An Efficient Hybrid Webshell Detection Method for Webserver of Marine Transportation Systems

被引:18
作者
Le, Ha, V [1 ]
Nguyen, Tu N. [2 ]
Nguyen, Hoa N. [1 ]
Le, Linh [2 ]
机构
[1] VNU Univ Engn & Technol, Dept Informat Syst, Hanoi 100000, Vietnam
[2] Kennesaw State Univ, Coll Comp & Software Engn, Marietta, GA 30060 USA
关键词
Malware; Codes; Deep learning; Computer hacking; Pattern matching; Payloads; Indexes; Obfuscation webshells; webshell detection; deep learning; pattern matching; maritime intelligent transportation systems;
D O I
10.1109/TITS.2021.3122979
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
An increase in the number of Maritime Intelligent Transport Systems (MITSs) also means an increase in the number of information security risks. Usually, the administration and operation of MITSs are done through web servers that are frequently targeted by hackers. In marine transportation industry, malicious code injection attacks (webshell) has been widely exploited by hackers to take full control of Web servers. Traditional webshell detection methods based on pattern matching that are no longer effective against new types of webshell. This motivates us to investigate the problem of detecting obfuscation or unknown webshells, termed OUW problem. In this work, we propose a pattern-matching-deep-learning hybrid ASP.NET webshell detection method (H-DLPMWD) to address the OUW problem. H-DLPMWD is based on Yara-based pattern matching to clean dataset; modeling ASP.NET code files as an operation code index (OCI) vectors; and applying CNN method to train and predict webshell in OCI vectors. To validate H-DLPMWD, our rigorous experimentation demonstrates that H-DLPMWD achieves an excellent accuracy of 98.49%, F1-score of 99.01%, and a low false positive rate of 1.75%.
引用
收藏
页码:2630 / 2642
页数:13
相关论文
共 51 条
[1]   Malware Dynamic Analysis Evasion Techniques: A Survey [J].
Afianian, Amir ;
Niksefat, Salman ;
Sadeghiyan, Babak ;
Baptiste, David .
ACM COMPUTING SURVEYS, 2020, 52 (06)
[2]   WS-LSMR: Malicious WebShell Detection Algorithm Based on Ensemble Learning [J].
Ai, Zhuang ;
Luktarhan, Nurbol ;
Zhao, Yuxin ;
Tang, Chaofei .
IEEE ACCESS, 2020, 8 :75785-75797
[3]   Review of Signature-based Techniques in Antivirus Products [J].
Al-Asli, Mohammed ;
Ghaleb, Taher Ahmed .
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, :422-427
[4]  
Alheeti KMA, 2017, IEEE ICCE
[5]  
Alheeti KMA, 2016, 2016 22ND INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), P457
[6]   Opcodes as predictor for malware [J].
Bilar, Daniel .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (02) :156-168
[7]   Detection and Identification of Malicious Cyber-Attacks in Connected and Automated Vehicles' Real-Time Sensors [J].
Eziama, Elvin ;
Awin, Faroq ;
Ahmed, Sabbir ;
Santos-Jaimes, Luz Marina ;
Pelumi, Akinyemi ;
Corral-De-Witt, Danilo .
APPLIED SCIENCES-BASEL, 2020, 10 (21) :1-26
[8]   Detecting Webshell Based on Random Forest with FastText [J].
Fang, Yong ;
Qiu, Yaoyao ;
Liu, Liang ;
Huang, Cheng .
PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE (ICCAI 2018), 2018, :52-56
[9]  
Guan Tianmin, 2019, 2019 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE). Proceedings, P1391, DOI 10.1109/EITCE47263.2019.9094767
[10]  
Gupta S, 2018, 2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), P115, DOI 10.1109/PDGC.2018.8745989