{"id":"https://openalex.org/W2901745180","doi":"https://doi.org/10.1109/access.2018.2882517","title":"Webshell Traffic Detection With Character-Level Features Based on Deep Learning","display_name":"Webshell Traffic Detection With Character-Level Features Based on Deep Learning","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2901745180","doi":"https://doi.org/10.1109/access.2018.2882517","mag":"2901745180"},"language":"en","primary_location":{"id":"doi:10.1109/access.2018.2882517","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2882517","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2018.2882517","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100408679","display_name":"Hua Zhang","orcid":"https://orcid.org/0000-0002-0532-9783"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hua Zhang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-0532-9783","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047258302","display_name":"Hongchao Guan","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongchao Guan","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103818589","display_name":"Hanbing Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hanbing Yan","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003153613","display_name":"Wenmin Li","orcid":"https://orcid.org/0000-0002-1278-1735"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenmin Li","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-1278-1735","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054847505","display_name":"Yuqi Yu","orcid":"https://orcid.org/0000-0001-6226-1554"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqi Yu","raw_affiliation_strings":["School of Economics and Management, Beihang University, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Economics and Management, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101465215","display_name":"Hao Zhou","orcid":"https://orcid.org/0000-0002-1012-3042"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Zhou","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060379760","display_name":"Xingyu Zeng","orcid":"https://orcid.org/0009-0007-8224-4461"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingyu Zeng","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100408679"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.7085,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.92473959,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"6","issue":null,"first_page":"75268","last_page":"75277"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8621336221694946},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.656796932220459},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6504330039024353},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6054869890213013},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5068498253822327},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.47651469707489014},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.4637186527252197},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.4447783827781677},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4404638707637787},{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.43430596590042114},{"id":"https://openalex.org/keywords/character","display_name":"Character (mathematics)","score":0.431379497051239},{"id":"https://openalex.org/keywords/precision-and-recall","display_name":"Precision and recall","score":0.4149889051914215},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.41344085335731506},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.11565837264060974},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10800734162330627},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.0811316967010498}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8621336221694946},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.656796932220459},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6504330039024353},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6054869890213013},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5068498253822327},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.47651469707489014},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.4637186527252197},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.4447783827781677},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4404638707637787},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.43430596590042114},{"id":"https://openalex.org/C2780861071","wikidata":"https://www.wikidata.org/wiki/Q1062934","display_name":"Character (mathematics)","level":2,"score":0.431379497051239},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.4149889051914215},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.41344085335731506},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.11565837264060974},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10800734162330627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0811316967010498},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2018.2882517","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2882517","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f7e9bb092a734b72bd396cea15d6fd58","is_oa":true,"landing_page_url":"https://doaj.org/article/f7e9bb092a734b72bd396cea15d6fd58","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 6, Pp 75268-75277 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2018.2882517","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2882517","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8815724042","display_name":null,"funder_award_id":"61502044","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W295894637","https://openalex.org/W1529075208","https://openalex.org/W1560851690","https://openalex.org/W1614298861","https://openalex.org/W1639305476","https://openalex.org/W1665214252","https://openalex.org/W1836465849","https://openalex.org/W1904365287","https://openalex.org/W2012833704","https://openalex.org/W2031838470","https://openalex.org/W2064675550","https://openalex.org/W2096152098","https://openalex.org/W2170240176","https://openalex.org/W2252215182","https://openalex.org/W2351238446","https://openalex.org/W2389369929","https://openalex.org/W2395418806","https://openalex.org/W2402268235","https://openalex.org/W2468328197","https://openalex.org/W2500751094","https://openalex.org/W2605575598","https://openalex.org/W2793801973","https://openalex.org/W2805465321","https://openalex.org/W2911964244","https://openalex.org/W2950577311","https://openalex.org/W2963012544","https://openalex.org/W2963626623","https://openalex.org/W4230940751","https://openalex.org/W4231078754","https://openalex.org/W4233168954","https://openalex.org/W6610517080","https://openalex.org/W6636510571","https://openalex.org/W6637242042","https://openalex.org/W6638667902","https://openalex.org/W6640036494","https://openalex.org/W6674701899","https://openalex.org/W6685053522","https://openalex.org/W6713098461"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4386185023"],"abstract_inverted_index":{"Webshell":[0,64,69,112],"is":[1],"a":[2,68,91,111,123],"kind":[3],"of":[4,28,76],"backdoor":[5],"programs":[6],"based":[7],"on":[8,110],"Web":[9],"services.":[10],"Network-based":[11],"detection":[12,71,113],"could":[13],"monitor":[14],"the":[15,26,44,74,86,100,120,131],"request":[16],"and":[17,24,33,56,80,106,127,130],"response":[18],"traffic":[19,70,93],"to":[20,48,60],"find":[21],"abnormal":[22],"behaviors":[23],"detect":[25,61],"existence":[27],"Webshell.":[29],"Some":[30],"machine":[31],"learning":[32,35],"deep":[34],"methods":[36,46],"have":[37],"been":[38],"used":[39],"in":[40,52,102],"this":[41],"field,":[42],"but":[43],"current":[45],"need":[47],"be":[49,135],"further":[50],"explored":[51],"discovering":[53],"new":[54],"attacks":[55],"performance.":[57],"In":[58],"order":[59],"large-scale":[62],"unknown":[63],"events,":[65],"we":[66,89],"propose":[67,90],"model":[72,105,121],"combining":[73],"characteristics":[75],"convolutional":[77],"neural":[78],"network":[79],"long":[81],"short-term":[82],"memory":[83],"network.":[84],"At":[85],"same":[87],"time,":[88],"character-level":[92],"content":[94],"feature":[95],"transformation":[96],"method.":[97],"We":[98],"apply":[99],"method":[101],"our":[103,108],"proposed":[104],"evaluate":[107],"approach":[109],"testbed.":[114],"The":[115],"experiment":[116],"result":[117],"indicates":[118],"that":[119],"has":[122],"high":[124],"precision":[125],"rate":[126],"recall":[128],"rate,":[129],"generalization":[132],"ability":[133],"can":[134],"guaranteed.":[136]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":1}],"updated_date":"2026-05-17T08:19:37.847499","created_date":"2025-10-10T00:00:00"}
