{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:21:25Z","timestamp":1743009685784,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811597381"},{"type":"electronic","value":"9789811597398"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9739-8_49","type":"book-chapter","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:05:09Z","timestamp":1604577909000},"page":"667-682","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["RF-AdaCost: WebShell Detection Method that Combines Statistical Features and Opcode"],"prefix":"10.1007","author":[{"given":"Wenzhuang","family":"Kang","sequence":"first","affiliation":[]},{"given":"Shangping","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Kaizhi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Guangquan","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"49_CR1","unstructured":"Kim, J., Yoo, D.H., Jang, H., et al.: WebSHArk 1.0: a benchmark collection for malicious web shell detection. J. Inf. Process. Syst. 11(2), 229\u2013238 (2015)"},{"key":"49_CR2","unstructured":"WEB TECHNOLOGY SURVEYS: Usage statistics of server-side programming languages for websites [EB\/OL]. \nhttps:\/\/w3techs.com\/technologies\/overview\/programming_lan-guage\n\n. Accessed 15 May 2020"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Argyros, G., Stais, I., Kiayias, A., et al.: Back in black: towards formal, black box analysis of sanitizers and filters. In: 2016 IEEE Symposium on Security and Privacy (SP). IEEE (2016)","DOI":"10.1109\/SP.2016.14"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Cui, H., Huang, D., Fang, Y., et al.: Webshell detection based on random forest\u2013gradient boosting decision tree algorithm. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pp. 153\u2013160. IEEE (2018)","DOI":"10.1109\/DSC.2018.00030"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Salton, G., Yu, C.T.: On the construction of effective vocabularies for information retrieval. ACM 9(3) (1973)","DOI":"10.1145\/951761.951766"},{"key":"49_CR6","series-title":"Studies in Fuzziness and Soft Computing","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-540-45219-5_7","volume-title":"Text Mining and its Applications","author":"F Debole","year":"2004","unstructured":"Debole, F., Sebastiani, F.: Supervised term weighting for automated text categorization. In: Sirmakessis, S. (ed.) Text Mining and its Applications. Studies in Fuzziness and Soft Computing, vol. 138, pp. 81\u201397. Springer, Berlin (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-45219-5_7"},{"key":"49_CR7","unstructured":"Cavnar, W.B., Trenkle, J.M.: N-gram-based text categorization. In: Proceedings of SDAIR-94, 3rd Annual Symposium on Document Analysis and Information Retrieval, p. 161175 (1994)"},{"key":"49_CR8","first-page":"2596","volume":"9","author":"Ma Ying","year":"2019","unstructured":"Ying, Ma., Hui, Z., WanLong, L.: Optimization of TF-IDF algorithm combined with improved CHI statistical method. Appl. Res. Comput. 9, 2596\u20132598 (2019)","journal-title":"Appl. Res. Comput."},{"issue":"1","key":"49_CR9","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learning 45(1), 5\u201332 (2001)","journal-title":"Mach. Learning"},{"key":"49_CR10","unstructured":"Stolfo, W.F.S.J.: AdaCost: misclassification cost-sensitive boosting. In: Sixteenth International Conference on Machine Learning. Morgan Kaufmann Publishers Inc. (1999)"},{"key":"49_CR11","unstructured":"Biwei, H.: Research on webshell detection method based on Bayesian theory. Sci. Mosaic (2016)"},{"key":"49_CR12","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/data4010016","volume":"04","author":"Z Hewei","year":"2019","unstructured":"Hewei, Z., Xiaojie, L.: PHP webshell detection method based on text vector. Data Commun. 04, 16\u201321 (2019)","journal-title":"Data Commun."},{"key":"49_CR13","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. ACM (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"49_CR14","unstructured":"Truong, T.D., Cheng, G., Guo, X.J., et al.: Webshell detection techniques in web applications In: International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE (2014)"},{"key":"49_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-981-13-6621-5_6","volume-title":"Cyber Security","author":"Z-H Lv","year":"2019","unstructured":"Lv, Z.-H., Yan, H.-B., Mei, R.: Automatic and accurate detection of webshell based on convolutional neural network. In: Yun, X., et al. (eds.) CNCERT 2018. CCIS, vol. 970, pp. 73\u201385. Springer, Singapore (2019). \nhttps:\/\/doi.org\/10.1007\/978-981-13-6621-5_6"},{"key":"49_CR16","doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP). Doha, pp. 1746\u20131751 (2014)","DOI":"10.3115\/v1\/D14-1181"},{"issue":"5","key":"49_CR17","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1214\/aos\/1013203451","volume":"29","author":"JH Friedman","year":"2001","unstructured":"Friedman, J.H.: Greedy function approximation: a gradient boosting machine. Ann. Stat. 29(5), 1189\u20131232 (2001)","journal-title":"Ann. Stat."},{"key":"49_CR18","unstructured":"Ho, T.K.: Random decision forests. In: 1995 Proceedings of the third International Conference on Document Analysis and Recognition. IEEE Computer Society (1995)"},{"key":"49_CR19","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1999","unstructured":"Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55, 119\u2013139 (1999)","journal-title":"J. Comput. Syst. Sci."},{"key":"49_CR20","doi-asserted-by":"crossref","unstructured":"Schapire, R., Singer, Y., Singhal, A.: Boosting and Rocchio applied to text filtering. In: International ACM SIGIR Conference on Research & Development in Information Retrieval. ACM (1998)","DOI":"10.1145\/290941.290996"},{"key":"49_CR21","unstructured":"Karakoulas, G., Shawe-Taylor, J.: Optimizing classifiers for imbalanced training sets. In: Annual Conference on Neural Information Processing Systems, pp. 253\u2013259 (1999)"},{"issue":"4","key":"49_CR22","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Labs Tech. J. 27(4), 379\u2013423 (1948)","journal-title":"Bell Labs Tech. J."},{"key":"49_CR23","unstructured":"Friedman, W.F.: The index of coincidence and its applications in cryptology. Department of Ciphers. Publ 22. Geneva, Illinois, USA: Riverbank Laboratories (1922)"},{"key":"49_CR24","unstructured":"Bell, T.C., Cleary, J.G., Witten, I.H.: Text Compression. Prentice Hall, Upper Saddle River (1990)"},{"key":"49_CR25","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-1-4302-0714-6","volume-title":"\u201cUnderstanding PHP Internals\u201d Essential PHP Tools: Modules, Extensions, and Accelerators","author":"D Sklar","year":"2004","unstructured":"Sklar, D.: \u201cUnderstanding PHP Internals\u201d Essential PHP Tools: Modules, Extensions, and Accelerators, pp. 265\u2013274. Apress, Berkeley (2004)"},{"key":"49_CR26","first-page":"428","volume":"21","author":"XB Xue","year":"2006","unstructured":"Xue, X.B., Zhou, Z.H.: Distributional features for text categorization. IEEE Trans. Knowl. Data Eng. 21, 428\u2013442 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"49_CR27","unstructured":"Yang, Y., Pedersen, J.O.: A comparative study on feature selection in text categorization. In: Proceedings of the Fourteenth International Conference on Machine Learning (ICML), pp. 412\u2013420. Morgan Kaufmann Publishers Inc., San Francisco (1997)"},{"key":"49_CR28","unstructured":"D shield takes the initiative to protect your website[CP\/DK]. \nhttp:\/\/www.d99net.net\/\n\n. Accessed 15 May 2020"},{"key":"49_CR29","unstructured":"SHELLPUB.COM Focus on killing[CP\/DK]. \nhttps:\/\/www.shellpub.com\/\n\n. Accessed 15 May 2020"},{"key":"49_CR30","unstructured":"Next generation webshell detection engine[CP\/DK]. \nhttps:\/\/scanner.baidu.com\/\n\n. Accessed 15 May 2020"}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9739-8_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:23:08Z","timestamp":1604578988000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9739-8_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811597381","9789811597398"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9739-8_49","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icfcs.com.cn\/fcs2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}