Trojan backdoor (Webshell) refers to the asp, php, jsp, cgi and other network script (Web Script) files created by the attacker to remotely execute commands on the target server. After the attacker uses the network Trojan horse backdoor to obtain the administrator authority of the intrusion target server, he can perform various attacks on the intrusion target server such as browsing the source code of the webpage, the loss of the content in the intrusion target server, and the setting of the backd...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1483B42D5/047B42P2221/02
Inventor 李在佑
Owner MNEMONIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products