Research Article

PBDT: Python Backdoor Detection Model Based on Combined Features

Table 1

Summary of related work.

AuthorMain workShortcoming

Static detectionScott and Hagen [16]Identifying obfuscated webshells through statistical featuresThe feature library is old, and using simple character matching with high false positives
Fass et al. [17]Extracting JavaScript semantic information through AST, CFG, and PDG for malicious judgmentNo analysis and consideration of basic functions with malicious intent
Cui et al. [18]Using TF-IDF vectors and hash vectors to obtain webshell opcode features for detectionNo semantic information is considered, which may result in false negative
Yong et al. [14]Processing opcode through 2-gram and TF-IDF, and using composite neural network DNN for webshell’s classificationDeep neural network is too complex and consumes a lot of resources

Dynamic detectionCanali and Balzarotti [9]Analysis of common webshell behavior using honeypot technologyHigh requirements for resources, environment, and samples
Wang et al. [19]Combining attack feature’s vectors and dynamic execution trajectoriesThe types of malicious functions summarized are not comprehensive