{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T08:09:17Z","timestamp":1770883757127,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030932053","type":"print"},{"value":"9783030932060","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-93206-0_13","type":"book-chapter","created":{"date-parts":[[2021,12,16]],"date-time":"2021-12-16T14:04:49Z","timestamp":1639663489000},"page":"209-222","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["WADS: A Webshell Attack Defender Assisted by Software-Defined Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2912-9556","authenticated-orcid":false,"given":"Beiyuan","family":"Yu","sequence":"first","affiliation":[]},{"given":"JianWei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ziyu","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,17]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.3389\/fninf.2014.00014","volume":"8","author":"A Abraham","year":"2014","unstructured":"Abraham, A., et al.: Machine learning for neuroimaging with Scikit-learn. Front. Neuroinform. 8, 14 (2014)","journal-title":"Front. Neuroinform."},{"issue":"2","key":"13_CR2","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s13369-017-2414-5","volume":"42","author":"NZ Bawany","year":"2017","unstructured":"Bawany, N.Z., Shamsi, J.A., Salah, K.: DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab. J. Sci. Eng. 42(2), 425\u2013441 (2017)","journal-title":"Arab. J. Sci. Eng."},{"key":"13_CR3","unstructured":"Cavnar, W.B., Trenkle, J.M., et al.: N-gram-based text categorization. In: Proceedings of SDAIR-94, 3rd Annual Symposium on Document Analysis and Information Retrieval, vol. 161175. Citeseer (1994)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Chen, Z., Jiang, F., Cheng, Y., Gu, X., Liu, W., Peng, J.: XGBoost classifier for DDoS attack detection and analysis in SDN-based cloud. In: 2018 IEEE International Conference on Big Data and Smart Computing (BigComp), pp. 251\u2013256. IEEE (2018)","DOI":"10.1109\/BigComp.2018.00044"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Cui, H., Huang, D., Fang, Y., Liu, L., Huang, C.: Webshell detection based on random forest-gradient boosting decision tree algorithm. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pp. 153\u2013160. IEEE (2018)","DOI":"10.1109\/DSC.2018.00030"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Deng, L.Y., Lee, D.L., Chen, Y.H., Yann, L.X.: Lexical analysis for the webshell attacks. In: 2016 International Symposium on Computer, Consumer and Control (IS3C), pp. 579\u2013582. IEEE (2016)","DOI":"10.1109\/IS3C.2016.149"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Jespersen, S., Pedersen, T.B., Thorhauge, J.: Evaluating the Markov assumption for web usage mining. In: Proceedings of the 5th ACM International Workshop on Web Information and Data Management, pp. 82\u201389 (2003)","DOI":"10.1145\/956699.956717"},{"key":"13_CR8","unstructured":"Koloski, B., Pollak, S., \u0160krlj, B., Martinc, M.: Extending neural keyword extraction with TF-IDF tagset matching. arXiv preprint arXiv:2102.00472 (2021)"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-319-15509-8_26","volume-title":"Passive and Active Measurement","author":"M Ku\u017aniar","year":"2015","unstructured":"Ku\u017aniar, M., Pere\u0161\u00edni, P., Kosti\u0107, D.: What you need to know about SDN flow tables. In: Mirkovic, J., Liu, Y. (eds.) PAM 2015. LNCS, vol. 8995, pp. 347\u2013359. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15509-8_26"},{"issue":"2","key":"13_CR10","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., et al.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Nanda, S., Zafari, F., DeCusatis, C., Wedaa, E., Yang, B.: Predicting network attack patterns in sdn using machine learning approach. In: 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 167\u2013172. IEEE (2016)","DOI":"10.1109\/NFV-SDN.2016.7919493"},{"key":"13_CR12","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-3-319-26961-0_29","volume-title":"Information Systems Security","author":"S Prandl","year":"2015","unstructured":"Prandl, S., Lazarescu, M., Pham, D.-S.: A study of web application firewall solutions. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 501\u2013510. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26961-0_29"},{"key":"13_CR14","unstructured":"Ramos, J., et al.: Using TF-IDF to determine word relevance in document queries. In: Proceedings of the First Instructional Conference on Machine Learning, vol. 242, pp. 29\u201348. Citeseer (2003)"},{"issue":"2","key":"13_CR15","first-page":"40","volume":"2","author":"DW Ruck","year":"1990","unstructured":"Ruck, D.W., Rogers, S.K., Kabrisky, M.: Feature selection using a multilayer perceptron. J. Neural Netw. Comput. 2(2), 40\u201348 (1990)","journal-title":"J. Neural Netw. Comput."},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Scott-Hayward, S., O\u2019Callaghan, G., Sezer, S.: SDN security: a survey. In: 2013 IEEE SDN for Future Networks and Services (SDN4FNS), pp. 1\u20137. IEEE (2013)","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Shin, S., Yegneswaran, V., Porras, P., Gu, G.: Avant-guard: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 413\u2013424 (2013)","DOI":"10.1145\/2508859.2516684"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Tian, Y., Wang, J., Zhou, Z., Zhou, S.: CNN-webshell: malicious web shell detection with convolutional neural network. In: Proceedings of the 2017 VI International Conference on Network, Communication and Computing, pp. 75\u201379 (2017)","DOI":"10.1145\/3171592.3171593"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Tianmin, G., Jiemin, Z., Jian, M.: Research on webshell detection method based on machine learning. In: 2019 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE), pp. 1391\u20131394. IEEE (2019)","DOI":"10.1109\/EITCE47263.2019.9094767"},{"key":"13_CR20","unstructured":"Tomonori, F.: Introduction to RYU SDN framework. Open Networking Summit, pp. 1\u201314 (2013)"},{"key":"13_CR21","unstructured":"Tu, T.D., Guang, C., Xiaojun, G., Wubin, P.: Webshell detection techniques in web applications. In: Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1\u20137. IEEE (2014)"},{"key":"13_CR22","first-page":"62","volume":"28","author":"C Wang","year":"2016","unstructured":"Wang, C., Yang, H., Zhao, Z., Gong, L., Li, Z.: The research and improvement in the detection of PHP variable webshell based on information entropy. J. Comput. 28, 62\u201368 (2016)","journal-title":"J. Comput."}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93206-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T06:04:18Z","timestamp":1643004258000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93206-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030932053","9783030932060"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93206-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 December 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ispec2021.nuist.edu.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"94","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Doble peer review","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}