WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection
Jinsuk Kim, Dong-Hoon Yoo, Heejin Jang, Kimoon Jeong, Journal of Information Processing Systems Vol. 11, No. 2, pp. 229-238, Jun. 2015
https://doi.org/10.3745/JIPS.03.0026
Keywords: Benchmark Test Collection, Malicious Web Application, Webshell, Web Shell Collection, Web Shell Detection
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Kim, J., Yoo, D., Jang, H., & Jeong, K. (2015). WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection. Journal of Information Processing Systems, 11(2), 229-238. DOI: 10.3745/JIPS.03.0026.
[IEEE Style]
J. Kim, D. Yoo, H. Jang, K. Jeong, "WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection," Journal of Information Processing Systems, vol. 11, no. 2, pp. 229-238, 2015. DOI: 10.3745/JIPS.03.0026.
[ACM Style]
Jinsuk Kim, Dong-Hoon Yoo, Heejin Jang, and Kimoon Jeong. 2015. WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection. Journal of Information Processing Systems, 11, 2, (2015), 229-238. DOI: 10.3745/JIPS.03.0026.