WS-LSMR: Malicious WebShell Detection Algorithm Based on Ensemble Learning

被引:10
|
作者
Ai, Zhuang [1 ]
Luktarhan, Nurbol [1 ]
Zhao, Yuxin [2 ]
Tang, Chaofei [2 ]
机构
[1] Xinjiang Univ, Coll Informat Sci & Engn, Urumqi 830046, Peoples R China
[2] Xinjiang Univ, Coll Software, Urumqi 830046, Peoples R China
基金
中国国家自然科学基金;
关键词
Feature extraction; Machine learning algorithms; Forestry; Trojan horses; Training; Adaptation models; Prediction algorithms; Ensemble learning; information entropy; WebShell;
D O I
10.1109/ACCESS.2020.2989304
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To solve the problem that the features produced by hidden means, such as code obfuscation and compression, in encrypted malicious WebShell files are not the same as those produced by non-encrypted files, a WebShell attack detection algorithm based on ensemble learning is proposed. First, this algorithm extracted the feature vocabulary of the unigrams and 4-grams based on opcode; subsequently, the 4-gram feature word weights were obtained according to the calculated Gini coefficient of the unigram feature words and used to select the features, which will be selected again based on the Gini coefficient of the 4-gram feature words. Consequently, a feature vocabulary that can detect encrypted and unencrypted WebShell files was constructed. Second, in order to improve the adaptability and accuracy of the detection method, an ensemble detection model called WS-LSMR, consisting of a Logistic Regression, Support Vector Machine, Multi-layer Perceptron and Random Forest, was constructed. The model uses a weighted voting method to determine the WebShell classification. This experiment demonstrated that compared with the traditional single WebShell detection algorithm, the recall rate and accuracy rate improved to 99.14% and 94.28%, respectively, which proves that this method has better detection performance.
引用
收藏
页码:75785 / 75797
页数:13
相关论文
共 50 条
  • [41] An Anomaly Detection Algorithm Based on Ensemble Learning for 5G Environment
    Lei, Lifeng
    Kou, Liang
    Zhan, Xianghao
    Zhang, Jilin
    Ren, Yongjian
    SENSORS, 2022, 22 (19)
  • [42] Implementation of Machine Learning Classification Algorithm Based on Ensemble Learning for Detection of Vegetable Crops Disease
    Jha, Pradeep
    Dembla, Deepak
    Dubey, Widhi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (01) : 584 - 594
  • [43] Session-Based Webshell Detection Using Machine Learning in Web Logs
    Wu, Yixin
    Sun, Yuqiang
    Huang, Cheng
    Jia, Peng
    Liu, Luping
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [44] Detection of Malicious Code Variants Based on Deep Learning
    Cui, Zhihua
    Xue, Fei
    Cai, Xingjuan
    Cao, Yang
    Wang, Gai-ge
    Chen, Jinjun
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (07) : 3187 - 3196
  • [45] IoT Malicious Traffic Detection Based on Federated Learning
    Shen, Yi
    Zhang, Yuhan
    Li, Yuwei
    Ding, Wanmeng
    Hu, Miao
    Li, Yang
    Huang, Cheng
    Wang, Jie
    DIGITAL FORENSICS AND CYBER CRIME, PT 1, ICDF2C 2023, 2024, 570 : 249 - 263
  • [46] Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm
    Tang, Yuting
    Zhang, Dafang
    Liang, Wei
    Li, Kuan-Ching
    Sukhija, Nitin
    UBIQUITOUS SECURITY, 2022, 1557 : 38 - 52
  • [47] Malicious URL Detection Algorithm based on BM Pattern Matching
    Yu, Fuqiang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 33 - 44
  • [48] Android Malicious Application Detection Based on Improved Mayfly Algorithm
    Wei, Yinzhen
    Lu, Shuo
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1845 - 1852
  • [49] Unknown malicious codes detection based on LZW compression algorithm
    Lai, Y.-X. (laiyingxu@bjut.edu.cn), 1600, Beijing University of Technology (38):
  • [50] Distributed clustering algorithm based on ensemble learning
    Ji, Genlin
    Ling, Xiaohan
    Yang, Ming
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2007, 37 (04): : 585 - 588