{"title":"A dynamic and heterogeneous web application to defense webshell attacks by using diversified PHP code","authors":"Weichao Li, Zheng Zhang, Liqun Wang","doi":"10.1145/3290420.3290438","DOIUrl":null,"url":null,"abstract":"Malicious code injection attacks often bypass rules based filtering methods by various deformable methods. Based on the PHP web application environment, we proposed a method of using code diversification, and then defended the PHP webshell attack threat by constructing a dynamic and heterogeneous PHP web application which uses the redundancy adjudication and dynamic transformation method. Finally, this method is verified in cloud service environment.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"479 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Critical Infrastructure Protection","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3290420.3290438","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Malicious code injection attacks often bypass rules based filtering methods by various deformable methods. Based on the PHP web application environment, we proposed a method of using code diversification, and then defended the PHP webshell attack threat by constructing a dynamic and heterogeneous PHP web application which uses the redundancy adjudication and dynamic transformation method. Finally, this method is verified in cloud service environment.