{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:10:05Z","timestamp":1755900605378,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,6]]},"DOI":"10.1145\/3638782.3638788","type":"proceedings-article","created":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T11:07:37Z","timestamp":1713438457000},"page":"32-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Webshell Detection Based On CodeBERT And Deep Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3500-7790","authenticated-orcid":false,"given":"Lei","family":"Liu","sequence":"first","affiliation":[{"name":"Beijing Rising Network Security Technology Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4130-2999","authenticated-orcid":false,"given":"Ziyou","family":"He","sequence":"additional","affiliation":[{"name":"Beijing Rising Network Security Technology Co., Ltd., China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Cybersecurity Report","author":"Rising","year":"2022","unstructured":"Rising, China Cybersecurity Report 2022, http:\/\/it.rising.com.cn\/dongtai\/19964.html"},{"volume-title":"Proc.acm Conf.on Computer & Communications Security Washington Usa","author":"Kruegel C.","key":"e_1_3_2_1_2_1","unstructured":"Kruegel C. ABSTRACT Anomaly Detection of Web-based Attacks[J]. Proc.acm Conf.on Computer & Communications Security Washington Usa Oct, 2008:251-261."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2882992"},{"key":"e_1_3_2_1_4_1","volume-title":"A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic[C]\/\/ International Conference on Information & Communications Security","author":"Yang J","year":"2018","unstructured":"Yang J, Wang L, Xu Z. A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic[C]\/\/ International Conference on Information & Communications Security. Springer, Cham, 2018."},{"key":"e_1_3_2_1_5_1","volume-title":"Webshell Communication Recognition Based on Traffic[D]","author":"Yingjun W","year":"2018","unstructured":"Yingjun. W, Webshell Communication Recognition Based on Traffic[D]. Wuhan:Wuhan University,2018:1-10."},{"issue":"168","key":"e_1_3_2_1_6_1","first-page":"120","volume":"2014","author":"Haizhang D","unstructured":"Haizhang D, Yong F, Real-time dynamic detection of PHP Webshell [J]. Network Security Technology and Application,2014, No.168(12):120-121+125.","journal-title":"Network Security Technology and Application"},{"issue":"02","key":"e_1_3_2_1_7_1","first-page":"10","volume":"2022","author":"Hao C","unstructured":"Hao C, Cen C, Zheng Z, Webshell detection based on Text Features and Log Analysis [J]. Network Security Technology and Application,2022(02):10-12.","journal-title":"Network Security Technology and Application"},{"key":"e_1_3_2_1_8_1","volume-title":"IEEE","author":"Xie M","year":"2013","unstructured":"Xie M, Hu J. Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD[C]\/\/ 2013 6th International Congress on Image and Signal Processing (CISP). IEEE, 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(19)30089-3"},{"key":"e_1_3_2_1_10_1","volume-title":"Communication and Networking Technologies (ICCCNT). IEEE","author":"Tu D T","year":"2014","unstructured":"Tu D T, Cheng G, Xiao J G, Webshell detection techniques in web applications[C]\/\/ 2014 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, 2014."},{"key":"e_1_3_2_1_11_1","first-page":"15","volume":"2012","author":"Jiankang H","unstructured":"Jiankang H, Zhen X, Duohe M, Research on Webshell detection method based on Decision tree [J]. Network New Media Technology,2012,1(06):15-19.1","journal-title":"Network New Media Technology"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3058060.3058083"},{"key":"e_1_3_2_1_13_1","volume-title":"Research on Webshell Detection Method Based on XGBoost Algorithm [J]. Computer science","author":"Yanpeng C","year":"2018","unstructured":"Yanpeng C, Kexing S, Jianwei H. Research on Webshell Detection Method Based on XGBoost Algorithm [J]. Computer science, 2018, (S1): 375-379."},{"key":"e_1_3_2_1_14_1","first-page":"2543","volume":"2020","author":"Yuqi M","unstructured":"Yuqi M, Yong, S, Zhi X, Research on jsp_webshell Detection Method Based on Abstract Syntax Tree and XGBoost [J]. Communications Technology,2020,53(10):2543-2549.","journal-title":"Communications Technology"},{"key":"e_1_3_2_1_15_1","first-page":"363","volume":"2020","author":"Ruijie Z","unstructured":"Ruijie Z, Yong S, Han Z, Webshell file detection based on TF-IDF [J]. Computer Science,2020,47(S2):363-367.","journal-title":"Computer Science"},{"key":"e_1_3_2_1_16_1","volume-title":"Based on CNN Webshell file detection [J]. Journal of Zhengzhou university (science edition)","author":"Fu Jianming","year":"2019","unstructured":"Fu Jianming, Li Lin, Wang Yingjun. Based on CNN Webshell file detection [J]. Journal of Zhengzhou university (science edition), 2019 ploidy (02): 1-8. DOI: 10.13705 \/ j.i SSN. 1671-6841.2018263."},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"IEEE Access","author":"Li T","year":"2019","unstructured":"Li T, Ren C, Fu Y, Webshell Detection Based on the Word Attention Mechanism (September 2019)[J]. IEEE Access, 2019, PP(99):1-1."},{"key":"e_1_3_2_1_18_1","volume-title":"Distributed Representations of Words and Phrases and their Compositionality[J]. Advances in neural information processing systems","author":"Mikolov T","year":"2013","unstructured":"Mikolov T, Sutskever I, Kai C, Distributed Representations of Words and Phrases and their Compositionality[J]. Advances in neural information processing systems, 2013, 26."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2882517"},{"key":"e_1_3_2_1_20_1","volume-title":"CodeBERT: A Pre-Trained Model for Programming and Natural Languages, 10.18653\/v1\/2020.findings-emnlp.139[P]","author":"Feng Z","year":"2020","unstructured":"Feng Z, Guo D, Tang D, CodeBERT: A Pre-Trained Model for Programming and Natural Languages, 10.18653\/v1\/2020.findings-emnlp.139[P]. 2020."},{"key":"e_1_3_2_1_21_1","volume-title":"Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling[J]. Eprint Arxiv","author":"Chung J","year":"2014","unstructured":"Chung J, Gulcehre C, Cho K H, Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling[J]. Eprint Arxiv, 2014."},{"key":"e_1_3_2_1_22_1","volume-title":"Attention Is All You Need[J]. arXiv","author":"Vaswani A","year":"2017","unstructured":"Vaswani A, Shazeer N, Parmar N, Attention Is All You Need[J]. arXiv, 2017."}],"event":{"name":"ICCNS 2023: 2023 13th International Conference on Communication and Network Security","acronym":"ICCNS 2023","location":"Fuzhou China"},"container-title":["Proceedings of the 2023 13th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638782.3638788","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3638782.3638788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T21:35:54Z","timestamp":1755898554000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638782.3638788"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,6]]},"references-count":22,"alternative-id":["10.1145\/3638782.3638788","10.1145\/3638782"],"URL":"https:\/\/doi.org\/10.1145\/3638782.3638788","relation":{},"subject":[],"published":{"date-parts":[[2023,12,6]]},"assertion":[{"value":"2024-04-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}