{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:24Z","timestamp":1750220604080,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T00:00:00Z","timestamp":1602806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,16]]},"DOI":"10.1145\/3419635.3419716","type":"proceedings-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T02:46:56Z","timestamp":1600483616000},"page":"251-259","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Mixed-Models Method Based on Machine Learning in Detecting WebShell Attack"],"prefix":"10.1145","author":[{"given":"Lu","family":"Jinping","sequence":"first","affiliation":[{"name":"Nanjing Linkage Technologies, Nanjing, China"}]},{"given":"Tang","family":"Zhi","sequence":"additional","affiliation":[{"name":"Computer Engineering College, JiMei University, Xiamen, China"}]},{"given":"Mao","family":"Jian","sequence":"additional","affiliation":[{"name":"Computer Engineering College, JiMei University, Xiamen, China"}]},{"given":"Gu","family":"Zhiling","sequence":"additional","affiliation":[{"name":"Computer Engineering College, JiMei University, Xiamen, China"}]},{"given":"Zhang","family":"Jiemin","sequence":"additional","affiliation":[{"name":"Computer Engineering College, JiMei University, Xiamen, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,16]]},"reference":[{"issue":"01","key":"e_1_3_2_1_1_1","first-page":"62","article-title":"A survey on webshell: game of detection and escape[J]","volume":"9","author":"Xiao Long","year":"2018","journal-title":"Cyberspace Security"},{"key":"e_1_3_2_1_2_1","unstructured":"Martin M Lam M S. Automatic generation of XSS and SQL injection attacks with goal-directed model checking[C]. San Jose CA United states: USENIX Association 2008.  Martin M Lam M S. Automatic generation of XSS and SQL injection attacks with goal-directed model checking[C]. San Jose CA United states: USENIX Association 2008."},{"volume-title":"Canada: IEEE Computer Society","year":"2009","author":"Kiezun","key":"e_1_3_2_1_3_1"},{"journal-title":"J. Name Stand. Abbrev., in press.","article-title":"Saner: Composing static and dynamic analysis to validate sanitization in web applications[C]. Oakland, CA, United states: Institute of Electrical and Electronics Engineers Inc., 2008. R. Nicole, \"Title of paper with only first word capitalized","author":"Balzarotti","key":"e_1_3_2_1_4_1"},{"volume-title":"Guangdong: Guangdong University of Technology","year":"2016","author":"JunBin Hong","key":"e_1_3_2_1_5_1"},{"volume-title":"China: Institute of Electrical and Electronics Engineers Inc.","year":"2014","author":"Dinh Tu","key":"e_1_3_2_1_6_1"},{"issue":"04","key":"e_1_3_2_1_7_1","first-page":"16","article-title":"Php-Webshell detection method based on the text vector[J]","volume":"2019","author":"Hewei Zhang","journal-title":"Data Communication"},{"issue":"06","key":"e_1_3_2_1_8_1","first-page":"66","article-title":"Research on Webshell Detection Method Based on Bayesian Theory[J]","volume":"2016","author":"Biwei Hu","journal-title":"Science Mosaic"},{"issue":"04","key":"e_1_3_2_1_9_1","first-page":"895","article-title":"A Method of Detecting WebShell Based on Multilayer Perception[J]","volume":"51","author":"Xiaoming XU","year":"2018","journal-title":"Communications Technology"},{"issue":"05","key":"e_1_3_2_1_10_1","first-page":"5","article-title":"Research of Linux WebShell Detection based on SVM Classifier[J]","volume":"2014","author":"Zheng MENG","journal-title":"Netinfo Security"},{"issue":"06","key":"e_1_3_2_1_11_1","first-page":"924","article-title":"Black Box Detection of Webshell Based on Support Vector Machine[J]","volume":"47","author":"Fei Ye","year":"2015","journal-title":"Journal of Nanjing University of Aeronautics & Astronautics"},{"issue":"05","key":"e_1_3_2_1_12_1","first-page":"1558","article-title":"WebShell detection method based on random forest improved algorithm[J]","volume":"35","author":"Wenchao Jia","year":"2018","journal-title":"Application Research of Computers"},{"key":"e_1_3_2_1_13_1","first-page":"375","article-title":"Research of Webshell Detection Method Based on XGBoost Algorithm[J]","volume":"45","author":"Yanpeng CUI","year":"2018","journal-title":"Computer Science"},{"issue":"01","key":"e_1_3_2_1_14_1","first-page":"203","article-title":"An undersampling method based on clustering for unbalanced data sets[J]","volume":"49","author":"Chunxue Li","year":"2019","journal-title":"Maths Practice and knowledge"},{"issue":"06","key":"e_1_3_2_1_15_1","first-page":"1073","article-title":"Review on SMOTE oversampling and its improved algorithm[J]","volume":"14","author":"Hongbo Shi","year":"2019","journal-title":"Journal of Intelligent Systems"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_1_17_1","first-page":"878","article-title":"Borderline-SMOTE: A new over-sampling method in imbalanced data sets learning","author":"Han H.","year":"2005","journal-title":"Proceedings of the 1st International Conference on Intelligent Computing"},{"volume-title":"Neurocomputing","year":"2020","author":"Qin Hongyun","key":"e_1_3_2_1_18_1"}],"event":{"name":"CIPAE 2020: 2020 International Conference on Computers, Information Processing and Advanced Education","acronym":"CIPAE 2020","location":"Ottawa ON Canada"},"container-title":["Proceedings of the 2020 International Conference on Computers, Information Processing and Advanced Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419635.3419716","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419635.3419716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:03Z","timestamp":1750195923000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419635.3419716"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,16]]},"references-count":18,"alternative-id":["10.1145\/3419635.3419716","10.1145\/3419635"],"URL":"https:\/\/doi.org\/10.1145\/3419635.3419716","relation":{},"subject":[],"published":{"date-parts":[[2020,10,16]]},"assertion":[{"value":"2020-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}