Skip to main content

A Solution for Automatically Malicious Web Shell and Web Application Vulnerability Detection

  • Conference paper
  • First Online:
Computational Collective Intelligence (ICCCI 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9875))

Included in the following conference series:

Abstract

According to Internet Live Stats, it is evident that organizations and developers are underestimating security issues on their system. In this paper, we propose a protective and extensible solution for automatically detecting both the Web application vulnerabilities and malicious Web shells. Based on the original THAPS, we proposed E-THAPS that has a new detecting mechanism, improved SQLi, XSS and vulnerable functions detecting capabilities. For malicious Web shell detection, taint analysis and pattern matching methods are selected as the main approach. The broad experiment that we performed showed our outstanding results in comparison with other solutions for detecting the Web application vulnerabilities and malicious Web shells.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://bitbucket.org/heinep/thaps/.

  2. 2.

    https://github.com/Neohapsis/NeoPI.

  3. 3.

    https://virustotal.com/.

  4. 4.

    https://wordpress.org/plugins/browse/popular/.

References

  1. Kals, S., Kirda, E., Kruegel, C., Jovanovich, N.: SecuBat: a web vulnerability scanner. In: 15th International Conference on World Wide Web, pp. 247–256 (2006)

    Google Scholar 

  2. Jensen, T., Pedersen, H., Olesen, M.C., Hansen, R.R.: THAPS: automated vulnerability scanning of PHP applications. In: Jøsang, A., Carlsson, B. (eds.) NordSec 2012. LNCS, vol. 7617, pp. 31–46. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  3. Dahse, J.: RIPS - a static source code analyser for vulnerabilities in PHP scripts. In: Seminar Work at Chair for Network and Data Security (2010)

    Google Scholar 

  4. Sasi, R.: Web backdoors - attack, evasion and detection. In: C0C0N Sec Conference (2011)

    Google Scholar 

  5. Nguyen, N.-H.: Iris recognition for biometric passport authentication. VNU J. Sci. Nat. Sci. Technol. 26(1), 14–20 (2010)

    Google Scholar 

  6. Le, H.H., Nguyen, N.H., Nguyen, T.T.: Exploiting GPU for large scale fingerprint identification. In: Nguyen, N.T., Trawiński, B., Fujita, H., Hong, T.-P. (eds.) Intelligent Information and Database Systems. LNCS, vol. 9621, pp. 688–697. Springer, Heidelberg (2016)

    Chapter  Google Scholar 

  7. http://www.internetlivestats.com/. Accessed 26 April 2016

  8. Web technology surveys. http://w3techs.com/technologies/overview/programming_language/all/. Accessed 15 April 2016

  9. Dahse, J., Holz, T.: Static detection of second-order vulnerabilities in web applications. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 989–1003 (2014)

    Google Scholar 

  10. Starov, O., Dahse, J., Ahmad, S., Holz, T., Nikiforakis, N.: Thieves, no honor among: a large-scale analysis of malicious web shells. In: 25th International Conference on World Wide Web, pp. 1021–1032 (2016)

    Google Scholar 

  11. Global websecurity whitehat contest. https://ctftime.org/ctf/112

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ngoc-Hoa Nguyen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Le, VG., Nguyen, HT., Lu, DN., Nguyen, NH. (2016). A Solution for Automatically Malicious Web Shell and Web Application Vulnerability Detection. In: Nguyen, NT., Iliadis, L., Manolopoulos, Y., Trawiński, B. (eds) Computational Collective Intelligence. ICCCI 2016. Lecture Notes in Computer Science(), vol 9875. Springer, Cham. https://doi.org/10.1007/978-3-319-45243-2_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-45243-2_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-45242-5

  • Online ISBN: 978-3-319-45243-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics